diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc5130.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc5130.txt')
-rw-r--r-- | doc/rfc/rfc5130.txt | 451 |
1 files changed, 451 insertions, 0 deletions
diff --git a/doc/rfc/rfc5130.txt b/doc/rfc/rfc5130.txt new file mode 100644 index 0000000..12dff6f --- /dev/null +++ b/doc/rfc/rfc5130.txt @@ -0,0 +1,451 @@ + + + + + + +Network Working Group S. Previdi +Request for Comments: 5130 M. Shand, Ed. +Category: Standards Track Cisco Systems + C. Martin + iPath Services + February 2008 + + + A Policy Control Mechanism in IS-IS Using Administrative Tags + +Status of This Memo + + This document specifies an Internet standards track protocol for the + Internet community, and requests discussion and suggestions for + improvements. Please refer to the current edition of the "Internet + Official Protocol Standards" (STD 1) for the standardization state + and status of this protocol. Distribution of this memo is unlimited. + +Abstract + + This document describes an extension to the IS-IS protocol to add + operational capabilities that allow for ease of management and + control over IP prefix distribution within an IS-IS domain. This + document enhances the IS-IS protocol by extending the information + that an Intermediate System (IS) router can place in Link State + Protocol (LSP) Data Units for policy use. This extension will + provide operators with a mechanism to control IP prefix distribution + throughout multi-level IS-IS domains. + +Table of Contents + + 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 2 + 2. Conventions Used in This Document . . . . . . . . . . . . . . . 2 + 3. Sub-TLV Additions . . . . . . . . . . . . . . . . . . . . . . . 2 + 3.1. 32-bit Administrative Tag Sub-TLV 1 . . . . . . . . . . . . 3 + 3.2. 64-bit Administrative Tag Sub-TLV 2 . . . . . . . . . . . . 3 + 4. Ordering of Tags . . . . . . . . . . . . . . . . . . . . . . . 3 + 5. Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . 4 + 6. Operations . . . . . . . . . . . . . . . . . . . . . . . . . . 4 + 7. Security Considerations . . . . . . . . . . . . . . . . . . . . 5 + 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 5 + 9. Manageability Considerations . . . . . . . . . . . . . . . . . 5 + 10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 6 + 11. Contributors . . . . . . . . . . . . . . . . . . . . . . . . . 6 + 12. References . . . . . . . . . . . . . . . . . . . . . . . . . . 6 + 12.1. Normative References . . . . . . . . . . . . . . . . . . . 6 + 12.2. Informative References . . . . . . . . . . . . . . . . . . 6 + + + + +Previdi, et al. Standards Track [Page 1] + +RFC 5130 IS-IS Admin Tags February 2008 + + +1. Introduction + + As defined in [RFC1195] and extended in [RFC3784], the IS-IS protocol + [ISO10589] may be used to distribute IPv4 prefix reachability + information throughout an IS-IS domain. In addition, thanks to + extensions made in [RFC5120] and [ISIS-IPv6], IS-IS may be used to + distribute IPv6 reachability information. + + The IPv4 prefix information is encoded as TLV type 128 and 130 in + [RFC1195], with additional information carried in TLV 135 as + specified in [RFC3784] and TLV 235 as defined in [RFC5120]. In + particular, the extended IP Reachability TLV (TLV 135) contains + support for a larger metric space, an up/down bit to indicate + redistribution between different levels in the hierarchy, an IP + prefix, and one or more sub-TLVs that can be used to carry specific + information about the prefix. TLV 235 is a derivative of TLV 135, + with the addition of Multi-Topology membership information [RFC5120]. + The IPv6 prefix information is encoded as TLV 236 in [ISIS-IPv6], and + TLV 237 in [RFC5120]. + + This document defines 2 new sub-TLVs for TLV 135, TLV 235, TLV 236 + and TLV 237 that may be used to carry administrative information + about an IP prefix. + +2. Conventions Used in This Document + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in BCP 14, [RFC2119]. + +3. Sub-TLV Additions + + This document creates 2 new "Administrative Tag" sub-TLVs to be added + to TLV 135, TLV 235, TLV 236 and TLV 237. These TLVs specify one or + more 32- or 64-bit unsigned integers that may be associated with an + IP prefix. Example uses of these tags include carrying BGP standard + (or extended) communities and controlling redistribution between + levels and areas, different routing protocols, or multiple instances + of IS-IS running on the same router. + + The methods for which their use is employed is beyond the scope of + this document and left to the implementer and/or operator. + + The encoding of the sub-TLV(s) is discussed in the following + subsections. + + + + + + +Previdi, et al. Standards Track [Page 2] + +RFC 5130 IS-IS Admin Tags February 2008 + + +3.1. 32-bit Administrative Tag Sub-TLV 1 + + The Administrative Tag SHALL be encoded as one or more 4-octet + unsigned integers using Sub-TLV 1 in TLV 135 [RFC3784], TLV 235 + [RFC5120], TLV 236 [ISIS-IPv6], and TLV 237 [RFC5120]. The + Administrative Tag Sub-TLV has following structure: + + o 1 octet of type (value: 1) + + o 1 octet of length (value: multiple of 4) + + o one or more instances of 4 octets of administrative tag + + On receipt, an implementation MAY consider only one encoded tag, in + which case, the first encoded tag MUST be considered and any + additional tags ignored. A tag value of zero is reserved and SHOULD + be treated as "no tag". + +3.2. 64-bit Administrative Tag Sub-TLV 2 + + The Administrative Tag SHALL be encoded as one or more 8-octet + unsigned integers using Sub-TLV 2 in TLV 135 [RFC3784], TLV 235 + [RFC5120], TLV 236 [ISIS-IPv6], and TLV 237 [RFC5120]. The 64-bit + Administrative Tag Sub-TLV has following structure: + + o 1 octet of type (value: 2) + + o 1 octet of length (value: multiple of 8) + + o one or more instances of 8 octets of administrative tag + + On receipt, an implementation MAY consider only one encoded tag; in + which case, the first encoded tag MUST be considered and any + additional tags ignored. A tag value of zero is reserved and SHOULD + be treated as "no tag". + +4. Ordering of Tags + + The semantics of the tag order are implementation-dependent. That + is, there is no implied meaning to the ordering of the tags that + indicates a certain operation or set of operations need be performed + based on the order of the tags. Each tag SHOULD be treated as an + autonomous identifier that MAY be used in policy to perform a policy + action. Whether or not tag A precedes or succeeds tag B SHOULD not + change the meaning of the tag set. However, when propagating TLVs + that contain multiple tags between levels, an implementation SHOULD + + + + + +Previdi, et al. Standards Track [Page 3] + +RFC 5130 IS-IS Admin Tags February 2008 + + + preserve the ordering such that the first tag remains the first tag, + so that implementations that only recognize a single tag will have a + consistent view across levels. + + Each IS that receives an LSP with TLV(s) 135 and/or 235 and/or 236 + and/or 237, that have associated sub-TLV(s) 1 and/or 2, MAY operate + on the tag values as warranted by the implementation. If an + implementation needs to change tag values, for example, when + propagating TLVs between levels at an area boundary, then the TLV(s) + SHOULD be copied to the newly generated Level-1 or Level-2 LSP. At + that point, the contents of the sub-TLV(s) MAY change as dictated by + the policy action. In the event that no change is required, the sub- + TLV(s) SHOULD be copied in order into the new LSP, such that ordering + is preserved. + +5. Compliance + + A compliant IS-IS implementation MUST be able to assign one tag to + any IP prefix in any of the following TLVs: TLV 135, TLV 235, TLV + 236, TLV 237. It MUST be able to interpret a single tag present in + the sub-TLV, or the first tag where there is more than one tag + present in the sub-TLV. + + A compliant IS-IS implementation MAY be able to assign more than one + tag to any IP prefix in any of the following TLVs: TLV 135, TLV 235, + TLV 236, TLV 237. It MAY be able to interpret the second and + subsequent tags where more than one tag is present in the sub-TLV. + + When propagating TLVs between levels, a compliant IS-IS + implementation MAY be able to rewrite or remove one or more tags + associated with a prefix in any of the following TLVs: TLV 135, TLV + 235, TLV 236, TLV 237. + +6. Operations + + An administrator associates an Administrative Tag value with some + interesting property. When IS-IS advertises reachability for some IP + prefix that has that property, it adds the Administrative Tag to the + IP reachability information TLV for that prefix, and the tag "sticks" + to the prefix as it is flooded throughout the routing domain. + + Consider the network in Figure 1. We wish to "leak" L1 prefixes + [RFC2966] with some property, A, from L2 to the L1 router R1. + Without policy groups, there is no way for R2 to know property A + prefixes from property B prefixes. + + + + + + +Previdi, et al. Standards Track [Page 4] + +RFC 5130 IS-IS Admin Tags February 2008 + + + R2--------R3--------R4 + L2 / \ + - - - /- - - - - - - - - - - - - - + L1 / \ + R1----1.1.1.0/24 (A) R5 + | + | + 1.1.2.0/24 (B) + + Figure 1: Example of usage + + We associate Administrative Tag 100 with property A, and have R5 + attach that value to the IP extended reachability information TLV for + prefix 1.1.2.0/24. R2 has a policy in place to "match prefixes with + Administrative Tag 100, and leak to L1". + + The previous example is rather simplistic; it seems that it would be + just as easy for R2 simply to match the prefix 1.1.2.0/24. However, + if there are a large number of routers that need to apply some policy + according to property A and a large number of "A" prefixes, this + mechanism can be quite helpful. + + Implementations that support only a single tag and those that support + multiple tags may coexist in the same IS-IS domain. An + implementation supporting multiple tags SHOULD therefore assign any + tag that is required to be interpreted by all systems as the first + tag in any set of multiple tags. + +7. Security Considerations + + This document raises no new security issues for IS-IS, as any + annotations to IP prefixes should not pass outside the administrative + control of the network operator of the IS-IS domain. Such an + allowance would violate the spirit of Interior Gateway Protocols in + general and IS-IS in particular. + +8. IANA Considerations + + IANA has assigned "1" as the type code of the 32-bit Administrative + Tag Sub-TLV and "2" as the type code of the 64-bit Administrative Tag + Sub-TLV. + +9. Manageability Considerations + + These extensions have been designed, developed, and deployed for many + years and do not have any new impact on management and operation of + the IS-IS protocol via this standardization process. + + + + +Previdi, et al. Standards Track [Page 5] + +RFC 5130 IS-IS Admin Tags February 2008 + + +10. Acknowledgements + + The authors would like to thank Henk Smit for clarifying the best + place to describe this new information, Tony Li and Tony Przygienda + for useful comments on this document, and Danny McPherson for some + much needed formatting assistance. + +11. Contributors + + Brad Neal contributed portions of this document. + +12. References + +12.1. Normative References + + [ISO10589] International Organization for Standardization, + "Intermediate system to Intermediate system intra-domain + routing information exchange protocol for use in + conjunction with the protocol for providing the + connectionless-mode Network Service (ISO 8473)", ISO/ + IEC 10589:2002, Second Edition, Nov 2002. + + [RFC1195] Callon, R., "Use of OSI IS-IS for routing in TCP/IP and + dual environments", RFC 1195, December 1990. + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, March 1997. + +12.2. Informative References + + [ISIS-IPv6] Hopps, C., "Routing IPv6 with IS-IS", Work in Progress, + October 2007. + + [RFC2966] Li, T., Przygienda, T., and H. Smit, "Domain-wide Prefix + Distribution with Two-Level IS-IS", RFC 2966, + October 2000. + + [RFC3784] Smit, H. and T. Li, "Intermediate System to Intermediate + System (IS-IS) Extensions for Traffic Engineering (TE)", + RFC 3784, June 2004. + + [RFC5120] Przygienda, T., Shen, N., and N. Sheth, "M-ISIS: Multi + Topology (MT) Routing in IS-IS", RFC 5120, + February 2008. + + + + + + + +Previdi, et al. Standards Track [Page 6] + +RFC 5130 IS-IS Admin Tags February 2008 + + +Authors' Addresses + + Stefano Previdi + Cisco Systems + Via Del Serafico, 200 + 00142 Rome, + Italy + + EMail: sprevidi@cisco.com + + + Mike Shand (editor) + Cisco Systems + 250, Longwater Avenue. + Reading, Berks RG2 6GB + UK + + Phone: +44 208 824 8690 + EMail: mshand@cisco.com + + + Christian Martin + iPath Services + + EMail: chris@ipath.net + + + + + + + + + + + + + + + + + + + + + + + + + + +Previdi, et al. Standards Track [Page 7] + +RFC 5130 IS-IS Admin Tags February 2008 + + +Full Copyright Statement + + Copyright (C) The IETF Trust (2008). + + This document is subject to the rights, licenses and restrictions + contained in BCP 78, and except as set forth therein, the authors + retain all their rights. + + This document and the information contained herein are provided on an + "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS + OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND + THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS + OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF + THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED + WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Intellectual Property + + The IETF takes no position regarding the validity or scope of any + Intellectual Property Rights or other rights that might be claimed to + pertain to the implementation or use of the technology described in + this document or the extent to which any license under such rights + might or might not be available; nor does it represent that it has + made any independent effort to identify any such rights. Information + on the procedures with respect to rights in RFC documents can be + found in BCP 78 and BCP 79. + + Copies of IPR disclosures made to the IETF Secretariat and any + assurances of licenses to be made available, or the result of an + attempt made to obtain a general license or permission for the use of + such proprietary rights by implementers or users of this + specification can be obtained from the IETF on-line IPR repository at + http://www.ietf.org/ipr. + + The IETF invites any interested party to bring to its attention any + copyrights, patents or patent applications, or other proprietary + rights that may cover technology that may be required to implement + this standard. Please address the information to the IETF at + ietf-ipr@ietf.org. + + + + + + + + + + + + +Previdi, et al. Standards Track [Page 8] + |