1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
|
Network Working Group K. Kompella
Request for Comments: 4206 Y. Rekhter
Category: Standards Track Juniper Networks
October 2005
Label Switched Paths (LSP) Hierarchy with
Generalized Multi-Protocol Label Switching (GMPLS)
Traffic Engineering (TE)
Status of This Memo
This document specifies an Internet standards track protocol for the
Internet community, and requests discussion and suggestions for
improvements. Please refer to the current edition of the "Internet
Official Protocol Standards" (STD 1) for the standardization state
and status of this protocol. Distribution of this memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (2005).
Abstract
To improve scalability of Generalized Multi-Protocol Label Switching
(GMPLS) it may be useful to aggregate Label Switched Paths (LSPs) by
creating a hierarchy of such LSPs. A way to create such a hierarchy
is by (a) a Label Switching Router (LSR) creating a Traffic
Engineering Label Switched Path (TE LSP), (b) the LSR forming a
forwarding adjacency (FA) out of that LSP (by advertising this LSP as
a Traffic Engineering (TE) link into the same instance of ISIS/OSPF
as the one that was used to create the LSP), (c) allowing other LSRs
to use FAs for their path computation, and (d) nesting of LSPs
originated by other LSRs into that LSP (by using the label stack
construct).
This document describes the mechanisms to accomplish this.
Kompella & Rekhter Standards Track [Page 1]
^L
RFC 4206 LSP Hierarchy with GMPLS TE October 2005
Table of Contents
1. Overview ........................................................2
2. Specification of Requirements ...................................3
3. Routing Aspects .................................................4
3.1. Traffic Engineering Parameters .............................4
3.1.1. Link Type (OSPF Only) ...............................5
3.1.2. Link ID (OSPF Only) .................................5
3.1.3. Local and Remote Interface IP Address ...............5
3.1.4. Local and Remote Link Identifiers ...................5
3.1.5. Traffic Engineering Metric ..........................5
3.1.6. Maximum Bandwidth ...................................5
3.1.7. Unreserved Bandwidth ................................5
3.1.8. Resource Class/Color ................................5
3.1.9. Interface Switching Capability ......................6
3.1.10. SRLG Information ...................................6
4. Other Considerations ............................................6
5. Controlling FA-LSPs Boundaries ..................................7
5.1. LSP Regions ................................................7
6. Signalling Aspects ..............................................8
6.1. Common Procedures ..........................................8
6.1.1. RSVP-TE .............................................8
6.1.2. CR-LDP ..............................................9
6.2. Specific Procedures .......................................10
6.3. FA-LSP Holding Priority ...................................11
7. Security Considerations ........................................11
8. Acknowledgements ...............................................12
9. Normative References ...........................................12
10. Informative References ........................................13
1. Overview
An LSR uses Generalized MPLS (GMPLS) TE procedures to create and
maintain an LSP. The LSR then may (under local configuration
control) announce this LSP as a Traffic Engineering (TE) link into
the same instance of the GMPLS control plane (or, more precisely, its
ISIS/OSPF component) as the one that was used to create the LSP. We
call such a link a "forwarding adjacency" (FA). We refer to the LSP
as the "forwarding adjacency LSP", or just FA-LSP. Note that an FA-
LSP is both created and used as a TE link by exactly the same
instance of the GMPLS control plane. Thus, the concept of an FA is
applicable only when an LSP is both created and used as a TE link by
exactly the same instance of the GMPLS control plane. Note also that
an FA is a TE link between two GMPLS nodes whose path transits zero
or more (G)MPLS nodes in the same instance of the GMPLS control
plane.
Kompella & Rekhter Standards Track [Page 2]
^L
RFC 4206 LSP Hierarchy with GMPLS TE October 2005
The nodes connected by a 'basic' TE link may have a routing
adjacency; however, the nodes connected by an FA would not usually
have a routing adjacency. A TE link of any kind (either 'basic' or
FA) would have to have a signaling adjacency in order for it to be
used to establish an LSP across it.
In general, the creation/termination of an FA and its FA-LSP could be
driven either by mechanisms outside of GMPLS (e.g., via configuration
control on the LSR at the head-end of the adjacency), or by
mechanisms within GMPLS (e.g., as a result of the LSR at the head-end
of the adjacency receiving LSP setup requests originated by some
other LSRs).
ISIS/OSPF floods the information about FAs just as it floods the
information about any other links. As a result of this flooding, an
LSR has in its TE link state database the information about not just
basic TE links, but FAs as well.
An LSR, when performing path computation, uses not just basic TE
links, but FAs as well. Once a path is computed, the LSR uses
RSVP/CR-LDP [RSVP-TE, CR-LDP] for establishing label binding along
the path.
In this document we define mechanisms/procedures to accomplish the
above. These mechanisms/procedures cover both the routing
(ISIS/OSPF) and the signalling (RSVP/CR-LDP) aspects.
Note that an LSP may be advertised as a point-to-point link into ISIS
or OSPF, to be used in normal SPF by nodes other than the head-end.
While this is similar in spirit to an FA, this is beyond the scope of
this document.
Scenarios where an LSP is created (and maintained) by one instance of
the GMPLS control plane, and is used as a (TE) link by another
instance of the GMPLS control plane, are outside the scope of this
document.
2. Specification of Requirements
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14, RFC 2119
[RFC2119].
Kompella & Rekhter Standards Track [Page 3]
^L
RFC 4206 LSP Hierarchy with GMPLS TE October 2005
3. Routing Aspects
In this section we describe procedures for constructing FAs out of
LSPs, and handling of FAs by ISIS/OSPF. Specifically, this section
describes how to construct the information needed to advertise LSPs
as links into ISIS/OSPF. Procedures for creation/termination of such
LSPs are defined in Section 5, "Controlling FA-LSPs boundaries".
FAs may be represented as either unnumbered or numbered links. If
FAs are numbered with IPv4 addresses, the local and remote IPv4
addresses come out of a /31 that is allocated by the LSR that
originates the FA-LSP; the head-end address of the FA-LSP is the one
specified as the IPv4 tunnel sender address; the remote (tail-end)
address can then be inferred. If the LSP is bidirectional, the
tail-end can thus know the addresses to assign to the reverse FA.
If there are multiple LSPs that all originate on one LSR and all
terminate on another LSR, then at one end of the spectrum all these
LSPs could be merged (under control of the head-end LSR) into a
single FA using the concept of Link Bundling (see [BUNDLE]); while at
the other end of the spectrum each such LSP could be advertised as
its own adjacency.
When an FA is created under administrative control (static
provisioning), the attributes of the FA-LSP have to be provided via
configuration. Specifically, the following attributes may be
configured for the FA-LSP: the head-end address (if left
unconfigured, this defaults to the head-end LSR's Router ID); the
tail-end address; bandwidth and resource colors constraints. The
path taken by the FA-LSP may be either computed by the LSR at the
head-end of the FA-LSP, or specified by explicit configuration; this
choice is determined by configuration.
When an FA is created dynamically, the attributes of its FA-LSP are
inherited from the LSP that induced its creation. Note that the
bandwidth of the FA-LSP must be at least as big as the LSP that
induced it, but may be bigger if only discrete bandwidths are
available for the FA-LSP. In general, for dynamically provisioned
FAs, a policy-based mechanism may be needed to associate attributes
to the FA-LSPs.
3.1. Traffic Engineering Parameters
In this section, the Traffic Engineering parameters (see [OSPF-TE]
and [ISIS-TE]) for FAs are described.
Kompella & Rekhter Standards Track [Page 4]
^L
RFC 4206 LSP Hierarchy with GMPLS TE October 2005
3.1.1. Link Type (OSPF Only)
The Link Type of an FA is set to "point-to-point".
3.1.2. Link ID (OSPF Only)
The Link ID is set to the Router ID of the tail-end of FA-LSP.
3.1.3. Local and Remote Interface IP Address
If the FA is to be numbered, the local interface IP address (OSPF) or
IPv4 interface address (ISIS) is set to the head-end address of the
FA-LSP. The remote interface IP address (OSPF) or IPv4 neighbor
address (ISIS) is set to the tail-end address of the FA-LSP.
3.1.4. Local and Remote Link Identifiers
For an unnumbered FA, the assignment and handling of the local and
remote link identifiers is specified in [UNNUM-RSVP], [UNNUM-CRLDP].
3.1.5. Traffic Engineering Metric
By default the TE metric on the FA is set to max(1, (the TE metric of
the FA-LSP path) - 1) so that it attracts traffic in preference to
setting up a new LSP. This may be overridden via configuration at
the head-end of the FA.
3.1.6. Maximum Bandwidth
By default, the Maximum Reservable Bandwidth and the initial Maximum
LSP Bandwidth for all priorities of the FA is set to the bandwidth of
the FA-LSP. These may be overridden via configuration at the head-
end of the FA (note that the Maximum LSP Bandwidth at any one
priority should be no more than the bandwidth of the FA-LSP).
3.1.7. Unreserved Bandwidth
The initial unreserved bandwidth for all priority levels of the FA is
set to the bandwidth of the FA-LSP.
3.1.8. Resource Class/Color
By default, an FA does not have resource colors (administrative
groups). This may be overridden by configuration at the head-end of
the FA.
Kompella & Rekhter Standards Track [Page 5]
^L
RFC 4206 LSP Hierarchy with GMPLS TE October 2005
3.1.9. Interface Switching Capability
The (near-end) Interface Switching Capability associated with the FA
is the (near end) Interface Switching Capability of the first link in
the FA-LSP.
When the (near-end) Interface Switching Capability field is PSC-1,
PSC-2, PSC-3, or PSC-4, the specific information includes Interface
MTU and Minimum LSP Bandwidth. The Interface MTU is the minimum MTU
along the path of the FA-LSP; the Minimum LSP Bandwidth is the
bandwidth of the LSP.
3.1.10. SRLG Information
An FA advertisement could contain the information about the Shared
Risk Link Groups (SRLG) for the path taken by the FA-LSP associated
with that FA. This information may be used for path calculation by
other LSRs. The information carried is the union of the SRLGs of the
underlying TE links that make up the FA-LSP path; it is carried in
the SRLG TLV in IS-IS or the SRLG sub-TLV of the TE Link TLV in OSPF.
See [GMPLS-ISIS, GMPLS-OSPF] for details on the format of this
information.
It is possible that the underlying path information might change over
time, via configuration updates or dynamic route modifications,
resulting in the change of the SRLG TLV.
If FAs are bundled (via link bundling), and if the resulting bundled
link carries an SRLG TLV, it MUST be the case that the list of SRLGs
in the underlying path, followed by each of the FA-LSPs that form the
component links, is the same (note that the exact paths need not be
the same).
4. Other Considerations
It is expected that FAs will not be used for establishing ISIS/OSPF
peering relation between the routers at the ends of the adjacency.
It may be desired in some cases to use FAs only in Traffic
Engineering path computations. In IS-IS, this can be accomplished by
setting the default metric of the extended IS reachability TLV for
the FA to the maximum link metric (2^24 - 1). In OSPF, this can be
accomplished by not advertising the link as a regular LSA, but only
as a TE opaque LSA.
Kompella & Rekhter Standards Track [Page 6]
^L
RFC 4206 LSP Hierarchy with GMPLS TE October 2005
5. Controlling FA-LSPs Boundaries
To facilitate controlling the boundaries of FA-LSPs, this document
introduces two new mechanisms: Interface Switching Capability (see
[GMPLS-ISIS, GMPLS-OSPF], and "LSP region" (or just "region").
5.1. LSP Regions
The information carried in the Interface Switching Capabilities is
used to construct LSP regions and to determine regions' boundaries as
follows.
Define an ordering among interface switching capabilities as follows:
PSC-1 < PSC-2 < PSC-3 < PSC-4 < TDM < LSC < FSC. Given two
interfaces if-1 and if-2 with interface switching capabilities isc-1
and isc-2 respectively, say that if-1 < if-2 iff isc-1 < isc-2 or
isc-1 == isc-2 == TDM, and if-1's max LSP bandwidth is less than if-
2's max LSP bandwidth.
Suppose an LSP's path is as follows: node-0, link-1, node-1, link-2,
node-2, ..., link-n, node-n. Moreover, for link-i denote by [link-i,
node-(i-1)] the interface that connects link-i to node-(i-1), and by
[link-i, node-i] the interface that connects link-i to node-i.
If [link-(i+1), node-i)] < [link-(i+1), node-(i+1)], we say that the
LSP has crossed a region boundary at node-i; with respect to that LSP
path, the LSR at node-i is an edge LSR. The 'other edge' of the
region with respect to the LSP path is node-k, where k is the
smallest number greater than i such that [link-(i+1), node-(i+1)]
equal [link-k, node-(k-1)], and [link-k, node-(k-1)] > [link-k,
node-k].
Path computation may take region boundaries into account when
computing a path for an LSP. For example, path computation may
restrict the path taken by an LSP to only the links whose Interface
Switching Capability is PSC-1.
Note that an interface may have multiple Interface Switching
Capabilities. In such a case, the test is whether if-i < if-j
depends on the Interface Switching Capabilities chosen for if-i and
if-j, which in turn determines whether or not there is a region
boundary at node-i.
Kompella & Rekhter Standards Track [Page 7]
^L
RFC 4206 LSP Hierarchy with GMPLS TE October 2005
6. Signalling Aspects
In this section we describe procedures that an LSR at the head-end of
an FA uses for handling LSP setup originated by other LSR.
As we mentioned before, establishment/termination of FA-LSPs may be
triggered either by mechanisms outside of GMPLS (e.g., via
administrative control), or by mechanisms within GMPLS (e.g., as a
result of the LSR at the edge of an aggregate LSP receiving LSP setup
requests originated by some other LSRs beyond LSP aggregate and its
edges). Procedures described in Section 6.1, "Common Procedures",
apply to both cases. Procedures described in Section 6.2, "Specific
Procedures", apply only to the latter case.
6.1. Common Procedures
For the purpose of processing the ERO in a Path/Request message of an
LSP that is to be tunneled over an FA, an LSR at the head-end of the
FA-LSP views the LSR at the tail of that FA-LSP as adjacent (one IP
hop away).
How this is to be achieved for RSVP-TE and CR-LDP is described in the
following subsections.
In either case (RSVP-TE or CR-LDP), when an LSP is tunneled through
an FA-LSP, the LSR at the head-end of the FA-LSP subtracts the LSP's
bandwidth from the unreserved bandwidth of the FA.
In the presence of link bundling (when link bundling is applied to
FAs), when an LSP is tunneled through an FA-LSP, the LSR at the
head-end of the FA-LSP also needs to adjust Max LSP bandwidth of the
FA.
6.1.1. RSVP-TE
If one uses RSVP-TE to signal an LSP to be tunneled over an FA-LSP,
then the Path message MUST contain an IF_ID RSVP_HOP object
[GRSVP-TE, GSIG] instead of an RSVP_HOP object; and the data
interface identification MUST identify the FA-LSP.
The preferred method of sending the Path message is to set the
destination IP address of the Path message to the computed NHOP for
that Path message. This NHOP address must be a routable address; in
the case of separate control and data planes, this must be a control
plane address.
Kompella & Rekhter Standards Track [Page 8]
^L
RFC 4206 LSP Hierarchy with GMPLS TE October 2005
Furthermore, the IP header for the Path message MUST NOT have the
Router Alert option. The Path message is intended to be IP-routed to
the tail-end of the FA-LSP without being intercepted and processed as
an RSVP message by any of the intermediate nodes.
Finally, the IP TTL vs. RSVP TTL check MUST NOT be made. In general,
if the IF_ID RSVP_HOP object is used, this check must be disabled, as
the number of hops over the control plane may be greater than one.
Instead, the following check is done by the receiver Y of the IF_ID
RSVP_HOP object:
1. Make sure that the data interface identified in the IF_ID RSVP_HOP
object actually terminates on Y.
2. Find the "other end" of the above data interface, say X. Make
sure that the PHOP in the IF_ID RSVP_HOP object is a control
channel address that belongs to the same node as X.
How check #2 is carried out is beyond the scope of this document;
suffice it to say that it may require a Traffic Engineering Database,
or the use of LMP [LMP], or yet other means.
An alternative method is to encapsulate the Path message in an IP
tunnel (or, in the case that the Interface Switching Capability of
the FA-LSP is PSC[1-4], in the FA-LSP itself), and unicast the
message to the tail-end of the FA-LSP, without the Router Alert
option. This option may be needed if intermediate nodes process RSVP
messages regardless of whether the Router Alert option is present.
A PathErr sent in response to a Path message with an IF_ID RSVP_HOP
object SHOULD contain an IF_ID HOP object. (Note: a PathErr does not
normally carry an RSVP_HOP object, but in the case of separated
control and data, it is necessary to identify the data channel in the
PathErr message.)
The Resv message back to the head-end of the FA-LSP (PHOP) is IP-
routed to the PHOP in the Path message. If necessary, Resv Messages
MAY be encapsulated in another IP header whose destination IP address
is the PHOP of the received Path message.
6.1.2. CR-LDP
If one uses CR-LDP to signal an LSP to be tunneled over an FA-LSP,
then the Request message MUST contain an IF_ID TLV [GCR-LDP] object,
and the data interface identification MUST identify the FA-LSP.
Kompella & Rekhter Standards Track [Page 9]
^L
RFC 4206 LSP Hierarchy with GMPLS TE October 2005
Furthermore, the head-end LSR must create a targeted LDP session with
the tail-end LSR. The Request (Mapping) message is unicast from the
head-end (tail-end) to the tail-end (head-end).
6.2. Specific Procedures
When an LSR receives a Path/Request message, the LSR determines
whether it is at the edge of a region with respect to the ERO carried
in the message. The LSR does this by looking up the interface
switching capabilities of the previous hop and the next hop in its
IGP database, and comparing them using the relation defined in this
section. If the LSR is not at the edge of a region, the procedures
in this section do not apply.
If the LSR is at the edge of a region, it must then determine the
other edge of the region with respect to the ERO, again using the IGP
database. The LSR then extracts (from the ERO) the subsequence of
hops from itself to the other end of the region.
The LSR then compares the subsequence of hops with all existing FA-
LSPs originated by the LSR. If a match is found, that FA-LSP has
enough unreserved bandwidth for the LSP being signaled, the L3PID of
the FA-LSP is compatible with the L3PID of the LSP being signaled,
and the LSR uses that FA-LSP as follows. The Path/Request message
for the original LSP is sent to the egress of the FA-LSP, not to the
next hop along the FA-LSP's path. The PHOP in the message is the
address of the LSR at the head-end of the FA-LSP. Before sending the
Path/Request message, the ERO in that message is adjusted by removing
the subsequence of the ERO that lies in the FA-LSP, and replacing it
with just the end point of the FA-LSP.
Otherwise (if no existing FA-LSP is found), the LSR sets up a new
FA-LSP. That is, it initiates a new LSP setup just for the FA-LSP.
Note that the new LSP may traverse either 'basic' TE links or FAs.
After the LSR establishes the new FA-LSP, the LSR announces this LSP
into IS-IS/OSPF as an FA.
The unreserved bandwidth of the FA is computed by subtracting the
bandwidth of sessions pending the establishment of the FA-LSP
associated from the bandwidth of the FA-LSP.
An FA-LSP could be torn down by the LSR at the head-end of the FA-LSP
as a matter of policy local to the LSR. It is expected that the FA-
LSP would be torn down once there are no more LSPs carried by the
FA-LSP. When the FA-LSP is torn down, the FA associated with the
FA-LSP is no longer advertised into IS-IS/OSPF.
Kompella & Rekhter Standards Track [Page 10]
^L
RFC 4206 LSP Hierarchy with GMPLS TE October 2005
6.3. FA-LSP Holding Priority
The value of the holding priority of an FA-LSP must be the minimum of
the configured holding priority of the FA-LSP and the holding
priorities of the LSPs tunneling through the FA-LSP (note that
smaller priority values denote higher priority). Thus, if an LSP of
higher priority than the FA-LSP tunnels through the FA-LSP, the FA-
LSP is itself promoted to the higher priority. However, if the
tunneled LSP is torn down, the FA-LSP need not drop its priority to
its old value right away; it may be advisable to apply hysteresis in
this case.
If the holding priority of an FA-LSP is configured, this document
restricts it to 0.
7. Security Considerations
From a security point of view, the primary change introduced in this
document is that the implicit assumption of a binding between data
interfaces and the interface over which a control message is sent is
no longer valid.
This means that the "sending interface" or "receiving interface" is
no longer well-defined, as the interface over which an RSVP message
is sent may change as routing changes. Therefore, mechanisms that
depend on these concepts (for example, the definition of a security
association) need a clearer definition.
[RFC2747] provides a solution: in Section 2.1, under "Key
Identifier", an IP address is a valid identifier for the sending (and
by analogy, receiving) interface. Since RSVP messages for a given
LSP are sent to an IP address that identifies the next/previous hop
for the LSP, one can replace all occurrences of 'sending [receiving]
interface' with 'receiver's [sender's] IP address' (respectively).
For example, in Section 4, third paragraph, instead of:
"Each sender SHOULD have distinct security associations (and keys)
per secured sending interface (or LIH). ... At the sender,
security association selection is based on the interface through
which the message is sent."
it should read:
"Each sender SHOULD have distinct security associations (and keys)
per secured receiver's IP address. ... At the sender, security
association selection is based on the IP address to which the
message is sent."
Kompella & Rekhter Standards Track [Page 11]
^L
RFC 4206 LSP Hierarchy with GMPLS TE October 2005
Note that CR-LDP does not have this issue, as CR-LDP messages are
sent over TCP sessions, and no assumption is made that these sessions
are to direct neighbors. The recommended mechanism for
authentication and integrity of LDP message exchange is to use the
TCP MD5 option [LDP].
Another consequence (relevant to RSVP) of the changes proposed in
this document is that IP destination address of Path messages be set
to the receiver's address, not to the session destination. Thus, the
objections raised in Section 1.2 of [RFC2747] should be revisited to
see if IPSec AH is now a viable means of securing RSVP-TE messages.
8. Acknowledgements
Many thanks to Alan Hannan, whose early discussions with Yakov
Rekhter contributed greatly to the notion of Forwarding Adjacencies.
We would also like to thank George Swallow, Quaizar Vohra and Ayan
Banerjee.
9. Normative References
[GCR-LDP] Ashwood-Smith, P. and L. Berger, "Generalized Multi-
Protocol Label Switching (GMPLS) Signaling Constraint-
based Routed Label Distribution Protocol (CR-LDP)
Extensions", RFC 3472, January 2003.
[GMPLS-ISIS] Kompella, K., Ed., and Y. Rekhter, Ed., "Intermediate
System to Intermediate System (IS-IS) Extensions in
Support of Generalized Multi-Protocol Label Switching
(GMPLS)", RFC 4205, October 2005.
[GMPLS-OSPF] Kompella, K., Ed., and Y. Rekhter, Ed., "OSPF
Extensions in Support of Generalized Multi-Protocol
Label Switching (GMPLS)", RFC 4203, October 2005.
[GRSVP-TE] Berger, L., "Generalized Multi-Protocol Label Switching
(GMPLS) Signaling Resource ReserVation Protocol-Traffic
Engineering (RSVP-TE) Extensions", RFC 3473, January
2003.
[GSIG] Berger, L., "Generalized Multi-Protocol Label Switching
(GMPLS) Signaling Functional Description", RFC 3471,
January 2003.
[ISIS-TE] Smit, H. and T. Li, "Intermediate System to
Intermediate System (IS-IS) Extensions for Traffic
Engineering (TE)", RFC 3784, June 2004.
Kompella & Rekhter Standards Track [Page 12]
^L
RFC 4206 LSP Hierarchy with GMPLS TE October 2005
[LDP] Andersson, L., Doolan, P., Feldman, N., Fredette, A.,
and B. Thomas, "Label Distribution Protocol", RFC 3036,
January 2001.
[OSPF-TE] Katz, D., Kompella, K., and D. Yeung, "Traffic
Engineering (TE) Extensions to OSPF Version 2", RFC
3630, September 2003.
[UNNUM-CRLDP] Kompella, K., Rekhter, Y., and A. Kullberg, "Signalling
Unnumbered Links in CR-LDP (Constraint-Routing Label
Distribution Protocol)", RFC 3480, February 2003.
[UNNUM-RSVP] Kompella, K. and Y. Rekhter, "Signalling Unnumbered
Links in Resource ReSerVation Protocol - Traffic
Engineering (RSVP-TE)", RFC 3477, January 2003.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC2747] Baker, F., Lindell, B., and M. Talwar, "RSVP
Cryptographic Authentication", RFC 2747, January 2000.
10. Informative References
[BUNDLE] Kompella, K., Rekhter, Y., and L. Berger, "Link
Bundling in MPLS Traffic Engineering (TE)", RFC 4201,
October 2005.
[LMP] Lang, L., Ed., "Link Management Protocol (LMP)", RFC
4204, October 2005.
Authors' Addresses
Kireeti Kompella
Juniper Networks, Inc.
1194 N. Mathilda Ave
Sunnyvale, CA 94089
EMail: kireeti@juniper.net
Yakov Rekhter
Juniper Networks, Inc.
1194 N. Mathilda Ave
Sunnyvale, CA 94089
EMail: yakov@juniper.net
Kompella & Rekhter Standards Track [Page 13]
^L
RFC 4206 LSP Hierarchy with GMPLS TE October 2005
Full Copyright Statement
Copyright (C) The Internet Society (2005).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at ietf-
ipr@ietf.org.
Acknowledgement
Funding for the RFC Editor function is currently provided by the
Internet Society.
Kompella & Rekhter Standards Track [Page 14]
^L
|