One document matched: draft-white-i2rs-use-case-03.xml
<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!-- One method to get references from the online citation libraries.
There has to be one entity for each item to be referenced.
An alternate method (rfc include) is described in the references. -->
<!ENTITY RFC2119 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY I-D.ietf-i2rs-problem-statement SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-i2rs-problem-statement.xml">
<!ENTITY I-D.ietf-i2rs-architecture SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-i2rs-architecture.xml">
<!ENTITY I-D.ietf-i2rs-rib-info-model SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-i2rs-rib-info-model.xml">
<!ENTITY I-D.lapukhov-bgp-routing-large-dc SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-lapukhov-bgp-routing-large-dc-06.xml">
]>
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<?rfc strict="no" ?>
<?rfc toc="yes" ?>
<?rfc symrefs="yes" ?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes" ?>
<?rfc subcompact="no" ?>
<rfc category="info" docName="draft-white-i2rs-use-case-03" ipr="trust200902">
<front>
<title abbrev="I2RS Use Cases">Protocol Independent Use Cases for an
Interface to the Routing System</title>
<author fullname="Russ White" initials="R" surname="White">
<organization>IETF</organization>
<address>
<email>russw@riw.us</email>
<!-- uri and facsimile elements may also be added -->
</address>
</author>
<author fullname="Susan Hares" initials="S" surname="Hares">
<organization>Hickory Hill</organization>
<address>
<email>shares@ndzh.com</email>
</address>
</author>
<author fullname="Alvaro Retana" initials="A" surname="Retana">
<organization>Cisco Systems, Inc.</organization>
<address>
<postal>
<street>7025 Kit Creek Road</street>
<city>Research Triangle Park</city>
<region>NC</region>
<code>27617</code>
<country>USA</country>
</postal>
<email>aretana@cisco.com</email>
</address>
</author>
<date year="2014"/>
<area>Routing</area>
<workgroup>i2rs</workgroup>
<abstract>
<t>Programmatic interfaces to provide control over individual forwarding
devices in a network promise to reduce operational costs while improving
scaling, control, and visibility into the operation of large scale
networks. To this end, several programmatic interfaces have been
proposed. OpenFlow, for instance, provides a mechanism to replace the
dynamic control plane processes on individual forwarding devices
throughout a network with off box processes that interact with the
forwarding tables on each device. Another example is NETCONF, which
provides a fast and flexible mechanism to interact with device
configuration and policy.</t>
<t>There is, however, no proposal which provides an interface to all
aspects of the routing system as a system. Such a system would not
interact with the forwarding system on individual devices, but rather
with the control plane processes already used to discover the best path
to any given destination through the network, as well as interact with
the routing information base (RIB), which feeds the forwarding table the
information needed to actually switch traffic at a local level.</t>
<t>This document describes a set of use cases such a system could
fulfill. It is designed to provide underlying support for the framework,
policy, and other drafts describing the Interface to the Routing System
(I2RS).</t>
</abstract>
</front>
<middle>
<section title="Introduction" toc="default">
<t>The <xref target="I-D.ietf-i2rs-architecture "> Architecture for the
Interface to the Routing System</xref> allows for a mechanism where the distributed
control plane can be augmented by an outside control plane through an
open, accessible interface, including the Routing Information Base
(RIB), in individual devices to solve issues described
in <xref target="I-D.ietf-i2rs-problem-statement"> </xref>. The
<xref target="I-D.ietf-i2rs-rib-info-model">RIB Info Model </xref>
specifies the information elements accessible by the I2RS
system in the RIB. </t>
<t> This represents a "halfway point" between
completely replacing the traditional distributed control plane and
directly configuring devices to distribute policy or modifications to
routing through off-board processes. This draft proposes a set of use
cases that explain where the work described utilizing the RIB information
model will be useful. The goal is to inform not only the
community's understanding of where I2RS fits in the larger scheme of SDN
proposals, but also to inform the requirements, framework, and
specification of I2RS to provide the best fit for the purposes which
make the most sense for this type of programmatic interface.</t>
<t>Towards this end the authors have searched for a number of different
use cases representing not only complex modifications of the control
plane, including interaction with applications and network conditions,
but also simpler use cases. The array of use cases presented here should
provide the reader with a solid understanding of the power of an SDN
solution that will augment, rather than replace, traditional distributed
control planes.</t>
<t>Each use case is presented in its own section with a list of
requirements. Each requirement in these lists has a number REQnn
where nn represents a number such as REQ01. Each unique
has been given a number so in some use cases the numbers
may skip numbers. For example, use case 2 has requirements
REQ01, REQ06, and REQ07. After all use cases, the unique requirements are
summarized in numerical order. </t>
<section title="Requirements Language">
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <xref
target="RFC2119">RFC 2119</xref>.</t>
</section>
</section> <!-- for Introductions section -->
<section title="Distributed Reaction to Network Based Attacks" toc="default" >
<t>Quickly modifying the control plane to reroute traffic for one
destination while leaving a standard configuration in place (filters,
metrics, and other policy mechanisms) is a challenge --but this is
precisely the challenge of a network engineer attempting to deal with a
network incursion. The ability to redirect specific flows of information
or specific classes of traffic into, through, and back out of traffic
analyzers on the fly is crucial in these situations. The following
network diagram provides an illustration of the problem.</t>
<figure align="center" alt="" height="" suppress-title="false" title="" width="">
<artwork align="center" > <![CDATA[
Valid Source---\ /--R2--------------------\
R1 R3---Valid Destination
Attack Source--/ \--Monitoring Device-----/ ]]>
</artwork>
</figure>
<t>Modifying the cost of the link between R1 and R2 to draw the attack
traffic through the monitoring device in the distributed control plane
will, of necessity, also draw the valid traffic through the monitoring
device. Drawing valid traffic through a monitoring device introduces
delay, jitter, and other quality of service issues, as well as posing a
problem for the monitoring device itself in terms of traffic load and
management.</t>
<t>An I2RS controller could stand between the detection of the attack
and the control plane to facilitate the rapid modification of control
and forwarding planes to either block the traffic or redirect it to
analysis devices connected to the network.</t>
<figure align="center" alt="" height="" suppress-title="false" title="" width="">
<artwork align="center" alt="" height="" name="" type="" width="" xml:space="preserve">
<![CDATA[
+----------+
|i2rs-client|-------------------
| |-----------+ |
-----------+ | |
| +------+ |
| | ir2s | |
| | agent| |
Valid Source--\ | /---|R2 |-------+\
+-------+/ +------+ | \
|R1 i2rs| | R3--Valid
| agent| | Destination
+-------+ i2rs agent
Attack Source--/ \--Monitoring Device-----/]]>
</artwork>
</figure>
<t>Summary of I2RS Capabilities and Interactions:</t>
<t>In the lists below, the REQnn in which nn is a number
indicates a unique requirement from the use cases.</t>
<t><list style="symbols">
<t>REQ01: The ability to monitor the available routes installed in the RIB
of each forwarding device, including near real time notification of
route installation and removal. The information pulled from the
RIB must include the destination prefix (NLRI), the table identifier
(if the forwarding device has multiple forwarding instances), the
metric of the installed route, and the identifier for the installing process.
</t>
<t> REQ02: The ability to install source and destination based routes in the
local RIB of each forwarding device. This must include the ability
to supply the destination prefix (NLRI), the source prefix (NLRI), a
table identifier (if the forwarding device has multiple forwarding
instances), a route preference, a route metric, a next hop, an
outbound interface, and a route process identifier.</t>
<t>REQ03: The ability to install a route to a null destination, effectively
filtering traffic to this destination.</t>
<t>REQ04: The ability to interact with various policies configured on the
forwarding devices, in order to inform the policies implemented by
the dynamic routing processes. This interaction should be through
existing configuration mechanisms, such as NETCONF, and should be
recorded in the configuration of the local device so operators are
aware of the full policy implemented in the network from the running
configuration.</t>
<t>REQ5: The ability to interact with traffic flow and other network
traffic level measurement protocols and systems, in order to
determine path performance, top talkers, and other information
required to make an informed path decision based on locally
configured policy.</t>
</list></t>
</section>
<section title="Remote Service Routing" toc="default">
<t>In hub and spoke overlay networks, there is always an issue with
balancing between the information held in the spoke routing table,
optimal routing through the network underlying the overlay, and
mobility. Most solutions in this space use some form of centralized
route server that acts as a directory of all reachable destinations and
next hops, a protocol by which spoke devices and this route server
communicate, and caches at the remote sites.</t>
<t>An I2RS solution would use the same elements, but with a different
control plane. Remote sites would register (or advertise through some
standard routing protocol, such as BGP), the reachable destinations at
each site, along with the address of the router (or other device) used
to reach that destination. These would, as always, be stored in a route
server (or several redundant route servers) at a central location.</t>
<t>When a remote site sends a set of packets to the central location
that are eventually destined to some other remote site, the central
location can forward this traffic, but at the same time simply directly
insert the correct routing information into the remote site's routing
table. If the location of the destination changes, the route server can
directly modify the routing information at the remote site as
needed.</t>
<figure>
<artwork>
+---------------------+
| APP or Controller |
+---------------------+
|
|
+----------------+
/ Centralized \
+ Route server +
----------------------
| hub |
| 192.50.128/24 *---------+
+--*----*---*------*-+ |
| | | | | |
+--*--+ | +-*--+ +*----+ |
source 1---| A |---| C |--| D |---- |
\ /+--+--+ | +----+ +-----+ |
\ / | | | |
\/ | | | |
/\ +-----+ | +-----+*-----------+
source 2 \ | B *-| | D |
\| |-----| |-----
+-----+ +-----+
*- are RS connections
|- are hub/spoke connects
</artwork>
</figure>
<t>An interesting aspect of this solution is that no new and specialized
protocols are needed between the remote sites and the centralized route
server(s). Normal routing protocols can be used to notify the
centralized route server(s) of modifications in reachability
information, and the route server(s) can respond as needed, based on
local algorithms optimized for a particular application or network. For
instance, short lived flows might be allowed to simply pass through the
hub site with no reaction, while longer lived flows might warrant a
specific route to be installed in the remote router. Algorithms can also
be developed that would optimize traffic flow through the overlay, and
also to remove routing entries from remote devices when they are no
longer needed based on far greater intelligence than simple non-use for
some period of time.</t>
<t>Summary of I2RS Capabilities and Interactions:</t>
<t><list style="symbols">
<t>REQ01: The ability to monitor the available routes installed in the RIB
of each forwarding device, including near real time notification of
route installation and removal. This information must include the
destination prefix (NLRI), a table identifier (if the forwarding
device has multiple forwarding instances), the metric of the
installed route, and an identifier indicating the installing
process.</t>
<t>REQ06: The ability to install destination based routes in the local RIB
of each forwarding device. This must include the ability to supply
the destination prefix (NLRI), a table identifier (if the forwarding
device has multiple forwarding instances), a route preference, a
route metric, a next hop, an outbound interface, and a route process
identifier.</t>
<t>REQ07: The ability to read the local RIB of each forwarding device,
including the destination prefix (NLRI), a table identifier (if the
forwarding device has multiple forwarding instances), the metric of
each installed route, a route preference, and an identifier
indicating the installing process.</t>
</list></t>
</section>
<section title="Within Data Center Routing" toc="default">
<t/>
<t>Data Centers have evolved into massive topologies with thousands of
server racks and millions of hosts. Data Centers use BGP with ECMP, ISIS
(with multiple LAGs), or other protocols to tie the data center
together. Data centers are currently designed around a three or four
tier structure with: server, top-of-rack switches, aggregation switches,
and router interfacing the data center to the Internet. <xref
target="I-D.lapukhov-bgp-routing-large-dc"/> examines many of these
elements of data center design.</t>
<t>One element of these Data Center routing infrastructures is the
ability to quickly read topology information and execute configuration
from a centralized location. Key to this environment is the tight
feedback loop between learning about topology changes or loading
changes, and instantiating new routing policy. Without I2RS, may Data
Centers are using extra physical topologies or logical topologies to
work around the features.</t>
<t>An I2RS solution would use the same elements, but with a different
control plane. The I2RS enabled control plane could provide the Data
Center 4 tier infrastructure the quick access to topology and data flow
information needed for traffic flow optimization. Changes to the Data
Center infrastructure done via I2RS could have a tight feedback
loop.</t>
<t>Again, this solution would reduce the need for new and specialized
protocols while giving the Data Center the control it desire. The I2RS
routing interface could be extended to virtual routers.</t>
<t>Summary of I2RS Capabilities and Interactions:</t>
<t><list style="symbols">
<t>REQ01: The ability to monitor the available routes installed in the RIB
of each forwarding device, including near real time notification of
route installation and removal. This information must include the
destination prefix (NLRI), a table identifier (if the forwarding
device has multiple forwarding instances), the metric of the
installed route, and an identifier indicating the installing
process.</t>
<t>REQ04: The ability to interact with various policies configured on the
forwarding devices, in order to inform the policies implemented by
the dynamic routing processes. This interaction should be through
existing configuration mechanisms, such as NETCONF, and should be
recorded in the configuration of the local device so operators are
aware of the full policy implemented in the network from the running
configuration.</t>
<t>REQ05: The ability to interact with traffic flow and other network
traffic level measurement protocols and systems, in order to
determine path performance, top talkers, and other information
required to make an informed path decision based on locally
configured policy.</t>
<t>REQ06: The ability to install destination based routes in the local RIB
of each forwarding device. This must include the ability to supply
the destination prefix (NLRI), a table identifier (if the forwarding
device has multiple forwarding instances), a route preference, a
route metric, a next hop, an outbound interface, and a route process
identifier.</t>
<t>REQ07: The ability to read the local RIB of each forwarding device,
including the destination prefix (NLRI), a table identifier (if the
forwarding device has multiple forwarding instances), the metric of
each installed route, a route preference, and an identifier
indicating the installing process.</t>
<t>REQ08: The ability to read the tables of other local protocol processes
running on the device. This reading action should be supported
through an import/export interface which can present the information
in a consistent manner across all protocol implementations, rather
than using a protocol specific model for each type of available
process.</t>
<t>REQ09: The ability to inject information directly into the local tables
of other protocol processes running on the forwarding device. This
injection should be supported through an import/export interface
which can inject routing information in a consistent manner across
all protocol implementations, rather than using a protocol specific
model for each type of available process.</t>
</list></t>
</section>
<section title="Temporary Overlays between Data Centers" toc="default">
<t/>
<t>Data Centers within one organization may operate as one single entity
even though they may be geographically distributed. Applications are
load balanced within Data Centers and between data centers to take
advantage of cost economics in power, storage, and server availability
for compute resources. Applications are also transfer to alternate data
centers in case of failures within a data center. To reduce time during
failure, Data Centers often replicate user storage between two or more
data centers. During the transfer of stored information prior to a Data
Center to Data Center move, the Data Center controllers need to
dynamically acquire a large amount of inter-data center bandwidth
through an overlay network, often during off hours.</t>
<t>I2RS could provide the connection between the overlay network
configuration, local policies, and the control plane to dynamically
bring a large bandwidth inter-data center overlay or channel into use,
and then to remove it from use when the data transfer is completed.</t>
<t>Similarly, during a fail-over, a control process within data centers
interacts with a group host process and the network to seamless move the
processing to another data center. During the fail-over case, additional
process state may need to be moved as well to restart the system. The
difference between these data-to-data center moves is immediate and
urgent need to move systems. If an application (such as medical or
banking services) pays to have this type of fail-over, it is likely the
network service this application uses will pay for the preemption on
network bandwidth and a Quality of Service (QoS) on the data transfer
to allow the failover traffic to flow quickly to the remote datacenter.
I2RS can allow the Data Center network and the Network connecting the data center to
preempt other best-effort traffic to send this priority data flow and
to set a QoS that will allow quick data transfer. After
the high priority data flow has finished, networks can return to their
previous condition.</t>
<t>Summary of I2RS Capabilities and Interactions:</t>
<t><list style="symbols">
<t>REQ01: The ability to monitor the available routes installed in the RIB
of each forwarding device, including near real time notification of
route installation and removal. This information must include the
destination prefix (NLRI), a table identifier (if the forwarding
device has multiple forwarding instances), the metric of the
installed route, and an identifier indicating the installing
process.</t>
<t> REQ02: The ability to install source and destination based routes in the
local RIB of each forwarding device. This must include the ability
to supply the destination prefix (NLRI), the source prefix (NLRI), a
table identifier (if the forwarding device has multiple forwarding
instances), a route preference, a route metric, a next hop, an
outbound interface, and a route process identifier.</t>
<t>REQ05: The ability to interact with traffic flow and other network
traffic level measurement protocols and systems, in order to
determine path performance, top talkers, and other information
required to make an informed path decision based on locally
configured policy.</t>
<t>REQ06: The ability to install destination based routes in the local RIB
of each forwarding device. This must include the ability to supply
the destination prefix (NLRI), a table identifier (if the forwarding
device has multiple forwarding instances), a route preference, a
route metric, a next hop, an outbound interface, and a route process
identifier.</t>
<t>REQ07: The ability to read the local RIB of each forwarding device,
including the destination prefix (NLRI), a table identifier (if the
forwarding device has multiple forwarding instances), the metric of
each installed route, a route preference, and an identifier
indicating the installing process.</t>
<t>REQ10: The ability to interact with policies and configurations on the
forwarding devices using time based processing, either through timed
auto-rollback or some other mechanism. This interaction should be
through existing configuration mechanisms, such as NETCONF, and
should be recorded in the configuration of the local device so
operators are aware of the full policy implemented in the network
from the running configuration.</t>
</list></t>
</section>
<section title="Summary of Requirements" toc="default">
<t><list style="symbols">
<t>REQ01: The ability to monitor the available routes installed in the RIB
of each forwarding device, including near real time notification of
route installation and removal. This information must include the
destination prefix (NLRI), a table identifier (if the forwarding
device has multiple forwarding instances), the metric of the
installed route, and an identifier indicating the installing
process.</t>
<t> REQ02: The ability to install source and destination based routes in the
local RIB of each forwarding device. This must include the ability
to supply the destination prefix (NLRI), the source prefix (NLRI), a
table identifier (if the forwarding device has multiple forwarding
instances), a route preference, a route metric, a next hop, an
outbound interface, and a route process identifier.</t>
<t>REQ03: The ability to install a route to a null destination, effectively
filtering traffic to this destination.</t>
<t>REQ04: The ability to interact with various policies configured on the
forwarding devices, in order to inform the policies implemented by
the dynamic routing processes. This interaction should be through
existing configuration mechanisms, such as NETCONF, and should be
recorded in the configuration of the local device so operators are
aware of the full policy implemented in the network from the running
configuration.</t>
<t>REQ05: The ability to interact with traffic flow and other network
traffic level measurement protocols and systems, in order to
determine path performance, top talkers, and other information
required to make an informed path decision based on locally
configured policy.</t>
<t>REQ06: The ability to install destination based routes in the local RIB
of each forwarding device. This must include the ability to supply
the destination prefix (NLRI), a table identifier (if the forwarding
device has multiple forwarding instances), a route preference, a
route metric, a next hop, an outbound interface, and a route process
identifier.</t>
<t>REQ07: The ability to read the local RIB of each forwarding device,
including the destination prefix (NLRI), a table identifier (if the
forwarding device has multiple forwarding instances), the metric of
each installed route, a route preference, and an identifier
indicating the installing process.</t>
<t>REQ08: The ability to read the tables of other local protocol processes
running on the device. This reading action should be supported
through an import/export interface which can present the information
in a consistent manner across all protocol implementations, rather
than using a protocol specific model for each type of available
process.</t>
<t>REQ09: The ability to inject information directly into the local tables
of other protocol processes running on the forwarding device. This
injection should be supported through an import/export interface
which can inject routing information in a consistent manner across
all protocol implementations, rather than using a protocol specific
model for each type of available process.</t>
<t>REQ10: The ability to interact with policies and configurations on the
forwarding devices using time based processing, either through timed
auto-rollback or some other mechanism. This interaction should be
through existing configuration mechanisms, such as NETCONF, and
should be recorded in the configuration of the local device so
operators are aware of the full policy implemented in the network
from the running configuration.</t>
</list></t>
</section>
<section title="Comparison of I2RS requirements with I2RS RIB Information Model" toc="default">
<t> Comparison of I2RS Capabilities versus the I2RS RIB </t>
<t> In summary, the I2RS client/agent architecture and protocol SHOULD
support the following requirements:
<list>
<t> REQ01: The <xref target="I-D.ietf-i2rs-rib-info-model ">RIB Info Model </xref>
specifies the routes as associated with routing-instance, interface-list and RIBs
within a Router (virtual or physical) identified by Router_ID.
Each route has a prefixes, route attributes, family attributes (IPv4, Ipv6, MPLS, MAC, interface),
and next-hop list. The RIB info model does not keep information on the
FIB the route was installed in, the metric of the installed route, or the
identifier of the installing process.
The <xref target="I-D.ietf-i2rs-rib-info-model ">RIB Info Model </xref> does
provide a notification for route change with an installed in FIB flag, active flag,
and reason (for non-installation).
</t>
<t> REQ02: The <xref target="I-D.ietf-i2rs-rib-info-model ">RIB Info Model </xref>
supports installing source-destination routes for IPv4 and IPv6 for a RIB
associated with set of RIBs within a route instance of a Router (virtual or physical).
If there is policy that links RIBs within a route instance of router to a specific FIB,
it is not clearly stated in the <xref target="I-D.ietf-i2rs-rib-info-model ">RIB Info Model </xref>.
The source-destination is only for IPv4 and IPv6 NLRI.
The <xref target="I-D.ietf-i2rs-rib-info-model ">RIB Info Model </xref>.
does has a route_preference (ROUTE_PREFERENCE), but not a route metric.
The nexthop field does have a primary/back preference, a load balancing weight, and
an egress (outbound) interface per nexthop, and a RIB_ID.
It is unclear if the RIB_ID serves the same purpose as the multiple forwarding instances.
</t>
<t> REQ03: The RIB Info Model does not provide a specific indication that the default (zero length prefix)
route can be installed, but this can be implied from the different match lengths.
</t>
<t> REQ04: The ability to interact with various policies via existing
configuration functions such as NETCONF has not
be specified directly in <xref target="I-D.ietf-i2rs-rib-info-model ">RIB Informational Model </xref>
or any other informational model.
</t>
<t> REQ05: The ability to interact with traffic flow and other network
traffic level measurement protocols and systems is not included
in any I2RS information model.
</t>
<t> REQ06: The <xref target="I-D.ietf-i2rs-rib-info-model ">RIB Info Model </xref>
supports installing destination routes in a RIB for all RIB families from
a route-instance. The route_instance is identified by the tuple of
INSTANCE_NAME and ROUTER_ID. Each route may contain a route preference and
multiple next hops, but it does not contain a metric per route. Each nexthop
may contains a RIB_ID to look-up nexthop, an egress-interface,
tunnel nexthop (logical or encapsulated). This must include the ability to supply
the destination prefix (NLRI), a table identifier (if the forwarding
device has multiple forwarding instances), a route preference, a
route metric, a next hop, an outbound interface, and a route process
identifier.</t>
<t> REQ07: The <xref target="I-D.ietf-i2rs-rib-info-model ">RIB Info Model </xref>
supports the ability to read the RIBs associated with each routing-instance.
The routing instance is identified by tuple of ROUTE_INSTANCE plus
optionally interface_list and router ID. The RIBS are identified by
NAME and RIB_FAMILY. The routes within the RIB Can be identified by
route-match that identifies destination (IPv4, IPv6, IEEE MAC, MPLS, interface).
The information read per route is the destination prefix (NLRI),
route preference and multiple nexthops (each with associated metric and RIB).
However, it does not indicate the metric of an installed route and the
identifier of the installing process. </t>
<t>REQ08: The ability to read the tables of other local protocol processes
running on the device. This reading action should be supported
through an import/export interface which can present the information
in a consistent manner across all protocol implementations, rather
than using a protocol specific model for each type of available
process.</t>
<t>REQ09: No informational model supports the ability to
inject information of other protocol processing running on the
forwarding device. The <xref target="I-D.ietf-i2rs-rib-info-model ">RIB Info Model </xref>
inserts the routes with RIB with a
The ability to inject information directly into the local tables
of other protocol processes running on the forwarding device. This
injection should be supported through an import/export interface
which can inject routing information in a consistent manner across
all protocol implementations, rather than using a protocol specific
model for each type of available process.</t>
<t>REQ10: The ability to interact with policies and configurations on the
forwarding devices using time based processing, either through timed
auto-rollback or some other mechanism. This interaction should be
through existing configuration mechanisms, such as NETCONF, and
should be recorded in the configuration of the local device so
operators are aware of the full policy implemented in the network
from the running configuration.</t>
</list>
</t>
</section>
</middle>
<back>
<references title="Normative References">
&RFC2119;
</references>
<references title="Informative References">
&I-D.ietf-i2rs-problem-statement;
&I-D.ietf-i2rs-architecture;
&I-D.ietf-i2rs-rib-info-model;
&I-D.lapukhov-bgp-routing-large-dc;
</references>
</back>
</rfc>
| PAFTECH AB 2003-2026 | 2026-04-24 04:07:54 |