summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc7916.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc7916.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc7916.txt')
-rw-r--r--doc/rfc/rfc7916.txt1739
1 files changed, 1739 insertions, 0 deletions
diff --git a/doc/rfc/rfc7916.txt b/doc/rfc/rfc7916.txt
new file mode 100644
index 0000000..7e81ea9
--- /dev/null
+++ b/doc/rfc/rfc7916.txt
@@ -0,0 +1,1739 @@
+
+
+
+
+
+
+Internet Engineering Task Force (IETF) S. Litkowski, Ed.
+Request for Comments: 7916 B. Decraene
+Category: Standards Track Orange
+ISSN: 2070-1721 C. Filsfils
+ K. Raza
+ Cisco Systems
+ M. Horneffer
+ Deutsche Telekom
+ P. Sarkar
+ Individual Contributor
+ July 2016
+
+
+ Operational Management of Loop-Free Alternates
+
+Abstract
+
+ Loop-Free Alternates (LFAs), as defined in RFC 5286, constitute an IP
+ Fast Reroute (IP FRR) mechanism enabling traffic protection for IP
+ traffic (and, by extension, MPLS LDP traffic). Following early
+ deployment experiences, this document provides operational feedback
+ on LFAs, highlights some limitations, and proposes a set of
+ refinements to address those limitations. It also proposes required
+ management specifications.
+
+ This proposal is also applicable to remote-LFA solutions.
+
+Status of This Memo
+
+ This is an Internet Standards Track document.
+
+ This document is a product of the Internet Engineering Task Force
+ (IETF). It represents the consensus of the IETF community. It has
+ received public review and has been approved for publication by the
+ Internet Engineering Steering Group (IESG). Further information on
+ Internet Standards is available in Section 2 of RFC 7841.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ http://www.rfc-editor.org/info/rfc7916.
+
+
+
+
+
+
+
+
+
+
+
+Litkowski, et al. Standards Track [Page 1]
+
+RFC 7916 LFA Manageability July 2016
+
+
+Copyright Notice
+
+ Copyright (c) 2016 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (http://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the Simplified BSD License.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Litkowski, et al. Standards Track [Page 2]
+
+RFC 7916 LFA Manageability July 2016
+
+
+Table of Contents
+
+ 1. Introduction ....................................................4
+ 1.1. Requirements Language ......................................4
+ 2. Definitions .....................................................4
+ 3. Operational Issues with Default LFA Tiebreakers .................5
+ 3.1. Case 1: PE Router Protecting against Failures
+ within Core Network ........................................5
+ 3.2. Case 2: PE Router Chosen to Protect against Core
+ Failures while P Router LFA Exists .........................7
+ 3.3. Case 3: Suboptimal P Router Alternate Choice ...............8
+ 3.4. Case 4: No-Transit LFA Computing Node ......................9
+ 4. Need for Coverage Monitoring ....................................9
+ 5. Need for LFA Activation Granularity ............................10
+ 6. Configuration Requirements .....................................11
+ 6.1. LFA Enabling/Disabling Scope ..............................11
+ 6.2. Policy-Based LFA Selection ................................12
+ 6.2.1. Connected versus Remote Alternates .................12
+ 6.2.2. Mandatory Criteria .................................13
+ 6.2.3. Additional Criteria ................................14
+ 6.2.4. Evaluation of Criteria .............................14
+ 6.2.5. Retrieving Alternate Path Attributes ...............18
+ 6.2.6. ECMP LFAs ..........................................23
+ 7. Operational Aspects ............................................24
+ 7.1. No-Transit Condition on LFA Computing Node ................24
+ 7.2. Manual Triggering of FRR ..................................25
+ 7.3. Required Local Information ................................26
+ 7.4. Coverage Monitoring .......................................26
+ 7.5. LFAs and Network Planning .................................27
+ 8. Security Considerations ........................................28
+ 9. References .....................................................28
+ 9.1. Normative References ......................................28
+ 9.2. Informative References ....................................30
+ Contributors ......................................................31
+ Authors' Addresses ................................................31
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Litkowski, et al. Standards Track [Page 3]
+
+RFC 7916 LFA Manageability July 2016
+
+
+1. Introduction
+
+ Following the first deployments of Loop-Free Alternates (LFAs), this
+ document provides feedback to the community about the management
+ of LFAs.
+
+ o Section 3 provides real use cases illustrating some limitations
+ and suboptimal behavior.
+
+ o Section 4 provides requirements for LFA simulations.
+
+ o Section 5 proposes requirements for activation granularity and
+ policy-based selection of the alternate.
+
+ o Section 6 expresses requirements for the operational management of
+ LFAs and, in particular, a policy framework to manage alternates.
+
+ o Section 7 details some operational considerations of LFAs, such as
+ IS-IS overload bit management and troubleshooting information.
+
+1.1. Requirements Language
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
+ document are to be interpreted as described in [RFC2119].
+
+2. Definitions
+
+ o Per-prefix LFA computation: Evaluation for the best alternate is
+ done for each destination prefix, as opposed to the "per-next-hop"
+ simplification technique proposed in Section 3.8 of [RFC5286].
+
+ o PE router: Provider Edge router. These routers connect customers
+ to each other.
+
+ o P router: Provider router. These routers are core routers without
+ customer connections. They provide transit between PE routers,
+ and they form the core network.
+
+ o Core network: subset of the network composed of P routers and
+ links between them.
+
+ o Core link: network link part of the core network, i.e., a link
+ between P routers.
+
+ o Link-protecting LFA: alternate providing protection against link
+ failure.
+
+
+
+
+Litkowski, et al. Standards Track [Page 4]
+
+RFC 7916 LFA Manageability July 2016
+
+
+ o Node-protecting LFA: alternate providing protection against node
+ failure.
+
+ o Connected alternate: alternate adjacent (at the IGP level) to the
+ Point of Local Repair (PLR) (i.e., an IGP neighbor).
+
+ o Remote alternate: alternate that does not share an IGP adjacency
+ with the PLR.
+
+3. Operational Issues with Default LFA Tiebreakers
+
+ [RFC5286] introduces the notion of tiebreakers when selecting the LFA
+ among multiple candidate alternate next hops. When multiple LFAs
+ exist, [RFC5286] has favored the selection of the LFA that provides
+ the best coverage against the failure cases. While this is indeed a
+ goal, it is one among multiple goals, and in some deployments this
+ leads to the selection of a suboptimal LFA. The following sections
+ detail real use cases related to such limitations.
+
+ Note that the use case for LFA computation per destination
+ (per-prefix LFA) is assumed throughout this analysis. We also assume
+ in the network figures that all IP prefixes are advertised with
+ zero cost.
+
+3.1. Case 1: PE Router Protecting against Failures within Core Network
+
+ P1 --------- P2 ---------- P3 --------- P4
+ | 1 100 1 |
+ | |
+ | 100 | 100
+ | |
+ | 1 100 1 | 1 5k
+ P5 --------- P6 ---------- P7 --------- P8 --- P9 -- PE1
+ | | | | | |
+ 5k| |5k 5k| |5k | 5k | 5k
+ | | | | | |
+ | +-- PE4 --+ | +---- PE2 ----+
+ | | |
+ +---- PE5 ----+ | 5k
+ |
+ PE3
+
+ Px routers are P routers using n * 10 Gbps links.
+ PEs are connected using links with lower bandwidth.
+
+ Figure 1
+
+
+
+
+
+Litkowski, et al. Standards Track [Page 5]
+
+RFC 7916 LFA Manageability July 2016
+
+
+ In Figure 1, let us consider the traffic flowing from PE1 to PE4.
+ The nominal path is P9-P8-P7-P6-PE4. Let us now consider the failure
+ of link P7-P8. As the P4 primary path to PE4 is P8-P7-P6-PE4, P4 is
+ not an LFA for P8 (because P4 will loop traffic back to P8), and the
+ only available LFA is PE2.
+
+ When the core link P8-P7 fails, P8 switches all traffic destined to
+ PE4/PE5 towards the node PE2. Hence, a PE node and PE links are used
+ to protect against the failure of a core link. Typically, PE links
+ have less capacity than core links, and congestion may occur on PE2
+ links. Note that although PE2 is not directly affected by the
+ failure, its links become congested, and its traffic will suffer from
+ the congestion.
+
+ In summary, in the case of P8-P7 link failure, the impact on customer
+ traffic is:
+
+ o From PE2's point of view:
+
+ * without LFA: no impact.
+
+ * with LFA: traffic is partially dropped (but possibly
+ prioritized by a QoS mechanism). It must be highlighted that
+ in such a situation, traffic not affected by the failure may be
+ affected by the congestion.
+
+ o From P8's point of view:
+
+ * without LFA: traffic is totally dropped until convergence
+ occurs.
+
+ * with LFA: traffic is partially dropped (but possibly
+ prioritized by a QoS mechanism).
+
+ Besides the congestion aspects of using a PE router as an alternate
+ to protect against a core failure, a service provider may consider
+ this to be a bad routing design and would want to prevent it.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Litkowski, et al. Standards Track [Page 6]
+
+RFC 7916 LFA Manageability July 2016
+
+
+3.2. Case 2: PE Router Chosen to Protect against Core Failures while
+ P Router LFA Exists
+
+ P1 --------- P2 ------------ P3 ------- P4
+ | 1 100 | 1 |
+ | | |
+ | 100 | 30 | 30
+ | | |
+ | 1 50 50 | 10 | 1 5k
+ P5 --------- P6 --- P10 ---- P7 ------- P8 --- P9 -- PE1
+ | | | | \ |
+ 5k| |5k 5k| |5k \ 5k | 5k
+ | | | | \ |
+ | +-- PE4 --+ | +---- PE2 ----+
+ | | |
+ +---- PE5 ----+ | 5k
+ |
+ PE3
+
+ Px routers are P routers meshed with n * 10 Gbps links.
+ PEs are meshed using links with lower bandwidth.
+
+ Figure 2
+
+ In Figure 2, let us consider the traffic coming from PE1 to PE4. The
+ nominal path is P9-P8-P7-P10-P6-PE4. Let us now consider the failure
+ of the link P7-P8. For P8, P4 is a link-protecting LFA and PE2 is a
+ node-protecting LFA. PE2 is chosen as the best LFA, due to the
+ better type of protection that it provides. Just as in case 1, this
+ may lead to congestion on PE2 links upon LFA activation.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Litkowski, et al. Standards Track [Page 7]
+
+RFC 7916 LFA Manageability July 2016
+
+
+3.3. Case 3: Suboptimal P Router Alternate Choice
+
+ +--- PE3 ---+
+ / \
+ 1000 / \ 1000
+ / \
+ +----- P1 ---------------- P2 ----+
+ | | 500 | |
+ | 10 | | | 10
+ | | | |
+ R5 | 10 | 10 R7
+ | | | |
+ | 10 | | | 10
+ | | 500 | |
+ +---- P3 ----------------- P4 ----+
+ \ /
+ 1000 \ / 1000
+ \ /
+ +--- PE1 ---+
+
+ Px routers are P routers.
+ P1-P2 and P3-P4 links are 1 Gbps links.
+ All other inter-Px links are 10 Gbps links.
+
+ Figure 3
+
+ In Figure 3, let us consider the failure of link P1-P3. For
+ destination PE3, P3 has two possible alternates:
+
+ o P4, which is node-protecting
+
+ o R5, which is link-protecting
+
+ P4 is chosen as the best LFA, due to the better type of protection
+ that it provides. However, for bandwidth capacity reasons, it
+ may not be desirable to use P4. A service provider may prefer to use
+ high-bandwidth links as the preferred LFA. In this example,
+ preferring the shortest path over the type of protection may achieve
+ the expected behavior, but in cases where metrics do not reflect the
+ bandwidth, this technique would not work and some other criteria
+ would need to be involved when selecting the best LFA.
+
+
+
+
+
+
+
+
+
+
+Litkowski, et al. Standards Track [Page 8]
+
+RFC 7916 LFA Manageability July 2016
+
+
+3.4. Case 4: No-Transit LFA Computing Node
+
+ P1 P2
+ | \ / |
+ 50 | 50 \/ 50 | 50
+ | /\ |
+ PE1-+ +-- PE2
+ \ /
+ 45 \ / 45
+ -PE3-
+ (No-transit condition set)
+
+ Figure 4
+
+ The IS-IS and OSPF protocols define some way to prevent a router from
+ being used for transit.
+
+ The IS-IS overload bit is defined in [ISO10589], and the OSPF R-bit
+ is defined in [RFC5340]. Also, the OSPF stub router is defined in
+ [RFC6987] as a method to prevent transit on a node by advertising
+ MaxLinkMetric on all non-stub links.
+
+ In Figure 4, PE3 has its no-transit condition set (permanently, for
+ design reasons) and wants to protect traffic using an LFA for
+ destination PE2.
+
+ On PE3, the loop-free condition is not satisfied: 100 !< 45 + 45.
+ PE1 is thus not considered as an LFA. However, thanks to the
+ no-transit condition on PE3, we know that PE1 will not loop the
+ traffic back to PE3. So, PE1 is an LFA to reach PE2.
+
+ In the case of a no-transit condition set on a node, LFA behavior
+ must be clarified.
+
+4. Need for Coverage Monitoring
+
+ As per [RFC6571], LFA coverage depends strongly on the network
+ topology that is in use. Even if the remote-LFA mechanism [RFC7490]
+ significantly extends the coverage of the basic LFA specification,
+ there are still some cases where protection would not be available.
+ As network topologies are constantly evolving (network extension,
+ additional capacity, latency optimization, etc.), the protection
+ coverage may change. Fast Reroute (FRR) functionality may be
+ critical for some services supported by the network; a service
+ provider must always know what type of protection coverage is
+ currently available on the network. Moreover, predicting protection
+ coverage in the event of network topology changes is mandatory.
+
+
+
+
+Litkowski, et al. Standards Track [Page 9]
+
+RFC 7916 LFA Manageability July 2016
+
+
+ Today, network simulation tools associated with "what if" scenarios
+ are often used by service providers for the overall network design
+ (capacity, path optimization, etc.). Sections 7.3, 7.4, and 7.5 of
+ this document propose the addition of LFA information into such tools
+ and within routers, so that a service provider may be able to:
+
+ o evaluate protection coverage after a topology change.
+
+ o adjust the topology change to cover the primary need (e.g.,
+ latency optimization, bandwidth increase) as well as LFA
+ protection.
+
+ o constantly monitor the LFA coverage in the live network and
+ receive alerts.
+
+ Documentation of LFA selection algorithms by implementers (default
+ and tuning options) is important in order to make it possible for
+ third-party modules to model these policy-based LFA selection
+ algorithms.
+
+5. Need for LFA Activation Granularity
+
+ As in all FRR mechanisms, an LFA installs backup paths in the
+ Forwarding Information Base (FIB). Depending on the hardware used by
+ a service provider, FIB resources may be critical. Activating LFAs
+ by default on all available components (IGP topologies, interfaces,
+ address families, etc.) may lead to a waste of FIB resources, as
+ generally only a few destinations in a network should be protected
+ (e.g., loopback addresses supporting MPLS services) compared to the
+ number of destinations in the Routing Information Base (RIB).
+
+ Moreover, a service provider may implement multiple different FRR
+ mechanisms in its networks for different applications (e.g.,
+ Maximally Redundant Trees (MRTs), TE FRR). In this scenario, an
+ implementation MAY allow the computation of alternates for a specific
+ destination even if the destination is already protected by another
+ mechanism. This will provide redundancy and permit the operator to
+ select the best option for FRR, using a policy language.
+
+ Section 6 provides some implementation guidelines.
+
+
+
+
+
+
+
+
+
+
+
+Litkowski, et al. Standards Track [Page 10]
+
+RFC 7916 LFA Manageability July 2016
+
+
+6. Configuration Requirements
+
+ Controlling the selection of the best alternate and the granularity
+ of LFA activation is a requirement for service providers. This
+ section defines configuration requirements for LFAs.
+
+6.1. LFA Enabling/Disabling Scope
+
+ The granularity of LFA activation SHOULD be controlled (as alternate
+ next hops consume memory in the forwarding plane).
+
+ An implementation of an LFA SHOULD allow its activation, with the
+ following granularities:
+
+ o Per routing context: Virtual Routing and Forwarding (VRF),
+ virtual/logical router, global routing table, etc.
+
+ o Per interface.
+
+ o Per protocol instance, topology, area.
+
+ o Per prefix: Prefix protection SHOULD have a higher priority
+ compared to interface protection. This means that if a specific
+ prefix must be protected due to a configuration request, an LFA
+ MUST be computed and installed for that prefix even if the primary
+ outgoing interface is not configured for protection.
+
+ An implementation of an LFA MAY allow its activation, with the
+ following criteria:
+
+ o Per address family: IPv4 unicast, IPv6 unicast.
+
+ o Per MPLS control plane: For MPLS control planes that inherit
+ routing decisions from the IGP routing protocol, the MPLS
+ data plane may be protected by an LFA. The implementation may
+ allow an operator to control this inheritance of protection from
+ the IP prefix to the MPLS label bound to this prefix. The
+ inheritance of protection will concern IP-to-MPLS, MPLS-to-MPLS,
+ and MPLS-to-IP entries. As an example, LDP and Segment Routing
+ extensions [SEG-RTG-ARCH] for IS-IS and OSPF are control-plane
+ eligible for this inheritance of protection.
+
+
+
+
+
+
+
+
+
+
+Litkowski, et al. Standards Track [Page 11]
+
+RFC 7916 LFA Manageability July 2016
+
+
+6.2. Policy-Based LFA Selection
+
+ When multiple alternates exist, the LFA selection algorithm is based
+ on tiebreakers. Current tiebreakers do not provide sufficient
+ control regarding how the best alternate is chosen. This document
+ proposes an enhanced tiebreaker allowing service providers to manage
+ all specific cases:
+
+ 1. An LFA implementation SHOULD support policy-based decisions for
+ determining the best LFA.
+
+ 2. Policy-based decisions SHOULD be based on multiple criteria, with
+ each criterion having a level of preference.
+
+ 3. If the defined policy does not allow the determination of a
+ unique best LFA, an implementation SHOULD pick only one based on
+ its own decision. For load-balancing purposes, an implementation
+ SHOULD also support the election of multiple LFAs.
+
+ 4. The policy SHOULD be applicable to a protected interface or a
+ specific set of destinations. In the case of applicability to
+ the protected interface, all destinations primarily routed on
+ that interface SHOULD use the policy for that interface.
+
+ 5. The choice of whether or not to dynamically re-evaluate policy
+ (in the event of a policy change) is left to the implementation.
+ If a dynamic approach is chosen, the implementation SHOULD
+ recompute the best LFAs and reinstall them in the FIB without
+ service disruption. If a non-dynamic approach is chosen, the
+ policy would be taken into account upon the next IGP event. In
+ this case, the implementation SHOULD support a command to
+ manually force the recomputation/reinstallation of LFAs.
+
+6.2.1. Connected versus Remote Alternates
+
+ In addition to connected LFAs, tunnels (e.g., IP, LDP, RSVP-TE,
+ Segment Routing) to distant routers may be used to complement LFA
+ coverage (tunnel tail used as virtual neighbor). When a router has
+ multiple alternate candidates for a specific destination, it may have
+ connected alternates and remote alternates (reachable via a tunnel).
+ Connected alternates may not always provide an optimal routing path,
+ and it may be preferable to select a remote alternate over a
+ connected alternate. Some uses of tunnels to extend LFA [RFC5286]
+ coverage are described in [RFC7490] and [TI-LFA]. [RFC7490] and
+ [TI-LFA] present some use cases for LDP tunnels and Segment Routing
+ tunnels, respectively. This document considers any type of tunneling
+ techniques to reach remote alternates (IP, Generic Routing
+
+
+
+
+Litkowski, et al. Standards Track [Page 12]
+
+RFC 7916 LFA Manageability July 2016
+
+
+ Encapsulation (GRE), LDP, RSVP-TE, the Layer 2 Tunneling Protocol
+ (L2TP), Segment Routing, etc.) and does not restrict the remote
+ alternates to the uses presented in these other documents.
+
+ In Figure 1, there is no P router alternate for P8 to reach PE4 or
+ PE5, so P8 is using PE2 as an alternate; this may generate congestion
+ when FRR is activated. Instead, we could have a remote alternate for
+ P8 to protect traffic to PE4 and PE5. For example, a tunnel from P8
+ to P3 (following the shortest path) can be set up, and P8 would be
+ able to use P3 as a remote alternate to protect traffic to PE4 and
+ PE5. In this scenario, traffic will not use a PE link during FRR
+ activation.
+
+ When selecting the best alternate, the selection algorithm MUST
+ consider all available alternates (connected or tunnel). For
+ example, with remote LFAs, computation of PQ sets [RFC7490] SHOULD be
+ performed before the selection of the best alternate.
+
+6.2.2. Mandatory Criteria
+
+ An LFA implementation MUST support the following criteria:
+
+ o Non-candidate link: A link marked as "non-candidate" will never be
+ used as an LFA.
+
+ o A primary next hop being protected by another primary next hop of
+ the same prefix (ECMP case).
+
+ o Type of protection provided by the alternate: link protection or
+ node protection. In the case of preference for node protection,
+ an implementation SHOULD support fallback to link protection if
+ node protection is not available.
+
+ o Shortest path: lowest IGP metric used to reach the destination.
+
+ o Shared Risk Link Groups (SRLGs) (as defined in Section 3 of
+ [RFC5286]; see also Section 6.2.4.1 for more details).
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Litkowski, et al. Standards Track [Page 13]
+
+RFC 7916 LFA Manageability July 2016
+
+
+6.2.3. Additional Criteria
+
+ An LFA implementation SHOULD support the following criteria:
+
+ o A downstream alternate: Preference for a downstream path over a
+ non-downstream path SHOULD be configurable.
+
+ o Link coloring with "include", "exclude", and preference-based
+ systems (see Section 6.2.4.2).
+
+ o Link bandwidth (see Section 6.2.4.3).
+
+ o Alternate preference / node coloring (see Section 6.2.4.4).
+
+6.2.4. Evaluation of Criteria
+
+6.2.4.1. SRLGs
+
+ Section 3 of [RFC5286] proposes the reuse of GMPLS IGP extensions to
+ encode SRLGs [RFC5307] [RFC4203]. Section 3 of [RFC5286] also
+ describes the algorithm to compute SRLG protection.
+
+ When SRLG protection is computed, an implementation SHOULD allow the
+ following:
+
+ o Exclusion of alternates in violation of SRLGs.
+
+ o Maintenance of a preference system between alternates based on
+ SRLG violations. How the preference system is implemented is out
+ of scope for this document, but here are two examples:
+
+ * Preference based on the number of violations. In this case,
+ more violations = less preferred.
+
+ * Preference based on violation cost. In this case, each SRLG
+ violation has an associated cost. The lower violation costs
+ are preferred.
+
+ When applying SRLG criteria, the SRLG violation check SHOULD be
+ performed on sources to alternates as well as alternates to
+ destination paths, based on the SRLG set of the primary path. In the
+ case of remote LFAs, PQ-to-destination path attributes would be
+ retrieved from the Shortest Path Tree (SPT) rooted at the PQ.
+
+
+
+
+
+
+
+
+Litkowski, et al. Standards Track [Page 14]
+
+RFC 7916 LFA Manageability July 2016
+
+
+6.2.4.2. Link Coloring
+
+ Link coloring is a powerful system to control the choice of
+ alternates. Link colors are markers that will allow the encoding of
+ properties of a particular link. Protecting interfaces are tagged
+ with colors. Protected interfaces are configured to include some
+ colors with a preference level and exclude others.
+
+ Link color information SHOULD be signaled in the IGP, and
+ administrative-group IGP extensions [RFC5305] [RFC3630] that are
+ already standardized, implemented, and widely used SHOULD be used for
+ encoding and signaling link colors.
+
+ PE2
+ | +---- P4
+ | /
+ PE1 ---- P1 --------- P2
+ | 10 Gbps
+ 1 Gbps |
+ |
+ P3
+
+ Figure 5
+
+ In the example in Figure 5, the P1 router is connected to three P
+ routers and two PEs. P1 is configured to protect the P1-P4 link. We
+ assume that, given the topology, all neighbors are candidate LFAs.
+ We would like to enforce a policy in the network where only a core
+ router may protect against the failure of a core link and where
+ high-capacity links are preferred.
+
+ In this example, we can use the proposed link coloring by:
+
+ o Marking the PE links with the color RED.
+
+ o Marking the 10 Gbps core link with the color BLUE.
+
+ o Marking the 1 Gbps core link with the color YELLOW.
+
+ o Configuring the protected interface P1->P4 as follows:
+
+ * Include BLUE, preference 200.
+
+ * Include YELLOW, preference 100.
+
+ * Exclude RED.
+
+
+
+
+
+Litkowski, et al. Standards Track [Page 15]
+
+RFC 7916 LFA Manageability July 2016
+
+
+ Using this, PE links will never be used to protect against P1-P4 link
+ failure, and the 10 Gbps link will be preferred.
+
+ The main advantage of this solution is that it can easily be
+ duplicated on other interfaces and other nodes without change. A
+ service provider has only to define the color system (associate a
+ color with a level of significance), as it is done already for TE
+ affinities or BGP communities.
+
+ An implementation of link coloring:
+
+ o SHOULD support multiple "include" and "exclude" colors on a single
+ protected interface.
+
+ o SHOULD provide a level of preference between included colors.
+
+ o SHOULD support the configuration of multiple colors on a single
+ protecting interface.
+
+6.2.4.3. Bandwidth
+
+ As mentioned in previous sections, not taking into account the
+ bandwidth of an alternate could lead to congestion during FRR
+ activation. We propose that the bandwidth criteria be based on the
+ link speed information, for the following reasons:
+
+ o If a router S has a set of X destinations primarily forwarded to
+ N, using per-prefix LFAs may lead to having a subset of X
+ protected by a neighbor N1, another subset by N2, another subset
+ by Nx, etc.
+
+ o S is not aware of traffic flows to each destination, so in the
+ case of FRR activation, S is not able to evaluate how much traffic
+ will be sent to N1, N2, Nx, etc.
+
+ Based on this, it is not useful to gather available bandwidth on
+ alternate paths, as the router does not know how much bandwidth it
+ requires for protection. The proposed link speed approach provides a
+ good approximation at low cost, as information is easily available.
+
+ The bandwidth criteria of the policy framework SHOULD work in at
+ least the following two ways:
+
+ o Prune: Exclude an LFA if the link speed to reach it is lower than
+ the link speed of the primary next-hop interface.
+
+ o Prefer: Prefer an LFA based on its bandwidth to reach it compared
+ to the link speed of the primary next-hop interface.
+
+
+
+Litkowski, et al. Standards Track [Page 16]
+
+RFC 7916 LFA Manageability July 2016
+
+
+6.2.4.4. Alternate Preference / Node Coloring
+
+ Rather than tagging interfaces on each node (using link colors) to
+ identify the types of alternate nodes (as an example), it would be
+ helpful if routers could be identified in the IGP. This would allow
+ grouped processing on multiple nodes. As an implementation needs to
+ exclude some specific alternates (see Section 6.2.3), an
+ implementation SHOULD be able to:
+
+ o give preference to a specific alternate.
+
+ o give preference to a group of alternates.
+
+ o exclude a specific alternate.
+
+ o exclude a group of alternates.
+
+ A specific alternate may be identified by its interface, IP address,
+ or router ID, and a group of alternates may be identified by a marker
+ (tag) advertised in IGP. The IGP encoding and signaling for marking
+ groups of alternates SHOULD be done according to [RFC7917] and
+ [RFC7777]. Using a tag/marker is referred to as "node coloring", as
+ compared to the link coloring option presented in Section 6.2.4.2.
+
+ Consider the following network:
+
+ PE3
+ |
+ |
+ PE2
+ | +---- P4
+ | /
+ PE1 ---- P1 -------- P2
+ | 10 Gbps
+ 1 Gbps |
+ |
+ P3
+
+ Figure 6
+
+ In the example above, each node is configured with a specific tag
+ flooded through the IGP.
+
+ o PE1,PE3: 200 (non-candidate).
+
+ o PE2: 100 (edge/core).
+
+ o P1,P2,P3: 50 (core).
+
+
+
+Litkowski, et al. Standards Track [Page 17]
+
+RFC 7916 LFA Manageability July 2016
+
+
+ A simple policy could be configured on P1 to choose the best
+ alternate for P1->P4 based on the function or role of the router,
+ as follows:
+
+ o criterion 1 -> alternate preference: exclude tags 100 and 200.
+
+ o criterion 2 -> bandwidth.
+
+6.2.5. Retrieving Alternate Path Attributes
+
+6.2.5.1. Alternate Path
+
+ The alternate path is composed of two distinct parts: PLR to
+ alternate and alternate to destination.
+
+ N1 -- R1 ---- R2
+ /50 \ \
+ / R3 --- R4
+ / \
+ S -------- E ------- D
+ \\ //
+ \\ //
+ N2 ---- PQ ---- R5
+
+ Figure 7
+
+ In Figure 7, we consider a primary path from S to D, with S using E
+ as the primary next hop. All metrics are 1, except that {S,N1} = 50.
+ Two alternate paths are available:
+
+ o {S,N1,R1,R2|R3,R4,D}, where N1 is a connected alternate. This
+ consists of two sub-paths:
+
+ * {S,N1}: path from the PLR to the alternate.
+
+ * {N1,R1,R2|R3,R4,D}: path from the alternate to the destination.
+
+ o {S,N2,PQ,R5,D}, where the PQ is a remote alternate. Again, the
+ path consists of two sub-paths:
+
+ * {S,N2,PQ}: path from the PLR to the alternate.
+
+ * {PQ,R5,D}: path from the alternate to the destination.
+
+ As displayed in Figure 7, some parts of the alternate path may fan
+ out to multiple paths due to ECMP.
+
+
+
+
+
+Litkowski, et al. Standards Track [Page 18]
+
+RFC 7916 LFA Manageability July 2016
+
+
+6.2.5.2. Alternate Path Attributes
+
+ Some criteria listed in the previous sections require the retrieval
+ of some characteristics of the alternate path (SRLG, bandwidth,
+ color, tag, etc.). We call these characteristics "path attributes".
+ A path attribute can record a list of node properties (e.g., node
+ tag) or link properties (e.g., link color).
+
+ This document defines two types of path attributes:
+
+ o Cumulative attribute: When a path attribute is cumulative, the
+ implementation SHOULD record the value of the attribute on each
+ element (link and node) along the alternate path. SRLG, link
+ color, and node color are cumulative attributes.
+
+ o Unitary attribute: When a path attribute is unitary, the
+ implementation SHOULD record the value of the attribute only on
+ the first element along the alternate path (first node, or first
+ link). Bandwidth is a unitary attribute.
+
+ N1 -- R1 ---- R2
+ / \
+ / 50 R4
+ / \
+ S -------- E ------- D
+
+ Figure 8
+
+ In Figure 8, N1 is a connected alternate to reach D from S. We
+ consider that all links have a RED color except {R1,R2}, which is
+ BLUE. We consider all links to be 10 Gbps except {N1,R1}, which is
+ 2.5 Gbps. The bandwidth attribute collected for the alternate path
+ will be 10 Gbps. As the attribute is unitary, only the link speed of
+ the first link {S,N1} is recorded. The link color attribute
+ collected for the alternate path will be {RED,RED,BLUE,RED,RED}. As
+ the attribute is cumulative, the value of the attribute on each link
+ along the path is recorded.
+
+6.2.5.3. Connected Alternate
+
+ For an alternate path using a connected alternate:
+
+ o Attributes from the PLR to the alternate are retrieved from the
+ interface connected to the alternate. If the alternate is
+ connected through multiple interfaces, the evaluation of
+ attributes SHOULD be done once per interface (each interface is
+ considered as a separate alternate) and once per ECMP group of
+ interfaces (Layer 3 bundle).
+
+
+
+Litkowski, et al. Standards Track [Page 19]
+
+RFC 7916 LFA Manageability July 2016
+
+
+ o Path attributes from the alternate to the destination are
+ retrieved from the SPT rooted at the alternate. As the alternate
+ is a connected alternate, the SPT has already been computed to
+ find the alternate, so there is no need for additional
+ computation.
+
+ N1 -- R1 ---- R2
+ 50//50 \
+ // \
+ i1//i2 \
+ S -------- E -------- D
+
+ Figure 9
+
+ In Figure 9, we consider a primary path from S to D, with S using E
+ as the primary next hop. All metrics are considered as 1 except
+ {S,N1} links, which are using a metric of 50. We consider the
+ following SRLGs on links:
+
+ o {S,N1} using i1: SRLG1,SRLG10.
+
+ o {S,N1} using i2: SRLG2,SRLG20.
+
+ o {N1,R1}: SRLG3.
+
+ o {R1,R2}: SRLG4.
+
+ o {R2,D}: SRLG5.
+
+ o {S,E}: SRLG10.
+
+ o {E,D}: SRLG6.
+
+ S is connected to the alternate using two interfaces: i1 and i2.
+
+ If i1 and i2 are not part of an ECMP group, the evaluation of
+ attributes is done once per interface, and each interface is
+ considered as a separate alternate path. Two alternate paths will be
+ available with the associated SRLG attributes:
+
+ o Alternate path #1: {S,N1 using if1,R1,R2,D}:
+ SRLG1,SRLG10,SRLG3,SRLG4,SRLG5.
+
+ o Alternate path #2: {S,N1 using if2,R1,R2,D}:
+ SRLG2,SRLG20,SRLG3,SRLG4,SRLG5.
+
+ Alternate path #1 is sharing risks with the primary path and may be
+ pruned, or its preference may be revoked, per user-defined policy.
+
+
+
+Litkowski, et al. Standards Track [Page 20]
+
+RFC 7916 LFA Manageability July 2016
+
+
+ If i1 and i2 are part of an ECMP group, the evaluation of attributes
+ is done once per ECMP group, and the implementation considers a
+ single alternate path {S,N1 using if1|if2,R1,R2,D} with the following
+ SRLG attributes: SRLG1,SRLG10,SRLG2,SRLG20,SRLG3,SRLG4,SRLG5. The
+ alternate path is sharing risks with the primary path and may be
+ pruned, or its preference may be revoked, per user-defined policy.
+
+6.2.5.4. Remote Alternate
+
+ For alternate path using a remote alternate (tunnel):
+
+ o Attributes on the path from the PLR to the alternate are retrieved
+ using the PLR's primary SPT (when using a PQ node from the
+ P-space) or the immediate neighbor's SPT (when using a PQ from the
+ extended P-space). These are then combined with the attributes of
+ the link(s) to reach the immediate neighbor. In both cases, no
+ additional SPT is required.
+
+ o Attributes from the remote alternate to the destination path may
+ be retrieved from the SPT rooted at the remote alternate. An
+ additional forward SPT is required for each remote alternate
+ (PQ node), as indicated in Section 2.3.2 of [REMOTE-LFA-NODE]. In
+ some remote-alternate scenarios, like [TI-LFA], alternate-to-
+ destination path attributes may be obtained using a different
+ technique.
+
+ The number of remote alternates may be very high. In the case of
+ remote LFAs, simulations of real-world network topologies have shown
+ that as many as hundreds of PQs are possible. The computational
+ overhead of collecting all path attributes of all such PQs to
+ destination paths could grow beyond reasonable levels.
+
+ To handle this situation, implementations need to limit the number of
+ remote alternates to be evaluated to a finite number before
+ collecting alternate path attributes and running the policy
+ evaluation. Section 2.3.3 of [REMOTE-LFA-NODE] provides a way to
+ reduce the number of PQs to be evaluated.
+
+ Some other remote alternate techniques using static or dynamic
+ tunnels may not require this pruning.
+
+
+
+
+
+
+
+
+
+
+
+Litkowski, et al. Standards Track [Page 21]
+
+RFC 7916 LFA Manageability July 2016
+
+
+ Link Remote Remote
+ alternate alternate alternate
+ ------------- ------------------ -------------
+ Alternates | LFA | | rLFA (PQs) | | Static/ |
+ | | | | | Dynamic |
+ sources | | | | | tunnels |
+ ------------- ------------------ -------------
+ | | |
+ | | |
+ | -------------------------- |
+ | | Prune some alternates | |
+ | | (sorting strategy) | |
+ | -------------------------- |
+ | | |
+ | | |
+ ------------------------------------------------
+ | Collect alternate attributes |
+ ------------------------------------------------
+ |
+ |
+ -------------------------
+ | Evaluate policy |
+ -------------------------
+ |
+ |
+ Best alternates
+
+ Figure 10
+
+6.2.5.5. Collecting Attributes in the Case of Multiple Paths
+
+ As described in Section 6.2.5, there may be some situations where an
+ alternate path or part of an alternate path fans out to multiple
+ paths (e.g., ECMP). When collecting path attributes in such a case,
+ an implementation SHOULD consider the union of attributes of each
+ sub-path.
+
+ In Figure 7 (in Section 6.2.5.1), S has two alternate paths to
+ reach D. Each alternate path fans out to multiple paths due to ECMP.
+ Consider the following link color attributes: all links are RED
+ except {R1,R3}, which is BLUE. The user wants to use an alternate
+ path with only RED links. The first alternate path
+ {S,N1,R1,R2|R3,R4,D} does not fit the constraint, as {R1,R3} is BLUE.
+ The second alternate path {S,N2,PQ,R5,D} fits the constraint and will
+ be preferred, as it uses only RED links.
+
+
+
+
+
+
+Litkowski, et al. Standards Track [Page 22]
+
+RFC 7916 LFA Manageability July 2016
+
+
+6.2.6. ECMP LFAs
+
+ 10
+ PE2 - PE3
+ | |
+ 50 | 5 | 50
+ P1----P2
+ \\ //
+ 50 \\ // 50
+ PE1
+
+ Links between P1 and PE1 are L1 and L2.
+ Links between P2 and PE1 are L3 and L4.
+
+ Figure 11
+
+ In Figure 11, the primary path from PE1 to PE2 is through P1, using
+ ECMP on two parallel links -- L1 and L2. In the case of standard
+ ECMP behavior, if L1 is failing, the post-convergence next hop would
+ become L2 and ECMP would no longer be in use. If an LFA is
+ activated, as stated in Section 3.4 of [RFC5286], "alternate
+ next-hops may themselves also be primary next-hops, but need not be"
+ and "alternate next-hops should maximize the coverage of the failure
+ cases." In this scenario, there is no alternate providing node
+ protection, so PE1 will prefer L2 as the alternate to protect L1;
+ this makes sense compared to post-convergence behavior.
+
+ Consider a different scenario, again referring to Figure 11, where L1
+ and L2 are configured as a Layer 3 bundle using a local feature and
+ L3/L4 comprise a second Layer 3 bundle. Layer 3 bundles are
+ configured as if a link in the bundle is failing; the traffic must be
+ rerouted out of the bundle. Layer 3 bundles are generally introduced
+ to increase bandwidth between nodes. In a nominal situation, ECMP is
+ still available from PE1 to PE2, but if L1 is failing, the
+ post-convergence next hop would become the ECMP on L3 and L4. In
+ this case, LFA behavior SHOULD be adapted in order to reflect the
+ bandwidth requirement.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Litkowski, et al. Standards Track [Page 23]
+
+RFC 7916 LFA Manageability July 2016
+
+
+ We would expect the following FIB entry on PE1:
+
+ On PE1: PE2 +--> ECMP -> L1
+ | |
+ | +----> L2
+ |
+ +--> LFA (ECMP) -> L3
+ |
+ +----------> L4
+
+ Figure 12
+
+ If L1 or L2 is failing, traffic must be switched on the LFA ECMP
+ bundle rather than using the other primary next hop.
+
+ As mentioned in Section 3.4 of [RFC5286], protecting a link within an
+ ECMP by another primary next hop is not a MUST. Moreover, as already
+ discussed in this document, maximizing coverage against the failure
+ cases may not be the right approach, and a policy-based choice of an
+ alternate may be preferred.
+
+ An implementation SHOULD allow setting a preference to protect a
+ primary next hop with another primary next hop. An implementation
+ SHOULD also allow setting a preference to protect a primary next hop
+ with a NON-primary next hop. An implementation SHOULD allow the use
+ of an ECMP bundle as an LFA.
+
+7. Operational Aspects
+
+7.1. No-Transit Condition on LFA Computing Node
+
+ In Section 3.5 of [RFC5286], the setting of the no-transit condition
+ (through the IS-IS overload bit or the OSPF R-bit) in an LFA
+ computation is only taken into account for the case where a neighbor
+ has the no-transit condition set.
+
+ In addition to Inequality 1 (Loop-Free Criterion)
+ (Distance_opt(N, D) < Distance_opt(N, S) + Distance_opt(S, D))
+ [RFC5286], the IS-IS overload bit or the OSPF R-bit of the LFA
+ calculating neighbor (S) SHOULD be taken into account. Indeed, if it
+ has the IS-IS overload bit set or the OSPF R-bit clear, no neighbor
+ will loop traffic back to itself.
+
+ An OSPF router acting as a stub router [RFC6987] SHOULD behave as if
+ the R-bit was clear regarding the LFA computation.
+
+
+
+
+
+
+Litkowski, et al. Standards Track [Page 24]
+
+RFC 7916 LFA Manageability July 2016
+
+
+7.2. Manual Triggering of FRR
+
+ Service providers often perform manual link shutdown (using a
+ router's command-line interface (CLI)) to perform network
+ changes/tests. A manual link shutdown may be done at multiple
+ levels: physical interface, logical interface, IGP interface,
+ Bidirectional Forwarding Detection (BFD) session, etc. In
+ particular, testing or troubleshooting FRR requires that manual
+ shutdown be performed on the remote end of the link, as a local
+ shutdown would not generally trigger FRR.
+
+ To permit such a situation, an implementation SHOULD support
+ triggering/activating LFA FRR for a given link when a manual shutdown
+ is done on a component that currently supports FRR activation.
+
+ An implementation MAY also support FRR activation for a specific
+ interface or a specific prefix on a primary next-hop interface and
+ revert without any action on any running component of the node (links
+ or protocols). In this use case, the FRR activation time needs to be
+ controlled by a timer in case the operator forgot to revert the
+ traffic to the primary path. When the timer expires, the traffic is
+ automatically reverted to the primary path. This will simplify the
+ testing of the FRR path; traffic can then be reverted back to the
+ primary path without causing a global network convergence.
+
+ For example:
+
+ o If an implementation supports FRR activation upon a BFD
+ session-down event, that implementation SHOULD support FRR
+ activation when a manual shutdown is done on the BFD session. But
+ if an implementation does not support FRR activation upon a BFD
+ session-down event, there is no need for that implementation to
+ support FRR activation upon manual shutdown of a BFD session.
+
+ o If an implementation supports FRR activation upon a physical
+ link-down event (e.g., Rx laser "off" detection, error threshold
+ raised), that implementation SHOULD support FRR activation when a
+ manual shutdown of a physical interface is done. But if an
+ implementation does not support FRR activation upon a physical
+ link-down event, there is no need for that implementation to
+ support FRR activation upon manual shutdown of a physical link.
+
+ o A CLI command may allow switching from the primary path to the FRR
+ path to test the FRR path for a specific interface or prefix.
+ There is no impact on the control plane; only the data plane of
+ the local node may be changed. A similar command may allow
+ switching traffic back from the FRR path to the primary path.
+
+
+
+
+Litkowski, et al. Standards Track [Page 25]
+
+RFC 7916 LFA Manageability July 2016
+
+
+7.3. Required Local Information
+
+ The introduction of LFAs in a network requires some enhancements to
+ standard routing information provided by implementations. Moreover,
+ due to "non-100%" coverage, coverage information is also required.
+
+ Hence, an implementation:
+
+ o MUST be able to display, for every prefix, the primary next hop as
+ well as the alternate next-hop information.
+
+ o MUST provide coverage information per LFA activation domain (area,
+ level, topology, instance, virtual router, address family, etc.).
+
+ o MUST provide the number of protected prefixes as well as
+ non-protected prefixes globally.
+
+ o SHOULD provide the number of protected prefixes as well as
+ non-protected prefixes per link.
+
+ o MAY provide the number of protected prefixes as well as
+ non-protected prefixes per priority if the implementation supports
+ prefix-priority insertion in the RIB/FIB.
+
+ o SHOULD provide a reason for choosing an alternate (policy and
+ criteria) and for excluding an alternate.
+
+ o SHOULD provide the list of non-protected prefixes and the reason
+ why they are not protected (e.g., no protection required, no
+ alternate available).
+
+7.4. Coverage Monitoring
+
+ It is pretty easy to evaluate the coverage of a network in a nominal
+ situation, but topology changes may change the level of coverage. In
+ some situations, the network may no longer be able to provide the
+ required level of protection. Hence, it becomes very important for
+ service providers to receive alerts regarding changes in coverage.
+
+ An implementation SHOULD:
+
+ o provide an alert system if total coverage (for a node) is below a
+ defined threshold or when coverage returns to normal.
+
+ o provide an alert system if coverage for a specific link is below a
+ defined threshold or when coverage returns to normal.
+
+
+
+
+
+Litkowski, et al. Standards Track [Page 26]
+
+RFC 7916 LFA Manageability July 2016
+
+
+ An implementation MAY:
+
+ o trigger an alert if a specific destination is not protected
+ anymore or when protection comes back up for this destination.
+
+ Although the procedures for providing alerts are beyond the scope of
+ this document, we recommend that implementations consider standard
+ and well-used mechanisms like syslog or SNMP traps.
+
+7.5. LFAs and Network Planning
+
+ The operator may choose to run simulations in order to ensure a
+ certain type of full coverage for the whole network or a given subset
+ of the network. This is particularly likely if he operates the
+ network in the sense of the third backbone profile described in
+ Section 4 of [RFC6571]; that is, he seeks to design and engineer the
+ network topology in such a way that a certain level of coverage is
+ always achieved. Obviously, a complete and exact simulation of the
+ IP FRR coverage can only be achieved if the behavior is deterministic
+ and the algorithm used is available to the simulation tool. Thus, an
+ implementation SHOULD:
+
+ o Behave deterministically in its LFA selection process. That is,
+ in the same topology and with the same policy configuration, the
+ implementation MUST always choose the same alternate for a given
+ prefix.
+
+ o Document its behavior. The implementation SHOULD provide enough
+ documentation regarding its behavior to allow an implementer of a
+ simulation tool to foresee the exact choice of the LFA
+ implementation for every prefix in a given topology. This SHOULD
+ take into account all possible policy configuration options. One
+ possible way to document this behavior is to disclose the
+ algorithm used to choose alternates.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Litkowski, et al. Standards Track [Page 27]
+
+RFC 7916 LFA Manageability July 2016
+
+
+8. Security Considerations
+
+ The policy mechanism introduced in this document allows the tuning of
+ the selection of the alternate. This is not seen as a security
+ threat, because:
+
+ o all candidates are already eligible as per [RFC5286] and
+ considered usable.
+
+ o the policy is based on information from the router's own
+ configuration and from the IGP, both of which are considered
+ trusted.
+
+ Hence, this document does not introduce any new security
+ considerations as compared to [RFC5286].
+
+ As noted above, the policy mechanism introduced in this document
+ allows the tuning of the selection of the best alternate but does not
+ change the list of alternates that are eligible. As described in
+ Section 7 of [RFC5286], this best alternate "can be used anyway when
+ a different topological change occurs, and hence this can't be viewed
+ as a new security threat."
+
+9. References
+
+9.1. Normative References
+
+ [ISO10589] International Organization for Standardization,
+ "Intermediate System to Intermediate System intra-domain
+ routeing information exchange protocol for use in
+ conjunction with the protocol for providing the
+ connectionless-mode network service (ISO 8473)",
+ ISO Standard 10589, 2002.
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119,
+ DOI 10.17487/RFC2119, March 1997,
+ <http://www.rfc-editor.org/info/rfc2119>.
+
+ [RFC3630] Katz, D., Kompella, K., and D. Yeung, "Traffic Engineering
+ (TE) Extensions to OSPF Version 2", RFC 3630,
+ DOI 10.17487/RFC3630, September 2003,
+ <http://www.rfc-editor.org/info/rfc3630>.
+
+ [RFC4203] Kompella, K., Ed., and Y. Rekhter, Ed., "OSPF Extensions
+ in Support of Generalized Multi-Protocol Label Switching
+ (GMPLS)", RFC 4203, DOI 10.17487/RFC4203, October 2005,
+ <http://www.rfc-editor.org/info/rfc4203>.
+
+
+
+Litkowski, et al. Standards Track [Page 28]
+
+RFC 7916 LFA Manageability July 2016
+
+
+ [RFC5286] Atlas, A., Ed., and A. Zinin, Ed., "Basic Specification
+ for IP Fast Reroute: Loop-Free Alternates", RFC 5286,
+ DOI 10.17487/RFC5286, September 2008,
+ <http://www.rfc-editor.org/info/rfc5286>.
+
+ [RFC5305] Li, T. and H. Smit, "IS-IS Extensions for Traffic
+ Engineering", RFC 5305, DOI 10.17487/RFC5305,
+ October 2008, <http://www.rfc-editor.org/info/rfc5305>.
+
+ [RFC5307] Kompella, K., Ed., and Y. Rekhter, Ed., "IS-IS Extensions
+ in Support of Generalized Multi-Protocol Label Switching
+ (GMPLS)", RFC 5307, DOI 10.17487/RFC5307, October 2008,
+ <http://www.rfc-editor.org/info/rfc5307>.
+
+ [RFC5340] Coltun, R., Ferguson, D., Moy, J., and A. Lindem, "OSPF
+ for IPv6", RFC 5340, DOI 10.17487/RFC5340, July 2008,
+ <http://www.rfc-editor.org/info/rfc5340>.
+
+ [RFC6571] Filsfils, C., Ed., Francois, P., Ed., Shand, M., Decraene,
+ B., Uttaro, J., Leymann, N., and M. Horneffer, "Loop-Free
+ Alternate (LFA) Applicability in Service Provider (SP)
+ Networks", RFC 6571, DOI 10.17487/RFC6571, June 2012,
+ <http://www.rfc-editor.org/info/rfc6571>.
+
+ [RFC6987] Retana, A., Nguyen, L., Zinin, A., White, R., and D.
+ McPherson, "OSPF Stub Router Advertisement", RFC 6987,
+ DOI 10.17487/RFC6987, September 2013,
+ <http://www.rfc-editor.org/info/rfc6987>.
+
+ [RFC7490] Bryant, S., Filsfils, C., Previdi, S., Shand, M., and N.
+ So, "Remote Loop-Free Alternate (LFA) Fast Reroute (FRR)",
+ RFC 7490, DOI 10.17487/RFC7490, April 2015,
+ <http://www.rfc-editor.org/info/rfc7490>.
+
+ [RFC7777] Hegde, S., Shakir, R., Smirnov, A., Li, Z., and B.
+ Decraene, "Advertising Node Administrative Tags in OSPF",
+ RFC 7777, DOI 10.17487/RFC7777, March 2016,
+ <http://www.rfc-editor.org/info/rfc7777>.
+
+ [RFC7917] Sarkar, P., Ed., Gredler, H., Hegde, S., Litkowski, S.,
+ and B. Decraene, "Advertising Node Administrative Tags in
+ IS-IS", RFC 7917, DOI 10.17487/RFC7917, July 2016,
+ <http://www.rfc-editor.org/info/rfc7917>.
+
+
+
+
+
+
+
+
+Litkowski, et al. Standards Track [Page 29]
+
+RFC 7916 LFA Manageability July 2016
+
+
+9.2. Informative References
+
+ [REMOTE-LFA-NODE]
+ Sarkar, P., Ed., Hegde, S., Bowers, C., Gredler, H., and
+ S. Litkowski, "Remote-LFA Node Protection and
+ Manageability", Work in Progress,
+ draft-ietf-rtgwg-rlfa-node-protection-05, December 2015.
+
+ [SEG-RTG-ARCH]
+ Filsfils, C., Ed., Previdi, S., Ed., Decraene, B.,
+ Litkowski, S., and R. Shakir, "Segment Routing
+ Architecture", Work in Progress,
+ draft-ietf-spring-segment-routing-09, July 2016.
+
+ [TI-LFA] Francois, P., Filsfils, C., Bashandy, A., Decraene, B.,
+ and S. Litkowski, "Topology Independent Fast Reroute using
+ Segment Routing", Work in Progress,
+ draft-francois-segment-routing-ti-lfa-00, November 2013.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Litkowski, et al. Standards Track [Page 30]
+
+RFC 7916 LFA Manageability July 2016
+
+
+Contributors
+
+ Significant contributions were made by Pierre Francois, Hannes
+ Gredler, Chris Bowers, Jeff Tantsura, Uma Chunduri, Acee Lindem, and
+ Mustapha Aissaoui, whom the authors would like to acknowledge.
+
+Authors' Addresses
+
+ Stephane Litkowski (editor)
+ Orange
+
+ Email: stephane.litkowski@orange.com
+
+
+ Bruno Decraene
+ Orange
+
+ Email: bruno.decraene@orange.com
+
+
+ Clarence Filsfils
+ Cisco Systems
+
+ Email: cfilsfil@cisco.com
+
+
+ Kamran Raza
+ Cisco Systems
+
+ Email: skraza@cisco.com
+
+
+ Martin Horneffer
+ Deutsche Telekom
+
+ Email: Martin.Horneffer@telekom.de
+
+
+ Pushpasis Sarkar
+ Individual Contributor
+
+ Email: pushpasis.ietf@gmail.com
+
+
+
+
+
+
+
+
+
+Litkowski, et al. Standards Track [Page 31]
+