<?xml version="1.0" encoding="US-ASCII"?>
<!-- This template is for creating an Internet Draft using xml2rfc,
     which is available here: http://xml.resource.org. -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!-- One method to get references from the online citation libraries.
     There has to be one entity for each item to be referenced. 
     An alternate method (rfc include) is described in the references. -->
<!ENTITY RFC2119 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC2629 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2629.xml">
]>
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!-- used by XSLT processors -->
<!-- For a complete list and description of processing instructions (PIs), 
     please see http://xml.resource.org/authoring/README.html. -->
<?rfc strict="yes" ?>
<!-- give errors regarding ID-nits and DTD validation -->
<!-- control the table of contents (ToC) -->
<?rfc toc="yes"?>
<!-- generate a ToC -->
<?rfc tocdepth="3"?>
<!-- the number of levels of subsections in ToC. default: 3 -->
<!-- control references -->
<?rfc symrefs="yes"?>
<!-- use symbolic references tags, i.e, [RFC2119] instead of [1] -->
<?rfc sortrefs="yes" ?>
<!-- sort the reference entries alphabetically -->
<!-- control vertical white space 
     (using these PIs as follows is recommended by the RFC Editor) -->
<?rfc compact="yes" ?>
<!-- do not start each main section on a new page -->
<?rfc subcompact="no" ?>
<!-- keep one blank line between list items -->
<!-- end of list of popular I-D processing instructions -->
<rfc category="std" docName="draft-ietf-isis-auto-conf-03" ipr="trust200902">
  <front>
    <title abbrev="draft-ietf-isis-auto-conf-03">ISIS
    Auto-Configuration</title>

    <author fullname="Bing Liu" initials="B." surname="Liu, Ed.">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street>Q10, Huawei Campus, No.156 Beiqing Road</street>

          <city>Hai-Dian District, Beijing, 100095</city>

          <country>P.R. China</country>
        </postal>

        <email>leo.liubing@huawei.com</email>
      </address>
    </author>

    <author fullname="Bruno Decraene" initials="B." surname="Decraene">
      <organization>Orange</organization>

      <address>
        <postal>
          <street/>

          <city/>

          <country>France</country>
        </postal>

        <email>bruno.decraene@orange.com</email>
      </address>
    </author>

    <author fullname="Ian Farrer" initials="I." surname="Farrer">
      <organization>Deutsche Telekom AG</organization>

      <address>
        <postal>
          <street/>

          <city>Bonn</city>

          <country>Germany</country>
        </postal>

        <email>ian.farrer@telekom.de</email>
      </address>
    </author>

    <author fullname="Mikael Abrahamsson" initials="M." surname="Abrahamsson">
      <organization>T-Systems</organization>

      <address>
        <postal>
          <street/>

          <city>Stockholm</city>

          <country>Sweden</country>
        </postal>

        <email>mikael.abrahamsson@t-systems.se</email>
      </address>
    </author>

    <author fullname="Les Ginsberg" initials="L." surname="Ginsberg">
      <organization>Cisco Systems</organization>

      <address>
        <postal>
          <street>510 McCarthy Blvd.</street>

          <city>Milpitas</city>

          <region/>

          <code>CA 95035</code>

          <country>USA</country>
        </postal>

        <phone/>

        <facsimile/>

        <email>ginsberg@cisco.com</email>

        <uri/>
      </address>
    </author>

    <date day="31" month="October" year="2016"/>

    <area>Routing Area</area>

    <workgroup>isis</workgroup>

    <keyword>isis auto-configuration</keyword>

    <abstract>
      <t>This document specifies IS-IS auto-configuration mechanisms. The key
      components are IS-IS System ID self-generation, duplication detection
      and duplication resolution. These mechanisms provide limited IS-IS
      functions, and so are suitable for networks where plug-and-play
      configuration is expected.</t>
    </abstract>
  </front>

  <middle>
    <section title="Introduction">
      <t>This document specifies mechanisms for IS-IS <xref target="RFC1195"/>
      <xref target="ISO_IEC10589"/><xref target="RFC5308"> </xref> to be
      auto-configuring. Such mechanisms could reduce the management burden for
      configuring a network, especially where plug-and-play device
      configuration is required.</t>

      <t>IS-IS auto-configuration is comprised of the following
      functions:<list style="numbers">
          <t hangText="-">IS-IS default configurations.</t>

          <t hangText="-">IS-IS System ID self-generation.</t>

          <t hangText="-">System ID duplication detection and resolution.</t>

          <t hangText="-">ISIS TLV utilization (Authentication TLV, Wide
          Metric TLV, and Dynamic Host Name TLV).</t>
        </list></t>

      <t>This document also defines mechanisms to prevent the unintentional
      interoperation of auto-configured routers with non-autoconfigured
      routers. See <xref target="TLV"/>.</t>
    </section>

    <section title="Scope">
      <t>The auto-configuration mechanism supports both IPv4 and IPv6
      deployments.</t>

      <t>These auto-configuration mechanisms aim to cover simple deployment
      cases. The following important features are not supported:<list
          style="hanging">
          <t hangText="o">Multiple IS-IS instances.</t>

          <t hangText="o">Multi-area and level-2 routing.</t>

          <t hangText="o">Interworking with other routing protocols.</t>
        </list></t>
        
      <t>IS-IS auto-configuration is primarily intended for use in small (i.e. 10s of
      devices) and unmanaged deployments. Its allows IS-IS to be used as the IGP without
      the need for any configuration by the user. It is not recommended for larger
      deployments.</t>
    </section>

    <section title="Protocol Specification  ">
      <t/>

      <section title="IS-IS Default Configuration">
        <t><list style="hanging">
            <t hangText="o">IS-IS interfaces MUST be auto-configured to an
            interface type corresponding to their layer-2 capability. For
            example, Ethernet interfaces will be auto-configured as broadcast
            networks and Point-to-Point Protocol (PPP) interfaces will be
            auto-configured as Point-to-Point interfaces.</t>

            <t hangText="o">IS-IS auto-configuration instance MUST be
            configured as level-1, so that the interfaces operate as level-1
            only.</t>
          </list></t>
      </section>

      <section anchor="NETGen" title="IS-IS NET Generation">
        <t>In IS-IS, a router (known as an Intermediate System) is identified
        by a NET which is the address of a Network Service Access Point (NSAP)
        and represented with an IS-IS specific address format. The NSAP is a
        logical entity which represents an instance of the IS-IS protocol
        running on an Intermediate System.</t>

        <t>The auto-configuration mechanism generates the IS-IS NET as the
        following:</t>

        <t><list style="hanging">
            <t hangText="o">Area address<list style="empty">
                <t>In IS-IS auto-configuration, this field MUST be 13 octets
                long and set to all 0.</t>
              </list></t>

            <t hangText="o">System ID<list style="empty">
                <t>This field follows the area address field, and is 6 octets
                in length. There are two basic requirements for the System ID
                generation:<list style="hanging">
                    <t hangText="-">As specified by the IS-IS protocol, this
                    field must be unique among all routers in the same
                    area.</t>

                    <t hangText="-">After its initial generation, the System
                    ID SHOULD remain stable to improve the stability of the
                    routing system. It SHOULD not be changed due to device
                    status change (such as interface enable/disable, interface
                    connect/disconnect, device reboot, firmware update etc.)
                    or configuration change (such as changing system
                    configuration or IS-IS configuration); but MUST support
                    change as part of the System ID collision resolution
                    process and SHOULD allow being cleared by a user initiated
                    system reset.</t>
                  </list></t>

                <t>More specific considerations for System ID generation are
                described in <xref target="Unique"/> .</t>
              </list></t>
          </list></t>
      </section>

      <section title="IS-IS System ID Duplication Detection and Resolution">
        <t>The System ID of each node MUST be unique. As described in <xref
        target="Unique"/>, the System ID is generated based on entropies (e.g.
        MAC address) which are generally expected to be unique. However, since
        there may be limitations to the available entropies, there is still
        the possibility of System ID duplication. This section defines how
        IS-IS detects and resolves System ID duplication.</t>

        <section anchor="TLV" title="Router-Fingerprint TLV">
          <t>The Router-Fingerprint TLV essentially re-uses the design of
          Router-Hardware-Fingerprint TLV defined in <xref target="RFC7503"/>.
          However, there is one difference in that a flag is added to indicate
          that the node is in "start-up mode", which is defined in <xref
          target="SysDup"/>.</t>

          <t><figure title="Router Fingerprint TLV Format">
              <artwork align="center">    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |     Type      |    Length     |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |S|A| Reserved  |                                               |
   +-+-+-+-+-+-+-+-+        Router Fingerprint (Variable)          .
   .                                                               .
   .                                                               .
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+</artwork>
            </figure></t>

          <t>The length of the Router-Fingerprint is variable but MUST be 32
          octets or greater. For correct operation, the Router-Fingerprint
          MUST be unique among all the routers participating in the IS-IS
          area.</t>

          <t><list style="symbols">
              <t>Type: to be assigned by IANA.</t>

              <t>Length: the length of the value field. As the Router
              Fingerprint length is variable, the field length is also
              variable.</t>

              <t>S flag: when set, indicates the router is in "start-up"
              mode.</t>

              <t>A flag: when set, indicates that the router is operating in
              auto-configuration mode. The purpose of the flag is so that two
              routers can identify if they are both using auto-configuration.
              If the A flag setting does not match in hellos then no adjacency
              should be formed.</t>

              <t>Reserved: these bits MUST be set to zero and MUST be ignored
              by the receiver.</t>

              <t>Router Fingerprint: uniquely identifies a router, variable
              length.</t>
            </list></t>

          <t>More specific considerations for Router-Fingerprint are described
          in <xref target="Unique"/> .</t>
        </section>

        <section anchor="SysDup"
                 title="Duplicate System ID Detection and Resolution Procedures">
          <t>This section describes the duplicate System ID detection and
          resolution process between two neighbors and two non-neighbors
          respectively. This is due to difference in the the routing messages
          between neighbors and non-neighbors.</t>

          <section title="Start-up Mode">
            <t>While in Start-up Mode, an auto-configuration router forms
            adjacencies but generates only LSP #0 which contains only the
            Router-Fingerprint TLV. A router remains in startup-mode until it
            has successfully completed LSPDB synchronization with all
            neighbors or until 1 minute has elapsed - whichever is longer. If
            a duplicate System ID is detected while in Start-up Mode stage,
            the Start-up Mode router MUST clear all adjacencies, select a new
            System ID (subject to rules defined in <xref target="duplt"/> ),
            and re-enter Start-up Mode.</t>

            <t>The purpose of the Start-up Mode is to minimize the occurrence
            of System ID changes for a router once it has become fully
            operational. It has minimal impact on a running network because
            the Start-up Mode node is not yet being used for forwarding
            traffic. Once duplicate System IDs have been resolved the router
            begins normal operation. If two routers are both in Start-up Mode
            and duplicate System ID is detected, they follow the duplication
            resolution as specified in <xref target="duplt"/> and <xref
            target="dupltnon"/>.</t>

            <t>When an IS-IS auto-configuration router boots up, it MUST
            operate in Startup-Mode until duplicate System ID detection has
            successfully completed.</t>
          </section>

          <section anchor="duplt" title="Duplication Between Neighbors">
            <t>In the case of duplicate System IDs being detected between
            neighbors, an IS-IS auto-configuration router MUST include the
            Router-Fingerprint TLV in the Hello messages, so that the
            duplication can be detected before an adjacency is formed.</t>

            <t>Start-up Mode procedures:<list style="numbers">
                <t>Boot up and advertisement of the Router-Fingerprint TLV in
                Hello messages<list style="empty">
                    <t>The router sends Hello messages which include the
                    Router-Fingerprint TLV. Adjacencies are formed as normal
                    but MUST NOT be advertised in LSPs until the router exits
                    Start-up Mode.</t>
                  </list></t>

                <t>Receiving Hello message(s), and System ID duplication
                detection<list style="empty">
                    <t>Received Hello messages are inspected for a possible
                    duplicate System ID. If a duplicate is detected, the
                    router MUST check the S flag of the Router-Fingerprint
                    TLV.</t>

                    <t><list style="symbols">
                        <t>If the S flag is NOT set (which means the Hello
                        message was NOT generated by a Start-up Mode
                        neighbor), then the router MUST re-generate the System
                        ID and re-enter Start-up Mode.</t>

                        <t>If the S flag is set (meaning the neighbor is also
                        in Start-up Mode), <list style="symbols">
                            <t>The router which has a numerically smaller
                            Router-Fingerprint MUST re-generate its System ID
                            and re-enter Start-up Mode. Fingerprint comparison
                            MUST be performed octet by octet starts from the
                            left until a difference is found. Then, the numeric
                            smaller fingerprint is the one with the lowest
                            value. If the fingerprints have different lengths,
                            then the shorter length fingerprint MUST be padding
                            with zero at the left side for comparison.</t>

                            <t>If the Router Fingerprints are identical, both
                            routers MUST re-generate the System ID and the
                            Router Fingerprint, and re-enter Start-up Mode.</t>
                          </list></t>
                      </list></t>
                  </list></t>

                <t>Normal operation<list style="empty">
                    <t>After the System ID duplication procedure is
                    successfully completed, the router begins normal
                    operation. The router MUST re-advertise the
                    Router-Fingerprint TLV with the S flag disabled.</t>
                  </list></t>
              </list></t>

            <t>Non Start-up Mode procedures:<list style="numbers">
                <t>Compare the System ID in received Hello messages<list
                    style="empty">
                    <t>When receiving a Hello message, the router MUST check
                    the System ID of the Hello. If the System ID is the same
                    as its own, it indicates that System ID duplication has
                    occurred.</t>

                    <t>If there is no Router-Fingerprint TLV in the received
                    Hello message, this is interpreted as the attached router
                    either does not support auto-configuration, or does not
                    have it enabled. In this case, the auto-configuration
                    router MUST NOT form adjacency with the
                    non-autoconfiguration router.</t>
                  </list></t>

                <t>Duplication resolution<list style="empty">
                    <t>When duplicate System IDs are detected, the non-startup
                    mode router MUST check the S flag of the duplicated
                    Router-Fingerprint TLV:<list style="symbols">
                        <t>If the S flag is NOT set, then the router with the
                        numerically smaller or equal Router-Fingerprint MUST
                        generate a new System ID. Note that, the router MUST
                        compare the two Router-Fingerprint octet by octet
                        until difference is found.</t>

                        <t>If the S flag is set, no further action is
                        necessary in the Duplication resolution process.</t>
                      </list></t>
                  </list></t>

                <t>Re-joining the network with a new System ID (if
                required)<list style="empty">
                    <t>The router that has changed its System ID advertises
                    new Hellos containing the newly generated System ID to
                    re-join the IS-IS auto-configuration network. The
                    conflicting SysID-duplicated router also MUST increase the
                    sequence number and re-advertise its own Hellos.</t>

                    <t>The Duplication Detection process SHOULD be repeated
                    with the newly generated System.</t>
                  </list></t>
              </list></t>

            <t/>
          </section>

          <section anchor="dupltnon" title="Duplication Between Non-neighbors">
            <t>System ID duplication may also occur between non-neighbors,
            therefore an IS-IS auto-configuration router MUST also include the
            Router-Fingerprint TLV in its LSP messages. The specific
            procedures are as follows:</t>

            <t>Start-up Mode procedures:<list style="numbers">
                <t>Boot up, adjacency formation</t>

                <t>Acquiring LSPDB and checking System ID duplication<list
                    style="empty">
                    <t>The router generates only an LSP #0 which contains only
                    the Fingerprint TLV; and that Fingerprint is only sent in
                    LSP #0. A router remains in Start-up Mode until it has
                    successfully completed LSPDB synchronization with all
                    neighbors or until 1 minute has elapsed - whichever is
                    longer. If duplicate system-ID is detected, the router
                    MUST check the S flag of the Router-Fingerprint TLV of the
                    LSP that contains the duplicated System ID.</t>

                    <t><list style="symbols">
                        <t>If the S flag is not set, it means the LSP was
                        generated by a Non Start-up Mode node, then the router
                        itself MUST clear all adjacencies, re-generate a new
                        system-id and reenter Start-up Mode.</t>

                        <t>If the S flag is set, then the router which has a
                        numerically smaller Router-Fingerprint MUST generate a
                        new System ID and reenter Start-up Mode.</t>
                      </list></t>
                  </list></t>

                <t>Running in normal operation<list style="empty">
                    <t>After the System ID duplication procedure is done, the
                    router begins to run in normal operation. The router MUST
                    re-advertise the Router-Fingerprint TLV with the S flag
                    off.</t>
                  </list></t>
              </list></t>

            <t>Non Start-up Mode procedures:<list style="numbers">
                <t>Checking the received Router-Fingerprint TLVs<list
                    style="empty">
                    <t>When receiving a LSP containing its own System ID, the
                    router MUST check the Router-Fingerprint TLV. If the
                    Router-Fingerprint TLV is different from its own, it
                    indicates a System ID duplication occurs.</t>
                  </list></t>

                <t>Duplication resolution<list style="empty">
                    <t>When System ID duplication occurs, the non-startup mode
                    router MUST check the S flag of the duplicated
                    Router-Fingerprint TLV:<list style="symbols">
                        <t>If the S flag is NOT set, then the router with the
                        numerically smaller Router-Fingerprint MUST generate a
                        new System ID. Note that, the router MUST compare the
                        two Router-Fingerprint octet by octet until difference
                        is found.</t>

                        <t>If the S flag is set, then router does nothing.</t>
                      </list></t>
                  </list></t>

                <t>Re-joining the network with the new System ID<list
                    style="empty">
                    <t>The router changing its System ID advertises new LSPs
                    based on the newly generated System ID to re-join the
                    IS-IS auto-configuration network. The other
                    SysID-duplicated router also MUST re-advertise its own LSP
                    (after increasing the sequence number).</t>

                    <t>The newly generated System ID SHOULD perform
                    duplication detection as well.</t>
                  </list></t>
              </list></t>

            <t/>
          </section>
        </section>

        <section anchor="Unique"
                 title="System ID and Router-Fingerprint Generation Considerations">
          <t>As specified in this document, there are two distinguishing items
          that need to be self-generated: the System ID and
          Router-Fingerprint. In a network device, normally there are some
          resources which can provide an extremely high probability of
          uniqueness thus could be used as seeds to derive distinguisher (e.g.
          hashing or generating pseudo-random numbers), such as:</t>

          <t><list style="symbols">
              <t>MAC address(es)</t>

              <t>Configured IP address(es)</t>

              <t>Hardware IDs (e.g. CPU ID)</t>

              <t>Device serial number(s)</t>

              <t>System clock at a certain specific time</t>

              <t>Arbitrary received packet(s) on an interface(s)</t>
            </list></t>

          <t>This document recommends the use of an IEEE 802 48-bit MAC
          address associated with the router as the initial System ID. This
          document does not specify a specific method to re-generate the
          System ID when duplication happens.</t>

          <t>This document also does not specify a specific method to generate
          the Router-Fingerprint. However, the generation of System ID and
          Router-Fingerprint MUST be based on different seeds so that the two
          distinguisher would not collide.</t>

          <t>There is an important concern that the seeds listed above (except
          MAC address) might not be available in some small devices such as
          home routers. This is because of hardware/software limitations and
          the lack of sufficient communication packets at the initial stage in
          home routers when doing ISIS auto-configuration. In this case, this
          document suggests using the MAC address as System ID and generating
          a pseudo-random number based on another seed (such as the memory
          address of a certain variable in the program) as the
          Router-Fingerprint. The pseudo-random number might not have a very
          high probability of uniqueness in this solution, but should be
          sufficient in home networks scenarios.</t>

          <t>The considerations surrounding System ID stability described in
          section <xref target="NETGen"/> also need to be applied.</t>
        </section>

        <section anchor="DDuplct"
                 title="Double-Duplication of both System ID and Router-Fingerprint">
          <t>As described above, the resources for generating the
          distinguisher might be very constrained during the initial stages.
          Hence, the double-duplication of both System ID and
          Router-Fingerprint needs to be considered.</t>

          <t>ISIS-autoconfiguring routers SHOULD support detecting System ID
          duplication by LSP war. LSP war is a phenomenon whereby a router
          receives a LSP originated with its System ID, but it doesn't find it
          in the database, or it does not match the one the router has (e.g.
          it advertises IP prefixes that the router does not own, or IS
          neighbors that the router does not see), then per the ISIS
          specification, the router must re-originate its LSP with an
          increased sequence number. If double-duplication happens, the
          duplicated two routers will both continuously repeat the above
          behavior. After multiples iterations, the program should be able to
          deduce that double-duplication is occurring.</t>

          <t>When this condition is detected, routers should have much more
          entropies available. Thus, the router is able to extend or
          re-generate its Router-Fingerprint (one simple way is just adding
          the LSP sequence number of the next LSP it will send to the
          Router-Fingerprint).</t>
        </section>
      </section>

      <section title="IS-IS TLVs Usage">
        <t>This section describes the TLVs that are necessary for IS-IS
        auto-configuration.</t>

        <section anchor="AuthTLV" title="Authentication TLV">
          <t>It is RECOMMENDED that IS-IS routers supporting this
          specification minimally offer an option to explicitly configure a
          single password for HMAC-MD5 authentication, which is Type 54
          authentication mode of <xref target="RFC5304"/>. In this case, the
          Authentication TLV (TLV 10) is needed.</t>
        </section>

        <section title="Wide Metric TLV">
          <t>IS-IS auto-configuration routers MUST support TLVs using wide
          metrics as defined in <xref target="RFC5305"/>).</t>

          <t>It is RECOMMENDED that IS-IS auto-configuration routers use a
          high metric value (e.g. 1000000) as default in order to typically
          prefer manually configured adjacencies over auto-configuringed.</t>
        </section>

        <section title="Dynamic Host Name TLV">
          <t>IS-IS auto-configuration routers MAY advertise their Dynamic Host
          Names TLV (TLV 137, <xref target="RFC5301"/>). The host names could
          be provisioned by an IT system, or just use the name of vendor,
          device type or serial number, etc.</t>

          <t>To guarantee the uniqueness of the host names, the System ID
          SHOULD be appended as a suffix in the names.</t>
        </section>
      </section>

      <section anchor="behavior" title="Routing Behavior Considerations">
        <t/>

        <section title="Adjacency Formation">
          <t>Since IS-IS does not require strict hold timer matching to form
          adjacency, this document does not specify specific hold timers.
          However, the timers should be within a reasonable range based on
          current practise in the industry. (For example, the defaults defined
          in <xref target="ISO_IEC10589"/> .)</t>
        </section>
      </section>
    </section>

    <section title="Security Considerations">
      <t>In general, auto-configuration is mutually incompatible with
      authentication. This is a common problem that IS-IS auto-configuration
      can not avoid.</t>

      <t>For wired deployment, the wired connection itself could be considered
      as an implicit authentication in that unwanted routers are usually not
      able to connect (i.e. there is some kind of physical security in place
      preventing the connection of rogue devices); for wireless deployment,
      the authentication could be achieved at the lower wireless link
      layer.</t>

      <t>A malicious router could modify the System ID field to keep causing
      System ID duplication detection and resolution thus cause the routing
      system to oscillate. However, this is not a new attack vector as without
      this document the consequences would be higher as other routers would
      not have a mechanism to try and resolve this case.</t>
    </section>

    <section anchor="IANA" title="IANA Considerations">
      <t>IANA is kindly requested to assign a new TLV for the
      Router-Fingerprint from the IS-IS TLV Codepoint registry.</t>
    </section>

    <section anchor="Acknowledgements" title="Acknowledgements">
      <t>This document was heavily inspired by [RFC7503].</t>

      <t>Martin Winter, Christian Franke and David Lamparter gave essential
      feedback to improve the technical design based on their implementation
      experience.</t>

      <t>Many useful comments were made by Acee Lindem, Karsten Thomann,
      Hannes Gredler, Peter Lothberg, Uma Chundury, Qin Wu, Sheng Jiang and
      Nan Wu, etc.</t>

      <t>This document was produced using the xml2rfc tool <xref
      target="RFC2629"/>. (initially prepared using 2-Word-v2.0.template.dot.
      )</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <reference anchor="ISO_IEC10589">
        <front>
          <title>"Intermediate System to Intermediate System intra-domain
          routeing information exchange protocol for use in conjunction with
          the protocol for providing the connectionless-mode network service
          (ISO 8473)", ISO/IEC 10589</title>

          <author>
            <organization/>
          </author>

          <date day="15" month="November" year="2002"/>
        </front>
      </reference>

      <?rfc include='reference.RFC.1195'?>

      <?rfc include='reference.RFC.2629'?>

      <?rfc include='reference.RFC.5301'?>

      <?rfc include='reference.RFC.5304'?>

      <?rfc include='reference.RFC.5305'?>

      <?rfc include='reference.RFC.5308'?>

      <?rfc include='reference.RFC.6232'?>

      <?rfc ?>
    </references>

    <references title="Informative References">
      <?rfc include='reference.RFC.7503'?>
    </references>
  </back>
</rfc>
