[要約] RFC 8916は、マルチキャストソースディスカバリプロトコル(MSDP)のためのYANGデータモデルを定義しています。この文書の目的は、ネットワーク機器でMSDPの設定と管理を標準化することにあります。利用場面としては、マルチキャスト通信を効率的に管理し、異なるネットワークドメイン間でのマルチキャストソース情報の共有、及び設定の自動化が挙げられます。
Internet Engineering Task Force (IETF) X. Liu Request for Comments: 8916 Volta Networks Category: Standards Track Z. Zhang, Ed. ISSN: 2070-1721 ZTE Corporation A. Peter Individual Contributor M. Sivakumar Juniper Networks F. Guo Huawei Technologies P. McAllister Metaswitch Networks October 2020
A YANG Data Model for the Multicast Source Discovery Protocol (MSDP)
マルチキャストソース検出プロトコル(MSDP)のYangデータモデル
Abstract
概要
This document defines a YANG data model for the configuration and management of Multicast Source Discovery Protocol (MSDP) protocol operations.
この文書は、マルチキャストソース検出プロトコル(MSDP)プロトコル操作の構成と管理のためのYANGデータモデルを定義しています。
Status of This Memo
本文書の状態
This is an Internet Standards Track document.
これはインターネット規格のトラック文書です。
This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 7841.
この文書は、インターネットエンジニアリングタスクフォース(IETF)の製品です。IETFコミュニティのコンセンサスを表します。それは公開レビューを受け、インターネットエンジニアリングステアリンググループ(IESG)による出版の承認を受けました。インターネット規格に関する詳細情報は、RFC 7841のセクション2で利用できます。
Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at https://www.rfc-editor.org/info/rfc8916.
この文書の現在のステータス、任意のエラータ、およびフィードバックを提供する方法は、https://www.rfc-editor.org/info/rfc8916で入手できます。
Copyright Notice
著作権表示
Copyright (c) 2020 IETF Trust and the persons identified as the document authors. All rights reserved.
Copyright(C)2020 IETFの信頼と文書著者として識別された人。全著作権所有。
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
このドキュメントは、このドキュメントの発行日に有効なBCP 78およびIETFドキュメントに関連するIETFトラストの法的規定(https://trustee.ietf.org/license-info)の対象となります。 これらのドキュメントは、このドキュメントに関するお客様の権利と制限について説明しているため、注意深く確認してください。 このドキュメントから抽出されたコードコンポーネントには、Trust LegalProvisionsのセクション4.eで説明されているSimplifiedBSD Licenseテキストが含まれている必要があり、Simplified BSDLicenseで説明されているように保証なしで提供されます。
Table of Contents
目次
1. Introduction 1.1. Terminology 1.2. Conventions Used in This Document 1.3. Tree Diagrams 1.4. Prefixes in Data Node Names 2. Design of the Data Model 2.1. Scope of Model 2.2. Specification 3. Module Structure 3.1. MSDP Configuration 3.2. MSDP States 4. MSDP YANG Data Model 5. Security Considerations 6. IANA Considerations 7. References 7.1. Normative References 7.2. Informative References Appendix A. Data Tree Example A.1. The Global and Peer Configuration Example A.2. The State Example A.3. The Actions Example Acknowledgements Contributors Authors' Addresses
[RFC3618] introduces the protocol definition of the Multicast Source Discovery Protocol (MSDP). This document defines a YANG data model that can be used to configure and manage MSDP protocol operations. The operational state data and statistics can also be retrieved by this model.
[RFC3618]マルチキャストソース検出プロトコル(MSDP)のプロトコル定義を紹介します。このドキュメントは、MSDPプロトコル操作の設定と管理に使用できるYANDデータモデルを定義します。運用状態データと統計情報はこのモデルによって検索することができます。
This model is designed to be used along with other multicast YANG data models such as PIM [PIM-YANG], which are not covered in this document.
このモデルは、この文書ではカバーされていないPIM [Pim-Yang]などの他のマルチキャストYangデータモデルと一緒に使用されるように設計されています。
The terminology for describing YANG data models is found in [RFC6020] and [RFC7950], including:
Yangデータモデルを記述するための用語は、[RFC6020]と[RFC7950]にあります。
* action
* アクション
* augment
* 増強
* choice
* 選択
* container
* コンテナ
* data model
* データ・モデル
* data node
* データノード
* grouping
* グループ化
* identity
* 身元
* leaf
* 葉
* list
* リスト
* module
* モジュール
* uses
* 併用します
The following abbreviations are used in this document and the defined model:
この文書では、次の略語が使用されています。
MSDP: Multicast Source Discovery Protocol [RFC3618]
MSDP:マルチキャストソース検出プロトコル[RFC3618]
RP: Rendezvous Point [RFC7761]
RP:ランデブーポイント[RFC7761]
RPF: Reverse Path Forwarding [RFC7761]
RPF:リバースパス転送[RFC7761]
SA: Source-Active [RFC3618]
SA:ソースアクティブ[RFC3618]
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.
この文書のキーワード "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", および "OPTIONAL" はBCP 14 [RFC2119] [RFC8174]で説明されているように、すべて大文字の場合にのみ解釈されます。
Tree diagrams used in this document follow the notation defined in [RFC8340].
この文書で使用されているツリー図は、[RFC8340]で定義されている表記法に従います。
In this document, names of data nodes, actions, and other data model objects are often used without a prefix, as long as it is clear from the context in which YANG module each name is defined. Otherwise, names are prefixed using the standard prefix associated with the corresponding YANG module, as shown in Table 1.
この文書では、YANGモジュールが定義されているコンテキストから明らかな限り、データノード、アクション、およびその他のデータモデルオブジェクトの名前がプレフィックスなしで使用されることがよくあります。それ以外の場合、表1に示すように、名前は対応するYANGモジュールに関連付けられている標準の接頭辞を使用して接頭辞されています。
+===========+==========================+===========+ | Prefix | YANG module | Reference | +===========+==========================+===========+ | yang | ietf-yang-types | [RFC6991] | +-----------+--------------------------+-----------+ | inet | ietf-inet-types | [RFC6991] | +-----------+--------------------------+-----------+ | rt | ietf-routing | [RFC8349] | +-----------+--------------------------+-----------+ | if | ietf-interfaces | [RFC8343] | +-----------+--------------------------+-----------+ | ip | ietf-ip | [RFC8344] | +-----------+--------------------------+-----------+ | key-chain | ietf-key-chain | [RFC8177] | +-----------+--------------------------+-----------+ | rt-types | ietf-routing-types | [RFC8294] | +-----------+--------------------------+-----------+ | acl | ietf-access-control-list | [RFC8519] | +-----------+--------------------------+-----------+
Table 1
表1
The model covers MSDP [RFC3618].
モデルはMSDP [RFC3618]をカバーしています。
This model can be used to configure and manage MSDP protocol operations. The operational state data and statistics can be retrieved by this model. Even though no protocol-specific notifications are defined in this model, the subscription and push mechanisms, as defined in [RFC8639] and [RFC8641], can be implemented by the user to subscribe to notifications on the data nodes in this model.
このモデルは、MSDPプロトコル操作を構成および管理するために使用できます。運用状態データと統計はこのモデルによって取得できます。このモデルでプロトコル固有の通知が定義されていなくても、[RFC8639]および[RFC8641]で定義されているサブスクリプションおよびプッシュメカニズムは、このモデルのデータノード上の通知を購読するためにユーザーによって実装できます。
The model contains all the basic configuration parameters to operate the protocol. Depending on the implementation choices, some systems may not allow some of the advanced parameters to be configurable. The occasionally implemented parameters are modeled as optional features in this model. This model can be extended, and it has been structured in a way that such extensions can be conveniently made.
このモデルには、プロトコルを操作するためのすべての基本構成パラメータが含まれています。実装の選択に応じて、いくつかのシステムがいくつかの高度なパラメータを設定可能にすることはできません。時折実装されたパラメータは、このモデルのオプション機能としてモデル化されています。このモデルは延長することができ、そのような拡張を便利にすることができるように構成されています。
The configuration data nodes cover global configuration attributes and per-peer configuration attributes. The state data nodes include global, per-peer, and SA information. The container "msdp" is the top-level container in this data model. The presence of this container is expected to enable MSDP protocol functionality. No notification is defined in this model.
構成データノードは、グローバル構成属性とピアごとの設定属性をカバーします。状態データノードは、グローバル、ピアごと、およびSA情報を含む。コンテナ「MSDP」は、このデータモデルの最上位コンテナです。このコンテナの存在は、MSDPプロトコル機能を有効にすると予想されます。このモデルでは通知は定義されていません。
This model imports and augments the "ietf-routing" YANG data model defined in [RFC8349]. Both configuration data nodes and state data nodes as mentioned in [RFC8349] are augmented.
このモデルは、[RFC8349]で定義されている「IETF-routing」Yangデータモデルをインポートおよび増強します。[RFC8349]で述べた構成データノードと状態データノードは両方とも拡張されています。
The YANG data model defined in this document conforms to the Network Management Datastore Architecture (NMDA) [RFC8342]. The operational state data is combined with the associated configuration data in the same hierarchy [RFC8407].
この文書で定義されているYangデータモデルは、ネットワーク管理データストアアーキテクチャ(NMDA)[RFC8342]に準拠しています。運用状態データは、同じ階層[RFC8407]内の関連する設定データと組み合わされます。
module: ietf-msdp augment /rt:routing/rt:control-plane-protocols /rt:control-plane-protocol: +--rw msdp +--rw global | +--rw tcp-connection-source? if:interface-ref | +--rw default-peer* [peer-addr prefix-policy] {filter-policy}? | | +--rw peer-addr -> ../../../peers/peer/address | | +--rw prefix-policy -> /acl:acls/acl/name | +--rw originating-rp | | +--rw interface? if:interface-ref | +--rw sa-filter | | +--rw in? -> /acl:acls/acl/name | | +--rw out? -> /acl:acls/acl/name | +--rw sa-limit? uint32 | +--rw ttl-threshold? uint8 +--rw peers | +--rw peer* [address] | +--rw address inet:ipv4-address | +---x clear-peer | +--rw authentication {peer-authentication}? | | +--rw (authentication-type)? | | +--:(key-chain) | | | +--rw key-chain? key-chain:key-chain-ref | | +--:(password) | | +--rw key? string | | +--rw crypto-algorithm? identityref | +--rw enabled? boolean | +--rw tcp-connection-source? if:interface-ref | +--rw description? string | +--rw mesh-group? string | +--rw peer-as? inet:as-number {peer-as-verification}? | +--rw sa-filter | | +--rw in? -> /acl:acls/acl/name | | +--rw out? -> /acl:acls/acl/name | +--rw sa-limit? uint32 | +--rw timer | | +--rw connect-retry-interval? uint16 | | +--rw holdtime-interval? uint16 | | +--rw keepalive-interval? uint16 | +--rw ttl-threshold? uint8 | +--ro session-state? enumeration | +--ro elapsed-time? yang:gauge32 | +--ro connect-retry-expire? uint32 | +--ro hold-expire? uint16 | +--ro is-default-peer? boolean | +--ro keepalive-expire? uint16 | +--ro reset-count? yang:zero-based-counter32 | +--ro statistics | +--ro discontinuity-time? yang:date-and-time | +--ro error | | +--ro rpf-failure? uint32 | +--ro queue | | +--ro size-in? uint32 | | +--ro size-out? uint32 | +--ro received | | +--ro keepalive? yang:counter64 | | +--ro notification? yang:counter64 | | +--ro sa-message? yang:counter64 | | +--ro sa-response? yang:counter64 | | +--ro sa-request? yang:counter64 | | +--ro total? yang:counter64 | +--ro sent | +--ro keepalive? yang:counter64 | +--ro notification? yang:counter64 | +--ro sa-message? yang:counter64 | +--ro sa-response? yang:counter64 | +--ro sa-request? yang:counter64 | +--ro total? yang:counter64 +---x clear-all-peers +--ro sa-cache +--ro entry* [group source-addr] | +--ro group rt-types:ipv4-multicast-group-address | +--ro source-addr rt-types:ipv4-multicast-source-address | +--ro origin-rp* [rp-address] | | +--ro rp-address inet:ipv4-address | | +--ro is-local-rp? boolean | | +--ro sa-adv-expire? uint32 | +--ro state-attributes | +--ro up-time? yang:gauge32 | +--ro expire? yang:gauge32 | +--ro holddown-interval? uint32 | +--ro peer-learned-from? inet:ipv4-address | +--ro rpf-peer? inet:ipv4-address +---x clear +---w input +---w entry! | +---w group rt-types:ipv4-multicast-group-address | +---w source-addr? rt-types:ipv4-multicast-source-address +---w peer-address? inet:ipv4-address +---w peer-as? inet:as-number
MSDP operation requires configuration information that is distributed amongst several peers. Several peers may be configured in a mesh-group. The SA information may be filtered by peers.
MSDP操作には、いくつかのピアの間で配布されている構成情報が必要です。いくつかのピアはメッシュグループで構成できます。SA情報はピアによってフィルタリングされてもよい。
The configuration modeling branch is composed of MSDP global and peer configurations. These two parts are the most important parts of MSDP.
構成モデリングブランチは、MSDPグローバルとピア構成で構成されています。これら2つの部分はMSDPの最も重要な部分です。
Besides the fundamental features of MSDP, several optional features are included in the model. These features help the control of MSDP. The peer features and SA features make the deployment and control easier. The connection parameters can be used to control the TCP connection because MSDP is based on TCP. The authentication features make the protocol more secure. The filter features selectively allow operators to prevent SA information from being forwarded to peers.
MSDPの基本的な機能に加えて、モデルにはいくつかのオプション機能が含まれています。これらの機能はMSDPの制御を助けます。ピア機能とSAの機能により、展開と制御が簡単になります。MSDPはTCPに基づくため、接続パラメータを使用してTCP接続を制御できます。認証機能により、プロトコルをより安全にします。フィルタ機能により、演算子がSA情報がピアに転送されるのを防ぐことができます。
MSDP states are composed of the MSDP global state, the MSDP peer state, statistics information, and SA cache information. The statistics information and SA cache information help the operator retrieve data regarding the protocol's condition.
MSDP状態は、MSDPグローバル状態、MSDPピア状態、統計情報、およびSAキャッシュ情報で構成されています。統計情報とSAキャッシュ情報は、オペレータがプロトコルの状態に関するデータを取得するのに役立ちます。
YANG actions are defined to clear the connection of one specific MSDP peer, clear the connections of all MSDP peers, or clear some or all of the SA caches.
Yangのアクションは、特定のMSDPピアの接続をクリアし、すべてのMSDPピアの接続をクリアするか、SAキャッシュの一部または全部を消去するように定義されています。
This module references [RFC3618], [RFC4271], [RFC5925], [RFC6991], [RFC7761], [RFC8177], [RFC8294], [RFC8343], [RFC8344], [RFC8349], and [RFC8519].
このモジュールは、[RFC3618]、[RFC5925]、[RFC6991]、[RFC6991]、[RFC8177]、[RFC8294]、[RFC8344]、[RFC8349]、[RFC8519]、[RFC8344]、[RFC8344]、[RFC8344]。
<CODE BEGINS> file "ietf-msdp@2020-10-31.yang" module ietf-msdp {
yang-version 1.1;
ヤンバージョン1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-msdp"; prefix msdp;
import ietf-yang-types { prefix "yang"; reference "RFC 6991: Common YANG Data Types"; }
import ietf-inet-types { prefix "inet"; reference "RFC 6991: Common YANG Data Types"; }
import ietf-routing { prefix "rt"; reference "RFC 8349: A YANG Data Model for Routing Management (NMDA Version)"; }
import ietf-interfaces { prefix "if"; reference "RFC 8343: A YANG Data Model for Interface Management"; }
import ietf-ip { prefix "ip"; reference "RFC 8344: A YANG Data Model for IP Management"; }
import ietf-key-chain { prefix "key-chain"; reference "RFC 8177: YANG Data Model for Key Chains"; }
import ietf-routing-types { prefix "rt-types"; reference "RFC 8294: Common YANG Data Types for the Routing Area"; }
import ietf-access-control-list { prefix acl; reference "RFC 8519: YANG Data Model for Network Access Control Lists (ACLs)"; }
organization "IETF Protocols for IP Multicast (pim) Working Group";
組織「IPマルチキャスト(PIM)ワーキンググループのためのIETFプロトコル」;
contact "WG Web: <https://datatracker.ietf.org/wg/pim/> WG List: <mailto:pim@ietf.org>
Editor: Xufeng Liu <mailto:xufeng.liu.ietf@gmail.com>
Editor: Zheng Zhang <mailto:zhang.zheng@zte.com.cn>
Editor: Anish Peter <mailto:anish.ietf@gmail.com>
Editor: Mahesh Sivakumar <mailto:sivakumar.mahesh@gmail.com>
Editor: Feng Guo <mailto:guofeng@huawei.com>
Editor: Pete McAllister <mailto:pete.mcallister@metaswitch.com>";
description "This module defines the YANG data model definitions for the Multicast Source Discovery Protocol (MSDP).
"このモジュールは、マルチキャストソース検出プロトコル(MSDP)のYANDデータモデル定義を定義します。
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document are to be interpreted as described in BCP 14 (RFC 2119) (RFC 8174) when, and only when, they appear in all capitals, as shown here.
キーワードは「必須」、「必須」、「shall」、「shall '、'は '、'は '、'推奨 '、'推奨されていない '、' may '、'任意のものではありません。'この文書では、ここに示すように、BCP 14(RFC 2119)(RFC 8174)に記載されているように解釈されるべきです。
Copyright (c) 2020 IETF Trust and the persons identified as authors of the code. All rights reserved.
Copyright(C)2020 IETF信頼とコードの著者として識別された人。全著作権所有。
Redistribution and use in source and binary forms, with or without modification, is permitted pursuant to, and subject to the license terms contained in, the Simplified BSD License set forth in Section 4.c of the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info).
修正の有無にかかわらず、ソースおよびバイナリ形式での再配布と使用は、IETF文書に関連するIETF信託の法的規定のセクション4.Cに記載されている単純化されたBSDライセンスに従い、身に付けられたライセンス条項に従って許可されています(https://trustee.ietf.org/License-info)。
This version of this YANG module is part of RFC 8916; see the RFC itself for full legal notices.";
このYangモジュールのこのバージョンはRFC 8916の一部です。完全な法的通知のためのRFC自体を見てください。」
revision 2020-10-31 { description "Initial revision."; reference "RFC 8916: A YANG Data Model for the Multicast Source Discovery Protocol (MSDP)"; }
/* * Features */
feature filter-policy { description "Support policy configuration of peer/message filtering."; reference "RFC 8519: YANG Data Model for Network Access Control Lists (ACLs)"; }
feature peer-as-verification { description "Support configuration of a peer's Autonomous System Number (ASN)."; reference "RFC 4271: A Border Gateway Protocol 4 (BGP-4)"; }
feature peer-authentication { description "Support configuration of peer authentication."; reference "RFC 8177: YANG Data Model for Key Chains"; }
/* * Identities */
identity msdp { base rt:control-plane-protocol; description "Identity for the Multicast Source Discovery Protocol (MSDP)."; reference "RFC 3618: Multicast Source Discovery Protocol (MSDP)"; }
/* * Groupings */ grouping authentication-container { description "Authentication attributes."; container authentication { if-feature peer-authentication; description "A container defining authentication attributes."; choice authentication-type { case key-chain { leaf key-chain { type key-chain:key-chain-ref; description "Reference to a key-chain."; reference "RFC 8177: YANG Data Model for Key Chains"; } } case password { leaf key { type string; description "This leaf specifies the authentication key."; } leaf crypto-algorithm { type identityref { base key-chain:crypto-algorithm; } must "derived-from-or-self(., 'key-chain:md5')" { error-message "Only the md5 algorithm can be used for MSDP."; description "Check for crypto-algorithm."; } description "Cryptographic algorithm associated with a key. Only the md5 algorithm can be used for MSDP. When 'md5' is specified, MSDP control messages are secured by TCP MD5 signatures as described in RFCs 3618 and 5925. Both peers of a connection SHOULD be configured to the same algorithm for the connection to be established. When this leaf is not configured, unauthenticated TCP is used."; reference "RFC 3618: Multicast Source Discovery Protocol (MSDP) RFC 5925: The TCP Authentication Option RFC 8177: YANG Data Model for Key Chains"; } } description "Choice of authentication."; } } } // authentication-container
grouping tcp-connect-source { description "Attribute to configure a peer TCP connection source."; leaf tcp-connection-source { type if:interface-ref; must "/if:interfaces/if:interface[if:name = current()]/" + "ip:ipv4/ip:enabled != 'false'" { error-message "The interface must have IPv4 enabled."; description "The interface must have IPv4 enabled."; reference "RFC 8343: A YANG Data Model for Interface Management"; } description "The interface is to be the source for the TCP connection. It is a reference to an entry in the global interface list."; } } // tcp-connect-source
grouping global-config-attributes { description "Global MSDP configuration.";
uses tcp-connect-source;
tcp-connect-sourceを使用します。
list default-peer { if-feature filter-policy; key "peer-addr prefix-policy";
description "The default peer accepts all MSDP Source-Active (SA) messages. A default peer is needed in topologies where MSDP peers do not coexist with BGP peers. The Reverse Path Forwarding (RPF) check on SA messages will fail, and no SA messages will be accepted. In these cases, you can configure the peer as a default peer and bypass RPF checks.";
説明 "デフォルトのピアはすべてのMSDPソースアクティブ(SA)メッセージを受け入れます。MSDPピアがBGPピアと共存しないトポロジではデフォルトのピアが必要です。SAメッセージのリバースパスフォワーディング(RPF)チェックは失敗し、SAは失敗します。メッセージは受け入れられます。このような場合は、ピアをデフォルトのピアとして設定し、RPFチェックをバイパスすることができます。 "
leaf peer-addr { type leafref { path "../../../peers/peer/address"; } mandatory true; description "Reference to a peer that is in the peer list."; } leaf prefix-policy { type leafref { path "/acl:acls/acl:acl/acl:name"; } description "If specified, only those SA entries whose Rendezvous Point (RP) is permitted in the prefix list are allowed; if not specified, all SA messages from the default peer are accepted."; reference "RFC 7761: Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised) RFC 8519: YANG Data Model for Network Access Control Lists (ACLs)"; } } // default-peer
container originating-rp { description "The container of the originating RP."; leaf interface { type if:interface-ref; must "/if:interfaces/if:interface[if:name = current()]/" + "ip:ipv4/ip:enabled != 'false'" { error-message "The interface must have IPv4 enabled."; description "The interface must have IPv4 enabled."; reference "RFC 8343: A YANG Data Model for Interface Management"; } description "Reference to an entry in the global interface list. The IP address of the interface used in the RP field of an SA message entry. When anycast RPs are used, all RPs use the same IP address. This parameter can be used to define a unique IP address for the RP of each MSDP peer. By default, the software uses the RP address of the local system."; } } // originating-rp
uses sa-filter-container;
SAフィルタコンテナを使用します。
leaf sa-limit { type uint32; description "A limit on the number of SA entries accepted. If not configured or the value is 0, there is no limit."; } uses ttl-threshold; } // global-config-attributes
grouping peer-config-attributes { description "Per-peer configuration for MSDP.";
uses authentication-container; leaf enabled { type boolean; description "'true' if the peer is enabled; 'false' if the peer is disabled."; } uses tcp-connect-source;
leaf description { type string; description "The peer description."; } leaf mesh-group { type string; description "The name of the mesh-group to which this peer belongs."; reference "RFC 3618: Multicast Source Discovery Protocol (MSDP), Section 10.2"; } leaf peer-as { if-feature peer-as-verification; type inet:as-number; description "The peer's ASN. Using peer-as to perform the verification can provide more controlled ability. The value can be compared with the BGP peer's ASN. If they are different, the SA information that comes from this peer may be rejected. If the ASN is the same as the local ASN, then the peer is within the same domain; otherwise, this peer is external to the domain. This is comparable to the definition and usage in BGP; see RFC 4271."; reference "RFC 4271: A Border Gateway Protocol 4 (BGP-4)"; } uses sa-filter-container; leaf sa-limit { type uint32; description "A limit on the number of SA entries accepted from this peer. If not configured or the value is 0, there is no limit."; } container timer { description "Timer attributes."; reference "RFC 3618: Multicast Source Discovery Protocol (MSDP), Section 5"; leaf connect-retry-interval { type uint16; units seconds; default 30; description "The peer timer for connect-retry. By default, MSDP peers wait 30 seconds after the session is reset."; } leaf holdtime-interval { type uint16 { range "3..65535"; } units seconds; default 75; description "The SA hold-down period of this MSDP peer."; } leaf keepalive-interval { type uint16 { range "1..65535"; } units seconds; must '. < ../holdtime-interval' { error-message "The keepalive interval must be smaller than the " + "hold-time interval."; } default 60; description "The keepalive timer of this MSDP peer."; } } // timer uses ttl-threshold; } // peer-config-attributes
grouping peer-state-attributes { description "Per-peer state attributes for MSDP.";
leaf session-state { type enumeration { enum disabled { description "Disabled."; } enum inactive { description "Inactive."; } enum listen { description "Listen."; } enum connecting { description "Connecting."; } enum established { description "Established."; } } config false; description "The peer's session state."; reference "RFC 3618: Multicast Source Discovery Protocol (MSDP), Section 11"; } leaf elapsed-time { type yang:gauge32; units seconds; config false; description "Elapsed time for being in a state."; } leaf connect-retry-expire { type uint32; units seconds; config false; description "Connect retry expire time of a peer connection."; } leaf hold-expire { type uint16; units seconds; config false; description "Hold expire time of a peer connection."; } leaf is-default-peer { type boolean; config false; description "'true' if this peer is one of the default peers."; } leaf keepalive-expire { type uint16; units seconds; config false; description "Keepalive expire time of this peer."; } leaf reset-count { type yang:zero-based-counter32; config false; description "The reset count of this peer."; }
container statistics { config false; description "A container defining statistics attributes.";
leaf discontinuity-time { type yang:date-and-time; description "The time on the most recent occasion at which any one or more of the statistics counters suffered a discontinuity. If no such discontinuities have occurred since the last re-initialization of the local management subsystem, then this node contains the time the local management subsystem re-initialized itself."; }
container error { description "A grouping defining error statistics attributes."; leaf rpf-failure { type uint32; description "The number of RPF failures."; } }
container queue { description "A container that includes queue statistics attributes."; leaf size-in { type uint32; description "The number of messages received from the peer currently queued."; } leaf size-out { type uint32; description "The number of messages queued to be sent to the peer."; } }
container received { description "Received message counters."; uses statistics-sent-received; } container sent { description "Sent message counters."; uses statistics-sent-received; } } // statistics } // peer-state-attributes
grouping sa-filter-container { description "A container defining SA filters."; container sa-filter { description "Specifies an Access Control List (ACL) to filter SA messages coming into or going out of the peer."; leaf in { type leafref { path "/acl:acls/acl:acl/acl:name"; } description "Filters incoming SA messages only. The value is the name to uniquely identify a policy that contains one or more rules used to accept or reject MSDP SA messages. If the policy is not specified, all MSDP SA messages are accepted."; reference "RFC 8519: YANG Data Model for Network Access Control Lists (ACLs)"; } leaf out { type leafref { path "/acl:acls/acl:acl/acl:name"; } description "Filters outgoing SA messages only. The value is the name to uniquely identify a policy that contains one or more rules used to accept or reject MSDP SA messages. If the policy is not specified, all MSDP SA messages are sent."; reference "RFC 8519: YANG Data Model for Network Access Control Lists (ACLs)"; } } // sa-filter } // sa-filter-container
grouping ttl-threshold { description "Attribute to configure the TTL threshold."; leaf ttl-threshold { type uint8 { range 1..255; } description "The maximum number of hops data packets can traverse before being dropped."; } } // ttl-threshold
grouping statistics-sent-received { description "A grouping defining sent and received statistics attributes."; leaf keepalive { type yang:counter64; description "The number of keepalive messages."; } leaf notification { type yang:counter64; description "The number of notification messages."; } leaf sa-message { type yang:counter64; description "The number of SA messages."; } leaf sa-response { type yang:counter64; description "The number of SA response messages."; } leaf sa-request { type yang:counter64; description "The number of SA request messages."; } leaf total { type yang:counter64; description "The number of total messages."; } } // statistics-sent-received
/* * Data nodes */ augment "/rt:routing/rt:control-plane-protocols/" + "rt:control-plane-protocol" { when "derived-from-or-self(rt:type, 'msdp:msdp')" { description "This augmentation is only valid for a routing protocol instance of MSDP."; } description "MSDP augmentation to routing control-plane protocol configuration and state."; container msdp { description "MSDP configuration and operational state data.";
container global { description "Global attributes."; uses global-config-attributes; }
container peers { description "Contains a list of peers."; list peer { key "address"; description "A list of MSDP peers."; leaf address { type inet:ipv4-address; description "The address of the peer."; } action clear-peer { description "Clears the TCP connection to the peer."; } uses peer-config-attributes; uses peer-state-attributes; } }
action clear-all-peers { description "All peers' TCP connections are cleared."; }
container sa-cache { config false; description "The SA cache information."; list entry { key "group source-addr"; description "A list of SA cache entries."; leaf group { type rt-types:ipv4-multicast-group-address; description "The group address of this SA cache."; } leaf source-addr { type rt-types:ipv4-multicast-source-address; description "Source IPv4 address."; } list origin-rp { key "rp-address"; description "Information regarding the originating RP."; leaf rp-address { type inet:ipv4-address; description "The RP address. This is the IP address used in the RP field of an SA message entry."; } leaf is-local-rp { type boolean; description "'true' if the RP is local; 'false' if the RP is not local."; } leaf sa-adv-expire { type uint32; units seconds; description "The remaining time duration before expiration of the periodic SA advertisement timer on a local RP."; } }
container state-attributes { description "SA cache state attributes for MSDP.";
leaf up-time { type yang:gauge32; units seconds; description "Indicates the duration time when this SA entry is created in the cache. MSDP is a periodic protocol; the value can be used to check the state of the SA cache."; } leaf expire { type yang:gauge32; units seconds; description "Indicates the duration time when this SA entry in the cache times out. MSDP is a periodic protocol; the value can be used to check the state of the SA cache."; } leaf holddown-interval { type uint32; units seconds; description "Hold-down timer value for SA forwarding."; reference "RFC 3618: Multicast Source Discovery Protocol (MSDP), Section 5.3"; } leaf peer-learned-from { type inet:ipv4-address; description "The address of the peer from which we learned this SA information."; } leaf rpf-peer { type inet:ipv4-address; description "The address is the SA's originating RP."; } } // state-attributes } // entry
action clear { description "Clears MSDP SA cache entries."; input { container entry { presence "If a particular entry is cleared."; description "The SA cache (S,G) or (*,G) entry to be cleared. If this is not provided, all entries are cleared."; leaf group { type rt-types:ipv4-multicast-group-address; mandatory true; description "The group address."; } leaf source-addr { type rt-types:ipv4-multicast-source-address; description "The address of the multicast source to be cleared. If this is not provided, then all entries related to the given group are cleared."; } } leaf peer-address { type inet:ipv4-address; description "The peer IP address from which MSDP SA cache entries have been learned. If this is not provided, entries learned from all peers are cleared."; } leaf peer-as { type inet:as-number; description "The ASN from which MSDP SA cache entries have been learned. If this is not provided, entries learned from all ASes are cleared."; } } } // clear } // sa-cache } // msdp } // augment } <CODE ENDS>
The YANG module specified in this document defines a schema for data that is designed to be accessed via network management protocols such as NETCONF [RFC6241] or RESTCONF [RFC8040]. The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) [RFC6242]. The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS [RFC8446].
このドキュメントで指定されたYANGモジュールは、NetConf [RFC6241]またはRESTCONF [RFC8040]などのネットワーク管理プロトコルを介してアクセスするように設計されているデータのスキーマを定義しています。最低のNetConfレイヤーはセキュアトランスポート層で、必須の実装セキュアトランスポートはSecure Shell(SSH)[RFC6242]です。最低のRETCONFレイヤーはhttpsで、必須のセキュアトランスポートはTLS [RFC8446]です。
The Network Configuration Access Control Model (NACM) [RFC8341] provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.
ネットワーク構成アクセス制御モデル(NACM)[RFC8341]は、特定のNETCONFまたはRESTCONFユーザへのアクセスを制限する手段を、利用可能なすべてのNetConfまたはRESTCONFプロトコル操作およびコンテンツの事前設定されたサブセットに制限することを可能にします。
There are a number of data nodes defined in this YANG module that are writable/creatable/deletable (i.e., config true, which is the default). These data nodes may be considered sensitive or vulnerable in some network environments. Write operations (e.g., edit-config) to these data nodes without proper protection can have a negative effect on network operations. These are the subtrees and data nodes and their sensitivity/vulnerability:
このYANGモジュールで定義されているデータノードは、書き込み可能/作成可能/削除可能な(すなわち、デフォルトであるConfig True)。これらのデータノードは、一部のネットワーク環境では敏感または脆弱と見なすことができます。適切な保護なしにこれらのデータノードへの書き込み操作(例えば、edit-config)は、ネットワーク操作に悪影響を及ぼす可能性があります。これらはサブツリーとデータノードとその感度/脆弱性です。
Under /rt:routing/rt:control-plane-protocols/msdp:
/ RT:ルーティング/ RT:Control-Plane-Protocols / MSDP:
msdp:global
MSDP:Global.
This subtree specifies the configuration for the MSDP attributes at the global level. Modifying the configuration can cause MSDP default peers to be deleted or the connection to be rebuilt and can also cause unexpected filtering of the SA.
このサブツリーは、グローバルレベルでのMSDP属性の設定を指定します。構成を変更すると、MSDPのデフォルトピアを削除するか、接続を再構築することもでき、SAの予期せぬフィルタリングを引き起こす可能性があります。
msdp:peers
MSDP:ピアー
This subtree specifies the configuration for the MSDP attributes at the peer level. Modifying the configuration will allow unexpected MSDP peer establishment and unexpected SA information learning and advertisement.
このサブツリーは、ピアレベルのMSDP属性の設定を指定します。構成を変更すると、予期しないMSDPピア設立と予期しないSA情報学習と広告が可能になります。
The writability of the "key" field should be strictly controlled. Misoperation of the key will break the existing MSDP connection, and the associated SA caches will also be deleted.
「キー」フィールドの書き込み可能性は厳密に制御されるべきです。キーの誤操作は既存のMSDP接続を分割し、関連するSAキャッシュも削除されます。
Some of the readable data nodes in this YANG module may be considered sensitive or vulnerable in some network environments. It is thus important to control read access (e.g., via get, get-config, or notification) to these data nodes. These are the subtrees and data nodes and their sensitivity/vulnerability:
このYangモジュールの読み取り可能なデータノードのいくつかは、いくつかのネットワーク環境では敏感または脆弱と見なされ得る。したがって、これらのデータノードへの読み取りアクセス(例えば、get、get - config、または通知)を制御することが重要である。これらはサブツリーとデータノードとその感度/脆弱性です。
/rt:routing/rt:control-plane-protocols/msdp:
/ RT:ルーティング/ RT:Control-Plane-Protocols / MSDP:
Unauthorized access to any data node of the above subtree can disclose the operational state information of MSDP on this device. For example, disclosure of the peer information may lead to a forged connection attack, and uncorrected modification of the ACL nodes may lead to filter errors.
上記のサブツリーの任意のデータノードへの不正アクセスは、この装置上のMSDPの動作状態情報を開示することができる。例えば、ピア情報の開示は鍛造接続攻撃につながり、ACLノードの修正されていない修正はフィルタエラーをもたらし得る。
The "key" field is also a sensitive readable configuration. Unauthorized reading of this field may lead to leaking of the password. Modification will allow the unexpected rebuilding of connected peers.
「鍵」フィールドも機密可読設定です。このフィールドの不正な読み取りは、パスワードの漏洩につながる可能性があります。変更は、接続されているピアの予期しない再構築を可能にします。
Authentication configuration is supported via the specification of key-chains [RFC8177] or the direct specification of the key and the authentication algorithm. Hence, authentication configuration in the "authentication" container inherits the security considerations discussed in [RFC8177]. This includes the considerations with respect to the local storage and handling of authentication keys.
認証設定は、キーチェーン[RFC8177]の仕様またはキーの直接指定と認証アルゴリズムを介してサポートされています。したがって、「認証」コンテナの認証構成は、[RFC8177]で説明したセキュリティ上の考慮事項を継承します。これには、認証キーのローカルストレージと処理に関する考慮事項が含まれます。
Some of the RPC operations in this YANG module may be considered sensitive or vulnerable in some network environments. It is thus important to control access to these operations. These are the operations and their sensitivity/vulnerability:
このYangモジュールのRPC操作のいくつかは、一部のネットワーク環境では敏感または脆弱と見なすことができます。したがって、これらの操作へのアクセスを制御することが重要です。これらは操作とその感度/脆弱性です。
/rt:routing/rt:control-plane-protocols/msdp:clear-peer
/rt:routing/rt:control-plane-protocols/msdp:clear-sa-cache
Unauthorized access to either of the above action operations can lead to rebuilding of the MSDP peers' connections or deletion of SA records on this device.
上記の操作操作のいずれかへの不正アクセスは、MSDPピアの接続またはこのデバイスのSAレコードの削除の再構築につながる可能性があります。
IANA has registered the following URI in the "ns" subregistry within the "IETF XML Registry" [RFC3688]:
IANAは、「IETF XMLレジストリ」(RFC3688]内の「NS」サブレイストに次のURIを登録しました。
URI: urn:ietf:params:xml:ns:yang:ietf-msdp Registrant Contact: The IESG. XML: N/A; the requested URI is an XML namespace.
URI:URN:IETF:Params:XML:NS:YANG:IETF-MSDP登録者連絡先:IESG。XML:n / a;要求されたURIはXMLネームスペースです。
IANA has registered the following YANG module in the "YANG Module Names" subregistry [RFC6020] within the "YANG Parameters" registry:
IANAは、「ヤンモジュール名」サブレジスト[RFC6020]に次のYangモジュールを「Yang Parameters」レジストリに登録しました。
Name: ietf-msdp Namespace: urn:ietf:params:xml:ns:yang:ietf-msdp Prefix: msdp Reference: RFC 8916
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, <https://www.rfc-editor.org/info/rfc2119>.
[RFC2119] BRADNER、S、「RFCSで使用するためのキーワード」、BCP 14、RFC 2119、DOI 10.17487 / RFC2119、1997年3月、<https://www.rfc-editor.org/info/RFC2119>。
[RFC3618] Fenner, B., Ed. and D. Meyer, Ed., "Multicast Source Discovery Protocol (MSDP)", RFC 3618, DOI 10.17487/RFC3618, October 2003, <https://www.rfc-editor.org/info/rfc3618>.
[RFC3618] Fenner、B、ED。D. Meyer、Ed。、「マルチキャストソース検出プロトコル(MSDP)」、RFC 3618、DOI 10.17487 / RFC3618、2003年10月、<https://www.rfc-editor.org/info/rfc3618>。
[RFC4271] Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A Border Gateway Protocol 4 (BGP-4)", RFC 4271, DOI 10.17487/RFC4271, January 2006, <https://www.rfc-editor.org/info/rfc4271>.
[RFC4271]、y、ed。、Li、T.、Ed。、S. Hares、Ed。、「ボーダーゲートウェイプロトコル4(BGP-4)」、RFC 4271、DOI 10.17487 / RFC4271、2006年1月<https://www.rfc-editor.org/info/rfc4271>。
[RFC5925] Touch, J., Mankin, A., and R. Bonica, "The TCP Authentication Option", RFC 5925, DOI 10.17487/RFC5925, June 2010, <https://www.rfc-editor.org/info/rfc5925>.
[RFC5925] Touch、J.、Mankin、A.、R.ボニカ、「TCP認証オプション」、RFC 5925、DOI 10.17487 / RFC5925、2010年6月、<https://www.rfc-editor.org/info/ RFC5925>。
[RFC6020] Bjorklund, M., Ed., "YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)", RFC 6020, DOI 10.17487/RFC6020, October 2010, <https://www.rfc-editor.org/info/rfc6020>.
[RFC6020] Bjorklund、M.、Ed。、「Yang - ネットワーク構成プロトコルのデータモデリング言語(NetConf)」、RFC 6020、DOI 10.17487 / RFC6020、2010年10月、<https://www.rfc-編集者。org / info / rfc6020>。
[RFC6241] Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed., and A. Bierman, Ed., "Network Configuration Protocol (NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011, <https://www.rfc-editor.org/info/rfc6241>.
[RFC6241]、R.Bjorklund、M.、Ed。、Schoenwaelder、J.、Ed。、およびA. Bierman、ED。、「ネットワーク構成プロトコル(NetConf)」、RFC 6241、DOI 10.17487 /RFC6241、2011年6月、<https://www.rfc-editor.org/info/rfc6241>。
[RFC6242] Wasserman, M., "Using the NETCONF Protocol over Secure Shell (SSH)", RFC 6242, DOI 10.17487/RFC6242, June 2011, <https://www.rfc-editor.org/info/rfc6242>.
[RFC6242] Wasserman、M.、「Secure Shell(SSH)のNetConfプロトコル(SSH)の使用(SSH)、RFC 6242、DOI 10.17487 / RFC6242、2011年6月、<https://www.rfc-editor.org/info/rfc6242>。
[RFC6991] Schoenwaelder, J., Ed., "Common YANG Data Types", RFC 6991, DOI 10.17487/RFC6991, July 2013, <https://www.rfc-editor.org/info/rfc6991>.
[RFC6991] Schoenwaelder、J.、Ed。、「共通ヤンデータ型」、RFC 6991、DOI 10.17487 / RFC6991、2013年7月、<https://www.rfc-editor.org/info/rfc6991>。
[RFC7950] Bjorklund, M., Ed., "The YANG 1.1 Data Modeling Language", RFC 7950, DOI 10.17487/RFC7950, August 2016, <https://www.rfc-editor.org/info/rfc7950>.
[RFC7950] Bjorklund、M.、ED。、「Yang 1.1データモデリング言語」、RFC 7950、DOI 10.17487 / RFC7950、2016年8月、<https://www.rfc-editor.org/info/rfc7950>。
[RFC7951] Lhotka, L., "JSON Encoding of Data Modeled with YANG", RFC 7951, DOI 10.17487/RFC7951, August 2016, <https://www.rfc-editor.org/info/rfc7951>.
[RFC7951] Lhotka、L.、「Yangでモデル化されたデータのJSONエンコーディング」、RFC 7951、DOI 10.17487 / RFC7951、2016年8月、<https://www.rfc-editor.org/info/rfc7951>。
[RFC8040] Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF Protocol", RFC 8040, DOI 10.17487/RFC8040, January 2017, <https://www.rfc-editor.org/info/rfc8040>.
[RFC8040] Bierman、A.、Bjorklund、M.、K。Watsen、 "Restconf Protoction"、RFC 8040、DOI 10.17487 / RFC8040、2017年1月、<https://www.rfc-editor.org/info/rfc8040>。
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, <https://www.rfc-editor.org/info/rfc8174>.
[RFC8174] Leiba、B、「RFC 2119キーワードの大文字の曖昧さ」、BCP 14、RFC 8174、DOI 10.17487 / RFC8174、2017年5月、<https://www.rfc-editor.org/info/RFC8174>。
[RFC8177] Lindem, A., Ed., Qu, Y., Yeung, D., Chen, I., and J. Zhang, "YANG Data Model for Key Chains", RFC 8177, DOI 10.17487/RFC8177, June 2017, <https://www.rfc-editor.org/info/rfc8177>.
[RFC8177] Lindem、A.、ED。、QU、Y、Yeung、D.、Chang、I。、およびJ.Zhang、RFC 8177、DOI 10.17487 / RFC8177、2017年6月<https://www.rfc-editor.org/info/rfc8177>。
[RFC8294] Liu, X., Qu, Y., Lindem, A., Hopps, C., and L. Berger, "Common YANG Data Types for the Routing Area", RFC 8294, DOI 10.17487/RFC8294, December 2017, <https://www.rfc-editor.org/info/rfc8294>.
[RFC8294] Liu、X.、Qu、Y、Y、Lindem、A.、Hopps、C.、およびL. Berger、「ルーティングエリアのための一般的なヤンデータ型」、RFC 8294、DOI 10.17487 / RFC8294、2017年12月、<https://www.rfc-editor.org/info/rfc8294>。
[RFC8340] Bjorklund, M. and L. Berger, Ed., "YANG Tree Diagrams", BCP 215, RFC 8340, DOI 10.17487/RFC8340, March 2018, <https://www.rfc-editor.org/info/rfc8340>.
[RFC8340] Bjorklund、M.およびL. Berger、Ed。、「Yang Tree Diagress」、BCP 215、RFC 8340、DOI 10.17487 / RFC8340、2018年3月、<https://www.rfc-editor.org/info/RFC8340>。
[RFC8341] Bierman, A. and M. Bjorklund, "Network Configuration Access Control Model", STD 91, RFC 8341, DOI 10.17487/RFC8341, March 2018, <https://www.rfc-editor.org/info/rfc8341>.
[RFC8341] Bierman、A.およびM.Bjorklund、「ネットワーク構成アクセス制御モデル」、STD 91、RFC 8341、DOI 10.17487 / RFC8341、2018年3月、<https://www.rfc-editor.org/info/rfc8341>。
[RFC8342] Bjorklund, M., Schoenwaelder, J., Shafer, P., Watsen, K., and R. Wilton, "Network Management Datastore Architecture (NMDA)", RFC 8342, DOI 10.17487/RFC8342, March 2018, <https://www.rfc-editor.org/info/rfc8342>.
[RFC8342] Bjorklund、M.、Schoenwaelder、J.、Shafer、P.、Watsen、K.、R. Wilton、「ネットワーク管理データストアアーキテクチャ(NMDA)」、RFC 8342、DOI 10.17487 / RFC8342、2018年3月、<https://www.rfc-editor.org/info/rfc8342>。
[RFC8343] Bjorklund, M., "A YANG Data Model for Interface Management", RFC 8343, DOI 10.17487/RFC8343, March 2018, <https://www.rfc-editor.org/info/rfc8343>.
[RFC8343] Bjorklund、M.、「インタフェース管理のためのYangデータモデル」、RFC 8343、DOI 10.17487 / RFC8343、2018年3月、<https://www.rfc-editor.org/info/rfc8343>。
[RFC8344] Bjorklund, M., "A YANG Data Model for IP Management", RFC 8344, DOI 10.17487/RFC8344, March 2018, <https://www.rfc-editor.org/info/rfc8344>.
[RFC8344] Bjorklund、M.、「IP管理のためのYangデータモデル」、RFC 8344、DOI 10.17487 / RFC8344、2018年3月、<https://www.rfc-editor.org/info/rfc8344>。
[RFC8349] Lhotka, L., Lindem, A., and Y. Qu, "A YANG Data Model for Routing Management (NMDA Version)", RFC 8349, DOI 10.17487/RFC8349, March 2018, <https://www.rfc-editor.org/info/rfc8349>.
[RFC8349] Lhotka、Lindem、A.、およびY。QU、「ルーティング管理のためのYangデータモデル(NMDA版)」、RFC 8349、DOI 10.17487 / RFC8349、2018年3月、<https:// www。rfc-editor.org/info/rfc8349>。
[RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018, <https://www.rfc-editor.org/info/rfc8446>.
[RFC8446] RESCORLA、E.、「トランスポート層セキュリティ(TLS)プロトコルバージョン1.3」、RFC 8446、DOI 10.17487 / RFC8446、2018年8月、<https://www.rfc-editor.org/info/rfc8446>。
[RFC8519] Jethanandani, M., Agarwal, S., Huang, L., and D. Blair, "YANG Data Model for Network Access Control Lists (ACLs)", RFC 8519, DOI 10.17487/RFC8519, March 2019, <https://www.rfc-editor.org/info/rfc8519>.
[RFC8519] Jethanandani、M.、Agarwal、S.、Huang、L.、D.Bleair、「ネットワークアクセス制御リストのためのYangデータモデル(ACLS)」、RFC 8519、DOI 10.17487 / RFC8519、2019年3月、<HTTPS//www.rfc-editor.org/info/rfc8519>。
[PIM-YANG] Liu, X., McAllister, P., Peter, A., Sivakumar, M., Liu, Y., and F. Hu, "A YANG Data Model for Protocol Independent Multicast (PIM)", Work in Progress, Internet-Draft, draft-ietf-pim-yang-17, 19 May 2018, <https://tools.ietf.org/html/draft-ietf-pim-yang-17>.
[PIM-YANG] Liu、X.、McAllister、P.、Peter、A.、Sivakumar、M.、Liu、Y.、およびF. HU、「プロトコル独立マルチキャスト(PIM)のヤンデータモデル」、作業進行中、インターネットドラフト、Draft-IETF-PIM-YANG-17、2018年5月19日、<https://tools.ietf.org/html/draft-ietf-pim-yang-17>。
[RFC3688] Mealling, M., "The IETF XML Registry", BCP 81, RFC 3688, DOI 10.17487/RFC3688, January 2004, <https://www.rfc-editor.org/info/rfc3688>.
[RFC3688] Mealling、M.、 "The IETF XMLレジストリ"、BCP 81、RFC 3688、DOI 10.17487 / RFC3688、2004年1月、<https://www.rfc-editor.org/info/rfc3688>。
[RFC7761] Fenner, B., Handley, M., Holbrook, H., Kouvelas, I., Parekh, R., Zhang, Z., and L. Zheng, "Protocol Independent Multicast - Sparse Mode (PIM-SM): Protocol Specification (Revised)", STD 83, RFC 7761, DOI 10.17487/RFC7761, March 2016, <https://www.rfc-editor.org/info/rfc7761>.
[RFC7761] Fenner、B、Handley、M.、Holbrook、H.、Kouvelas、I。、Parekh、R.、Zhang、Z.、L.Zheng、 "プロトコル独立マルチキャスト - スパースモード(PIM-SM):プロトコル仕様(改訂) "、STD 83、RFC 7761、DOI 10.17487 / RFC7761、2016年3月、<https://www.rfc-editor.org/info/rfc7761>。
[RFC8407] Bierman, A., "Guidelines for Authors and Reviewers of Documents Containing YANG Data Models", BCP 216, RFC 8407, DOI 10.17487/RFC8407, October 2018, <https://www.rfc-editor.org/info/rfc8407>.
[RFC8407] Bierman、A。、「ヤンデータモデルを含む文書の査読者のためのガイドライン」、BCP 216、RFC 8407、DOI 10.17487 / RFC8407、2018年10月、<https://www.rfc-editor.org/info/ RFC8407>。
[RFC8639] Voit, E., Clemm, A., Gonzalez Prieto, A., Nilsen-Nygaard, E., and A. Tripathy, "Subscription to YANG Notifications", RFC 8639, DOI 10.17487/RFC8639, September 2019, <https://www.rfc-editor.org/info/rfc8639>.
[RFC8639] Voit、E.、Clemm、A.、Gonzalez Prieto、A.、Nilsen-Nygaard、E.、A. Tripathy、「Yang Notificationsの購読」、RFC 8639、DOI 10.17487 / RFC8639、2019年9月、<https://www.rfc-editor.org/info/rfc8639>。
[RFC8641] Clemm, A. and E. Voit, "Subscription to YANG Notifications for Datastore Updates", RFC 8641, DOI 10.17487/RFC8641, September 2019, <https://www.rfc-editor.org/info/rfc8641>.
[RFC8641] CLEMM、A.およびE. VOIT、「データストア更新のヤン通知への購読」、RFC 8641、DOI 10.17487 / RFC8641、2019年9月、<https://www.rfc-editor.org/info/rfc8641>。
This appendix contains an example of an instance data tree in JSON encoding [RFC7951], containing configuration data.
この付録には、コンフィギュレーションデータを含むJSONエンコード[RFC7951]のインスタンスデータツリーの例が含まれています。
{ "ietf-interfaces:interfaces": { "interface": [ { "name": "eth1", "description": "An interface with MSDP enabled.", "type": "iana-if-type:ethernetCsmacd", "ietf-ip:ipv4": { "forwarding": true, "address": [ { "ip": "192.0.2.1", "prefix-length": 24 } ] } } ] }, "ietf-access-control-list:acls": { "acl": [ { "name": "msdp-default-peer-policy", "type": "ietf-access-control-list:ipv4-acl-type", "aces": { "ace": [ { "name": "accept", "actions": { "forwarding": "ietf-access-control-list:accept" } } ] } } ] }, "ietf-routing:routing": { "router-id": "203.0.113.1", "control-plane-protocols": { "control-plane-protocol": [ { "type": "ietf-msdp:msdp", "name": "msdp-1", "ietf-msdp:msdp": { "global": { "tcp-connection-source": "eth1", "default-peer": [ { "peer-addr": "198.51.100.8", "prefix-policy": "msdp-default-peer-policy" } ], "originating-rp": { "interface": "eth1" }, "sa-limit": 0, "ttl-threshold": 1 }, "peers": { "peer": [ { "address": "198.51.100.8", "enabled": true, "tcp-connection-source": "eth1", "description": "x", "mesh-group": "x", "peer-as": 100, "sa-limit": 0, "timer": { "connect-retry-interval": 0, "holdtime-interval": 3, "keepalive-interval": 1 }, "ttl-threshold": 1 } ] } } } ] } } }
{ "ietf-interfaces:interfaces": { "interface": [ { "name": "eth1", "description": "An interface with MSDP enabled.", "type": "iana-if-type:ethernetCsmacd", "phys-address": "00:00:5e:00:53:01", "oper-status": "up", "statistics": { "discontinuity-time": "2020-02-22T11:22:33+02:00" }, "ietf-ip:ipv4": { "forwarding": true, "mtu": 1500, "address": [ { "ip": "192.0.2.1", "prefix-length": 24, "origin": "static" } ] } } ] }, "ietf-access-control-list:acls": { "acl": [ { "name": "msdp-default-peer-policy", "type": "ietf-access-control-list:ipv4-acl-type", "aces": { "ace": [ { "name": "accept", "actions": { "forwarding": "ietf-access-control-list:accept" } } ] } } ] }, "ietf-routing:routing": { "router-id": "203.0.113.1", "control-plane-protocols": { "control-plane-protocol": [ { "type": "ietf-msdp:msdp", "name": "msdp-1", "ietf-msdp:msdp": { "global": { "tcp-connection-source": "eth1", "default-peer": [ { "peer-addr": "198.51.100.8", "prefix-policy": "msdp-default-peer-policy" } ], "originating-rp": { "interface": "eth1" }, "sa-limit": 0, "ttl-threshold": 1 }, "peers": { "peer": [ { "address": "198.51.100.8", "enabled": true, "tcp-connection-source": "eth1", "description": "x", "mesh-group": "x", "peer-as": 100, "sa-limit": 0, "timer": { "connect-retry-interval": 0, "holdtime-interval": 3, "keepalive-interval": 1 }, "ttl-threshold": 1, "session-state": "established", "elapsed-time": 5, "is-default-peer": true, "keepalive-expire": 1, "reset-count": 1, "statistics": { "discontinuity-time": "2020-02-22T12:22:33+02:00" } } ] }, "sa-cache": { "entry": [ { "group": "233.252.0.23", "source-addr": "192.0.2.50", "origin-rp": [ { "rp-address": "203.0.113.10", "is-local-rp": false, "sa-adv-expire": 50 } ], "state-attributes": { "up-time": 1000, "expire": 120, "holddown-interval": 150, "peer-learned-from": "198.51.100.8", "rpf-peer": "198.51.100.8" } } ] } } } ] } } }
This example shows the input data (in JSON) for executing an "sa-cache clear" action to clear the cache of all entries that match the group address of 233.252.0.23.
この例では、233.252.0.23のグループアドレスに一致するすべてのエントリのキャッシュを消去するための「SA-Cache Clear」アクションを実行するための入力データ(JSON)を示します。
{ "ietf-msdp:sa-cache": { "input": { "entry": { "group": "233.252.0.23" } } } }
Acknowledgements
謝辞
The authors would like to thank Stig Venaas and Jake Holland for their valuable comments and suggestions.
著者らは、貴重なコメントや提案のためにStig VenaasとJake Hollandに感謝します。
Contributors
貢献者
The authors would like to thank the following people for their valuable contributions.
著者らは、貴重な貢献のために以下の人々に感謝したいと思います。
Yisong Liu
義理
Email: liuyisong@chinamobile.com
Benchong Xu
ベンチョンズ
Email: xu.benchong@zte.com.cn
Tanmoy Kundu
タンモイ・クンドゥ
Email: tanmoy.kundu@alcatel-lucent.com
Authors' Addresses
著者の住所
Xufeng Liu Volta Networks
Xufeng Liu Voltaネットワーク
Email: xufeng.liu.ietf@gmail.com
Zheng Zhang (editor) ZTE Corporation No. 50 Software Avenue, Yuhuatai District Nanjing China
Zheng Zhang(編集)ZTE CORPORATION No. 50 Software Avenue、Yuhuatai地区南京中国
Email: zhang.zheng@zte.com.cn
Anish Peter Individual Contributor
アニアのピーターの個人の寄稿者
Email: anish.ietf@gmail.com
Mahesh Sivakumar Juniper Networks 1133 Innovation Way Sunnyvale, CA 94089 United States of America
Mahesh Sivakumar Juniper Networks 1133イノベーションウェイSunnyvale、CA 94089アメリカ合衆国
Email: sivakumar.mahesh@gmail.com
Feng Guo Huawei Technologies Huawei Bldg., No. 156 Beiqing Rd. Beijing 100095 China
Feng Guo Huawei Technologies Huawei Bldg、No.156 Beqing RD。北京100095中国
Email: guofeng@huawei.com
Pete McAllister Metaswitch Networks 100 Church Street Enfield EN2 6BQ United Kingdom
Pete McAllisterメタスイッチネットワーク100 Church Street Enfield EN2 6BQイギリス
Email: pete.mcallister@metaswitch.com