summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc4206.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc4206.txt')
-rw-r--r--doc/rfc/rfc4206.txt787
1 files changed, 787 insertions, 0 deletions
diff --git a/doc/rfc/rfc4206.txt b/doc/rfc/rfc4206.txt
new file mode 100644
index 0000000..95b275c
--- /dev/null
+++ b/doc/rfc/rfc4206.txt
@@ -0,0 +1,787 @@
+
+
+
+
+
+
+Network Working Group K. Kompella
+Request for Comments: 4206 Y. Rekhter
+Category: Standards Track Juniper Networks
+ October 2005
+
+
+ Label Switched Paths (LSP) Hierarchy with
+ Generalized Multi-Protocol Label Switching (GMPLS)
+ Traffic Engineering (TE)
+
+Status of This Memo
+
+ This document specifies an Internet standards track protocol for the
+ Internet community, and requests discussion and suggestions for
+ improvements. Please refer to the current edition of the "Internet
+ Official Protocol Standards" (STD 1) for the standardization state
+ and status of this protocol. Distribution of this memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (2005).
+
+Abstract
+
+ To improve scalability of Generalized Multi-Protocol Label Switching
+ (GMPLS) it may be useful to aggregate Label Switched Paths (LSPs) by
+ creating a hierarchy of such LSPs. A way to create such a hierarchy
+ is by (a) a Label Switching Router (LSR) creating a Traffic
+ Engineering Label Switched Path (TE LSP), (b) the LSR forming a
+ forwarding adjacency (FA) out of that LSP (by advertising this LSP as
+ a Traffic Engineering (TE) link into the same instance of ISIS/OSPF
+ as the one that was used to create the LSP), (c) allowing other LSRs
+ to use FAs for their path computation, and (d) nesting of LSPs
+ originated by other LSRs into that LSP (by using the label stack
+ construct).
+
+ This document describes the mechanisms to accomplish this.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Kompella & Rekhter Standards Track [Page 1]
+
+RFC 4206 LSP Hierarchy with GMPLS TE October 2005
+
+
+Table of Contents
+
+ 1. Overview ........................................................2
+ 2. Specification of Requirements ...................................3
+ 3. Routing Aspects .................................................4
+ 3.1. Traffic Engineering Parameters .............................4
+ 3.1.1. Link Type (OSPF Only) ...............................5
+ 3.1.2. Link ID (OSPF Only) .................................5
+ 3.1.3. Local and Remote Interface IP Address ...............5
+ 3.1.4. Local and Remote Link Identifiers ...................5
+ 3.1.5. Traffic Engineering Metric ..........................5
+ 3.1.6. Maximum Bandwidth ...................................5
+ 3.1.7. Unreserved Bandwidth ................................5
+ 3.1.8. Resource Class/Color ................................5
+ 3.1.9. Interface Switching Capability ......................6
+ 3.1.10. SRLG Information ...................................6
+ 4. Other Considerations ............................................6
+ 5. Controlling FA-LSPs Boundaries ..................................7
+ 5.1. LSP Regions ................................................7
+ 6. Signalling Aspects ..............................................8
+ 6.1. Common Procedures ..........................................8
+ 6.1.1. RSVP-TE .............................................8
+ 6.1.2. CR-LDP ..............................................9
+ 6.2. Specific Procedures .......................................10
+ 6.3. FA-LSP Holding Priority ...................................11
+ 7. Security Considerations ........................................11
+ 8. Acknowledgements ...............................................12
+ 9. Normative References ...........................................12
+ 10. Informative References ........................................13
+
+1. Overview
+
+ An LSR uses Generalized MPLS (GMPLS) TE procedures to create and
+ maintain an LSP. The LSR then may (under local configuration
+ control) announce this LSP as a Traffic Engineering (TE) link into
+ the same instance of the GMPLS control plane (or, more precisely, its
+ ISIS/OSPF component) as the one that was used to create the LSP. We
+ call such a link a "forwarding adjacency" (FA). We refer to the LSP
+ as the "forwarding adjacency LSP", or just FA-LSP. Note that an FA-
+ LSP is both created and used as a TE link by exactly the same
+ instance of the GMPLS control plane. Thus, the concept of an FA is
+ applicable only when an LSP is both created and used as a TE link by
+ exactly the same instance of the GMPLS control plane. Note also that
+ an FA is a TE link between two GMPLS nodes whose path transits zero
+ or more (G)MPLS nodes in the same instance of the GMPLS control
+ plane.
+
+
+
+
+
+Kompella & Rekhter Standards Track [Page 2]
+
+RFC 4206 LSP Hierarchy with GMPLS TE October 2005
+
+
+ The nodes connected by a 'basic' TE link may have a routing
+ adjacency; however, the nodes connected by an FA would not usually
+ have a routing adjacency. A TE link of any kind (either 'basic' or
+ FA) would have to have a signaling adjacency in order for it to be
+ used to establish an LSP across it.
+
+ In general, the creation/termination of an FA and its FA-LSP could be
+ driven either by mechanisms outside of GMPLS (e.g., via configuration
+ control on the LSR at the head-end of the adjacency), or by
+ mechanisms within GMPLS (e.g., as a result of the LSR at the head-end
+ of the adjacency receiving LSP setup requests originated by some
+ other LSRs).
+
+ ISIS/OSPF floods the information about FAs just as it floods the
+ information about any other links. As a result of this flooding, an
+ LSR has in its TE link state database the information about not just
+ basic TE links, but FAs as well.
+
+ An LSR, when performing path computation, uses not just basic TE
+ links, but FAs as well. Once a path is computed, the LSR uses
+ RSVP/CR-LDP [RSVP-TE, CR-LDP] for establishing label binding along
+ the path.
+
+ In this document we define mechanisms/procedures to accomplish the
+ above. These mechanisms/procedures cover both the routing
+ (ISIS/OSPF) and the signalling (RSVP/CR-LDP) aspects.
+
+ Note that an LSP may be advertised as a point-to-point link into ISIS
+ or OSPF, to be used in normal SPF by nodes other than the head-end.
+ While this is similar in spirit to an FA, this is beyond the scope of
+ this document.
+
+ Scenarios where an LSP is created (and maintained) by one instance of
+ the GMPLS control plane, and is used as a (TE) link by another
+ instance of the GMPLS control plane, are outside the scope of this
+ document.
+
+2. Specification of Requirements
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
+ document are to be interpreted as described in BCP 14, RFC 2119
+ [RFC2119].
+
+
+
+
+
+
+
+
+Kompella & Rekhter Standards Track [Page 3]
+
+RFC 4206 LSP Hierarchy with GMPLS TE October 2005
+
+
+3. Routing Aspects
+
+ In this section we describe procedures for constructing FAs out of
+ LSPs, and handling of FAs by ISIS/OSPF. Specifically, this section
+ describes how to construct the information needed to advertise LSPs
+ as links into ISIS/OSPF. Procedures for creation/termination of such
+ LSPs are defined in Section 5, "Controlling FA-LSPs boundaries".
+
+ FAs may be represented as either unnumbered or numbered links. If
+ FAs are numbered with IPv4 addresses, the local and remote IPv4
+ addresses come out of a /31 that is allocated by the LSR that
+ originates the FA-LSP; the head-end address of the FA-LSP is the one
+ specified as the IPv4 tunnel sender address; the remote (tail-end)
+ address can then be inferred. If the LSP is bidirectional, the
+ tail-end can thus know the addresses to assign to the reverse FA.
+
+ If there are multiple LSPs that all originate on one LSR and all
+ terminate on another LSR, then at one end of the spectrum all these
+ LSPs could be merged (under control of the head-end LSR) into a
+ single FA using the concept of Link Bundling (see [BUNDLE]); while at
+ the other end of the spectrum each such LSP could be advertised as
+ its own adjacency.
+
+ When an FA is created under administrative control (static
+ provisioning), the attributes of the FA-LSP have to be provided via
+ configuration. Specifically, the following attributes may be
+ configured for the FA-LSP: the head-end address (if left
+ unconfigured, this defaults to the head-end LSR's Router ID); the
+ tail-end address; bandwidth and resource colors constraints. The
+ path taken by the FA-LSP may be either computed by the LSR at the
+ head-end of the FA-LSP, or specified by explicit configuration; this
+ choice is determined by configuration.
+
+ When an FA is created dynamically, the attributes of its FA-LSP are
+ inherited from the LSP that induced its creation. Note that the
+ bandwidth of the FA-LSP must be at least as big as the LSP that
+ induced it, but may be bigger if only discrete bandwidths are
+ available for the FA-LSP. In general, for dynamically provisioned
+ FAs, a policy-based mechanism may be needed to associate attributes
+ to the FA-LSPs.
+
+3.1. Traffic Engineering Parameters
+
+ In this section, the Traffic Engineering parameters (see [OSPF-TE]
+ and [ISIS-TE]) for FAs are described.
+
+
+
+
+
+
+Kompella & Rekhter Standards Track [Page 4]
+
+RFC 4206 LSP Hierarchy with GMPLS TE October 2005
+
+
+3.1.1. Link Type (OSPF Only)
+
+ The Link Type of an FA is set to "point-to-point".
+
+3.1.2. Link ID (OSPF Only)
+
+ The Link ID is set to the Router ID of the tail-end of FA-LSP.
+
+3.1.3. Local and Remote Interface IP Address
+
+ If the FA is to be numbered, the local interface IP address (OSPF) or
+ IPv4 interface address (ISIS) is set to the head-end address of the
+ FA-LSP. The remote interface IP address (OSPF) or IPv4 neighbor
+ address (ISIS) is set to the tail-end address of the FA-LSP.
+
+3.1.4. Local and Remote Link Identifiers
+
+ For an unnumbered FA, the assignment and handling of the local and
+ remote link identifiers is specified in [UNNUM-RSVP], [UNNUM-CRLDP].
+
+3.1.5. Traffic Engineering Metric
+
+ By default the TE metric on the FA is set to max(1, (the TE metric of
+ the FA-LSP path) - 1) so that it attracts traffic in preference to
+ setting up a new LSP. This may be overridden via configuration at
+ the head-end of the FA.
+
+3.1.6. Maximum Bandwidth
+
+ By default, the Maximum Reservable Bandwidth and the initial Maximum
+ LSP Bandwidth for all priorities of the FA is set to the bandwidth of
+ the FA-LSP. These may be overridden via configuration at the head-
+ end of the FA (note that the Maximum LSP Bandwidth at any one
+ priority should be no more than the bandwidth of the FA-LSP).
+
+3.1.7. Unreserved Bandwidth
+
+ The initial unreserved bandwidth for all priority levels of the FA is
+ set to the bandwidth of the FA-LSP.
+
+3.1.8. Resource Class/Color
+
+ By default, an FA does not have resource colors (administrative
+ groups). This may be overridden by configuration at the head-end of
+ the FA.
+
+
+
+
+
+
+Kompella & Rekhter Standards Track [Page 5]
+
+RFC 4206 LSP Hierarchy with GMPLS TE October 2005
+
+
+3.1.9. Interface Switching Capability
+
+ The (near-end) Interface Switching Capability associated with the FA
+ is the (near end) Interface Switching Capability of the first link in
+ the FA-LSP.
+
+ When the (near-end) Interface Switching Capability field is PSC-1,
+ PSC-2, PSC-3, or PSC-4, the specific information includes Interface
+ MTU and Minimum LSP Bandwidth. The Interface MTU is the minimum MTU
+ along the path of the FA-LSP; the Minimum LSP Bandwidth is the
+ bandwidth of the LSP.
+
+3.1.10. SRLG Information
+
+ An FA advertisement could contain the information about the Shared
+ Risk Link Groups (SRLG) for the path taken by the FA-LSP associated
+ with that FA. This information may be used for path calculation by
+ other LSRs. The information carried is the union of the SRLGs of the
+ underlying TE links that make up the FA-LSP path; it is carried in
+ the SRLG TLV in IS-IS or the SRLG sub-TLV of the TE Link TLV in OSPF.
+ See [GMPLS-ISIS, GMPLS-OSPF] for details on the format of this
+ information.
+
+ It is possible that the underlying path information might change over
+ time, via configuration updates or dynamic route modifications,
+ resulting in the change of the SRLG TLV.
+
+ If FAs are bundled (via link bundling), and if the resulting bundled
+ link carries an SRLG TLV, it MUST be the case that the list of SRLGs
+ in the underlying path, followed by each of the FA-LSPs that form the
+ component links, is the same (note that the exact paths need not be
+ the same).
+
+4. Other Considerations
+
+ It is expected that FAs will not be used for establishing ISIS/OSPF
+ peering relation between the routers at the ends of the adjacency.
+
+ It may be desired in some cases to use FAs only in Traffic
+ Engineering path computations. In IS-IS, this can be accomplished by
+ setting the default metric of the extended IS reachability TLV for
+ the FA to the maximum link metric (2^24 - 1). In OSPF, this can be
+ accomplished by not advertising the link as a regular LSA, but only
+ as a TE opaque LSA.
+
+
+
+
+
+
+
+Kompella & Rekhter Standards Track [Page 6]
+
+RFC 4206 LSP Hierarchy with GMPLS TE October 2005
+
+
+5. Controlling FA-LSPs Boundaries
+
+ To facilitate controlling the boundaries of FA-LSPs, this document
+ introduces two new mechanisms: Interface Switching Capability (see
+ [GMPLS-ISIS, GMPLS-OSPF], and "LSP region" (or just "region").
+
+5.1. LSP Regions
+
+ The information carried in the Interface Switching Capabilities is
+ used to construct LSP regions and to determine regions' boundaries as
+ follows.
+
+ Define an ordering among interface switching capabilities as follows:
+ PSC-1 < PSC-2 < PSC-3 < PSC-4 < TDM < LSC < FSC. Given two
+ interfaces if-1 and if-2 with interface switching capabilities isc-1
+ and isc-2 respectively, say that if-1 < if-2 iff isc-1 < isc-2 or
+ isc-1 == isc-2 == TDM, and if-1's max LSP bandwidth is less than if-
+ 2's max LSP bandwidth.
+
+ Suppose an LSP's path is as follows: node-0, link-1, node-1, link-2,
+ node-2, ..., link-n, node-n. Moreover, for link-i denote by [link-i,
+ node-(i-1)] the interface that connects link-i to node-(i-1), and by
+ [link-i, node-i] the interface that connects link-i to node-i.
+
+ If [link-(i+1), node-i)] < [link-(i+1), node-(i+1)], we say that the
+ LSP has crossed a region boundary at node-i; with respect to that LSP
+ path, the LSR at node-i is an edge LSR. The 'other edge' of the
+ region with respect to the LSP path is node-k, where k is the
+ smallest number greater than i such that [link-(i+1), node-(i+1)]
+ equal [link-k, node-(k-1)], and [link-k, node-(k-1)] > [link-k,
+ node-k].
+
+ Path computation may take region boundaries into account when
+ computing a path for an LSP. For example, path computation may
+ restrict the path taken by an LSP to only the links whose Interface
+ Switching Capability is PSC-1.
+
+ Note that an interface may have multiple Interface Switching
+ Capabilities. In such a case, the test is whether if-i < if-j
+ depends on the Interface Switching Capabilities chosen for if-i and
+ if-j, which in turn determines whether or not there is a region
+ boundary at node-i.
+
+
+
+
+
+
+
+
+
+Kompella & Rekhter Standards Track [Page 7]
+
+RFC 4206 LSP Hierarchy with GMPLS TE October 2005
+
+
+6. Signalling Aspects
+
+ In this section we describe procedures that an LSR at the head-end of
+ an FA uses for handling LSP setup originated by other LSR.
+
+ As we mentioned before, establishment/termination of FA-LSPs may be
+ triggered either by mechanisms outside of GMPLS (e.g., via
+ administrative control), or by mechanisms within GMPLS (e.g., as a
+ result of the LSR at the edge of an aggregate LSP receiving LSP setup
+ requests originated by some other LSRs beyond LSP aggregate and its
+ edges). Procedures described in Section 6.1, "Common Procedures",
+ apply to both cases. Procedures described in Section 6.2, "Specific
+ Procedures", apply only to the latter case.
+
+6.1. Common Procedures
+
+ For the purpose of processing the ERO in a Path/Request message of an
+ LSP that is to be tunneled over an FA, an LSR at the head-end of the
+ FA-LSP views the LSR at the tail of that FA-LSP as adjacent (one IP
+ hop away).
+
+ How this is to be achieved for RSVP-TE and CR-LDP is described in the
+ following subsections.
+
+ In either case (RSVP-TE or CR-LDP), when an LSP is tunneled through
+ an FA-LSP, the LSR at the head-end of the FA-LSP subtracts the LSP's
+ bandwidth from the unreserved bandwidth of the FA.
+
+ In the presence of link bundling (when link bundling is applied to
+ FAs), when an LSP is tunneled through an FA-LSP, the LSR at the
+ head-end of the FA-LSP also needs to adjust Max LSP bandwidth of the
+ FA.
+
+6.1.1. RSVP-TE
+
+ If one uses RSVP-TE to signal an LSP to be tunneled over an FA-LSP,
+ then the Path message MUST contain an IF_ID RSVP_HOP object
+ [GRSVP-TE, GSIG] instead of an RSVP_HOP object; and the data
+ interface identification MUST identify the FA-LSP.
+
+ The preferred method of sending the Path message is to set the
+ destination IP address of the Path message to the computed NHOP for
+ that Path message. This NHOP address must be a routable address; in
+ the case of separate control and data planes, this must be a control
+ plane address.
+
+
+
+
+
+
+Kompella & Rekhter Standards Track [Page 8]
+
+RFC 4206 LSP Hierarchy with GMPLS TE October 2005
+
+
+ Furthermore, the IP header for the Path message MUST NOT have the
+ Router Alert option. The Path message is intended to be IP-routed to
+ the tail-end of the FA-LSP without being intercepted and processed as
+ an RSVP message by any of the intermediate nodes.
+
+ Finally, the IP TTL vs. RSVP TTL check MUST NOT be made. In general,
+ if the IF_ID RSVP_HOP object is used, this check must be disabled, as
+ the number of hops over the control plane may be greater than one.
+ Instead, the following check is done by the receiver Y of the IF_ID
+ RSVP_HOP object:
+
+ 1. Make sure that the data interface identified in the IF_ID RSVP_HOP
+ object actually terminates on Y.
+
+ 2. Find the "other end" of the above data interface, say X. Make
+ sure that the PHOP in the IF_ID RSVP_HOP object is a control
+ channel address that belongs to the same node as X.
+
+ How check #2 is carried out is beyond the scope of this document;
+ suffice it to say that it may require a Traffic Engineering Database,
+ or the use of LMP [LMP], or yet other means.
+
+ An alternative method is to encapsulate the Path message in an IP
+ tunnel (or, in the case that the Interface Switching Capability of
+ the FA-LSP is PSC[1-4], in the FA-LSP itself), and unicast the
+ message to the tail-end of the FA-LSP, without the Router Alert
+ option. This option may be needed if intermediate nodes process RSVP
+ messages regardless of whether the Router Alert option is present.
+
+ A PathErr sent in response to a Path message with an IF_ID RSVP_HOP
+ object SHOULD contain an IF_ID HOP object. (Note: a PathErr does not
+ normally carry an RSVP_HOP object, but in the case of separated
+ control and data, it is necessary to identify the data channel in the
+ PathErr message.)
+
+ The Resv message back to the head-end of the FA-LSP (PHOP) is IP-
+ routed to the PHOP in the Path message. If necessary, Resv Messages
+ MAY be encapsulated in another IP header whose destination IP address
+ is the PHOP of the received Path message.
+
+6.1.2. CR-LDP
+
+ If one uses CR-LDP to signal an LSP to be tunneled over an FA-LSP,
+ then the Request message MUST contain an IF_ID TLV [GCR-LDP] object,
+ and the data interface identification MUST identify the FA-LSP.
+
+
+
+
+
+
+Kompella & Rekhter Standards Track [Page 9]
+
+RFC 4206 LSP Hierarchy with GMPLS TE October 2005
+
+
+ Furthermore, the head-end LSR must create a targeted LDP session with
+ the tail-end LSR. The Request (Mapping) message is unicast from the
+ head-end (tail-end) to the tail-end (head-end).
+
+6.2. Specific Procedures
+
+ When an LSR receives a Path/Request message, the LSR determines
+ whether it is at the edge of a region with respect to the ERO carried
+ in the message. The LSR does this by looking up the interface
+ switching capabilities of the previous hop and the next hop in its
+ IGP database, and comparing them using the relation defined in this
+ section. If the LSR is not at the edge of a region, the procedures
+ in this section do not apply.
+
+ If the LSR is at the edge of a region, it must then determine the
+ other edge of the region with respect to the ERO, again using the IGP
+ database. The LSR then extracts (from the ERO) the subsequence of
+ hops from itself to the other end of the region.
+
+ The LSR then compares the subsequence of hops with all existing FA-
+ LSPs originated by the LSR. If a match is found, that FA-LSP has
+ enough unreserved bandwidth for the LSP being signaled, the L3PID of
+ the FA-LSP is compatible with the L3PID of the LSP being signaled,
+ and the LSR uses that FA-LSP as follows. The Path/Request message
+ for the original LSP is sent to the egress of the FA-LSP, not to the
+ next hop along the FA-LSP's path. The PHOP in the message is the
+ address of the LSR at the head-end of the FA-LSP. Before sending the
+ Path/Request message, the ERO in that message is adjusted by removing
+ the subsequence of the ERO that lies in the FA-LSP, and replacing it
+ with just the end point of the FA-LSP.
+
+ Otherwise (if no existing FA-LSP is found), the LSR sets up a new
+ FA-LSP. That is, it initiates a new LSP setup just for the FA-LSP.
+ Note that the new LSP may traverse either 'basic' TE links or FAs.
+
+ After the LSR establishes the new FA-LSP, the LSR announces this LSP
+ into IS-IS/OSPF as an FA.
+
+ The unreserved bandwidth of the FA is computed by subtracting the
+ bandwidth of sessions pending the establishment of the FA-LSP
+ associated from the bandwidth of the FA-LSP.
+
+ An FA-LSP could be torn down by the LSR at the head-end of the FA-LSP
+ as a matter of policy local to the LSR. It is expected that the FA-
+ LSP would be torn down once there are no more LSPs carried by the
+ FA-LSP. When the FA-LSP is torn down, the FA associated with the
+ FA-LSP is no longer advertised into IS-IS/OSPF.
+
+
+
+
+Kompella & Rekhter Standards Track [Page 10]
+
+RFC 4206 LSP Hierarchy with GMPLS TE October 2005
+
+
+6.3. FA-LSP Holding Priority
+
+ The value of the holding priority of an FA-LSP must be the minimum of
+ the configured holding priority of the FA-LSP and the holding
+ priorities of the LSPs tunneling through the FA-LSP (note that
+ smaller priority values denote higher priority). Thus, if an LSP of
+ higher priority than the FA-LSP tunnels through the FA-LSP, the FA-
+ LSP is itself promoted to the higher priority. However, if the
+ tunneled LSP is torn down, the FA-LSP need not drop its priority to
+ its old value right away; it may be advisable to apply hysteresis in
+ this case.
+
+ If the holding priority of an FA-LSP is configured, this document
+ restricts it to 0.
+
+7. Security Considerations
+
+ From a security point of view, the primary change introduced in this
+ document is that the implicit assumption of a binding between data
+ interfaces and the interface over which a control message is sent is
+ no longer valid.
+
+ This means that the "sending interface" or "receiving interface" is
+ no longer well-defined, as the interface over which an RSVP message
+ is sent may change as routing changes. Therefore, mechanisms that
+ depend on these concepts (for example, the definition of a security
+ association) need a clearer definition.
+
+ [RFC2747] provides a solution: in Section 2.1, under "Key
+ Identifier", an IP address is a valid identifier for the sending (and
+ by analogy, receiving) interface. Since RSVP messages for a given
+ LSP are sent to an IP address that identifies the next/previous hop
+ for the LSP, one can replace all occurrences of 'sending [receiving]
+ interface' with 'receiver's [sender's] IP address' (respectively).
+ For example, in Section 4, third paragraph, instead of:
+
+ "Each sender SHOULD have distinct security associations (and keys)
+ per secured sending interface (or LIH). ... At the sender,
+ security association selection is based on the interface through
+ which the message is sent."
+
+ it should read:
+
+ "Each sender SHOULD have distinct security associations (and keys)
+ per secured receiver's IP address. ... At the sender, security
+ association selection is based on the IP address to which the
+ message is sent."
+
+
+
+
+Kompella & Rekhter Standards Track [Page 11]
+
+RFC 4206 LSP Hierarchy with GMPLS TE October 2005
+
+
+ Note that CR-LDP does not have this issue, as CR-LDP messages are
+ sent over TCP sessions, and no assumption is made that these sessions
+ are to direct neighbors. The recommended mechanism for
+ authentication and integrity of LDP message exchange is to use the
+ TCP MD5 option [LDP].
+
+ Another consequence (relevant to RSVP) of the changes proposed in
+ this document is that IP destination address of Path messages be set
+ to the receiver's address, not to the session destination. Thus, the
+ objections raised in Section 1.2 of [RFC2747] should be revisited to
+ see if IPSec AH is now a viable means of securing RSVP-TE messages.
+
+8. Acknowledgements
+
+ Many thanks to Alan Hannan, whose early discussions with Yakov
+ Rekhter contributed greatly to the notion of Forwarding Adjacencies.
+ We would also like to thank George Swallow, Quaizar Vohra and Ayan
+ Banerjee.
+
+9. Normative References
+
+ [GCR-LDP] Ashwood-Smith, P. and L. Berger, "Generalized Multi-
+ Protocol Label Switching (GMPLS) Signaling Constraint-
+ based Routed Label Distribution Protocol (CR-LDP)
+ Extensions", RFC 3472, January 2003.
+
+ [GMPLS-ISIS] Kompella, K., Ed., and Y. Rekhter, Ed., "Intermediate
+ System to Intermediate System (IS-IS) Extensions in
+ Support of Generalized Multi-Protocol Label Switching
+ (GMPLS)", RFC 4205, October 2005.
+
+ [GMPLS-OSPF] Kompella, K., Ed., and Y. Rekhter, Ed., "OSPF
+ Extensions in Support of Generalized Multi-Protocol
+ Label Switching (GMPLS)", RFC 4203, October 2005.
+
+ [GRSVP-TE] Berger, L., "Generalized Multi-Protocol Label Switching
+ (GMPLS) Signaling Resource ReserVation Protocol-Traffic
+ Engineering (RSVP-TE) Extensions", RFC 3473, January
+ 2003.
+
+ [GSIG] Berger, L., "Generalized Multi-Protocol Label Switching
+ (GMPLS) Signaling Functional Description", RFC 3471,
+ January 2003.
+
+ [ISIS-TE] Smit, H. and T. Li, "Intermediate System to
+ Intermediate System (IS-IS) Extensions for Traffic
+ Engineering (TE)", RFC 3784, June 2004.
+
+
+
+
+Kompella & Rekhter Standards Track [Page 12]
+
+RFC 4206 LSP Hierarchy with GMPLS TE October 2005
+
+
+ [LDP] Andersson, L., Doolan, P., Feldman, N., Fredette, A.,
+ and B. Thomas, "Label Distribution Protocol", RFC 3036,
+ January 2001.
+
+ [OSPF-TE] Katz, D., Kompella, K., and D. Yeung, "Traffic
+ Engineering (TE) Extensions to OSPF Version 2", RFC
+ 3630, September 2003.
+
+ [UNNUM-CRLDP] Kompella, K., Rekhter, Y., and A. Kullberg, "Signalling
+ Unnumbered Links in CR-LDP (Constraint-Routing Label
+ Distribution Protocol)", RFC 3480, February 2003.
+
+ [UNNUM-RSVP] Kompella, K. and Y. Rekhter, "Signalling Unnumbered
+ Links in Resource ReSerVation Protocol - Traffic
+ Engineering (RSVP-TE)", RFC 3477, January 2003.
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+ [RFC2747] Baker, F., Lindell, B., and M. Talwar, "RSVP
+ Cryptographic Authentication", RFC 2747, January 2000.
+
+10. Informative References
+
+ [BUNDLE] Kompella, K., Rekhter, Y., and L. Berger, "Link
+ Bundling in MPLS Traffic Engineering (TE)", RFC 4201,
+ October 2005.
+
+ [LMP] Lang, L., Ed., "Link Management Protocol (LMP)", RFC
+ 4204, October 2005.
+
+Authors' Addresses
+
+ Kireeti Kompella
+ Juniper Networks, Inc.
+ 1194 N. Mathilda Ave
+ Sunnyvale, CA 94089
+
+ EMail: kireeti@juniper.net
+
+
+ Yakov Rekhter
+ Juniper Networks, Inc.
+ 1194 N. Mathilda Ave
+ Sunnyvale, CA 94089
+
+ EMail: yakov@juniper.net
+
+
+
+
+Kompella & Rekhter Standards Track [Page 13]
+
+RFC 4206 LSP Hierarchy with GMPLS TE October 2005
+
+
+Full Copyright Statement
+
+ Copyright (C) The Internet Society (2005).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78, and except as set forth therein, the authors
+ retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
+ ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
+ INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
+ INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at ietf-
+ ipr@ietf.org.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is currently provided by the
+ Internet Society.
+
+
+
+
+
+
+
+Kompella & Rekhter Standards Track [Page 14]
+