Internet DRAFT - draft-ietf-isis-prefix-attributes
draft-ietf-isis-prefix-attributes
Networking Working Group L. Ginsberg, Ed.
Internet-Draft Cisco Systems
Intended status: Standards Track B. Decraene
Expires: July 7, 2016 Orange
S. Previdi
Cisco Systems
X. Xu
Huawei
U. Chunduri
Ericsson
January 4, 2016
IS-IS Prefix Attributes for Extended IP and IPv6 Reachability
draft-ietf-isis-prefix-attributes-04.txt
Abstract
This document introduces new sub-TLVs to support advertisement of IP
and IPv6 prefix attribute flags and the source router ID of the
router which originated a prefix advertisement.
Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on July 7, 2016.
Ginsberg, et al. Expires July 7, 2016 [Page 1]
Internet-Draft isis-prefix-attributes January 2016
Copyright Notice
Copyright (c) 2016 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. New sub-TLVs for Extended Reachability TLVs . . . . . . . . . 3
2.1. IPv4/IPv6 Extended Reachability Attribute Flags . . . . . 3
2.2. IPv4/IPv6 Source Router ID . . . . . . . . . . . . . . . 5
2.3. Advertising Router IDs . . . . . . . . . . . . . . . . . 5
3. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6
4. Security Considerations . . . . . . . . . . . . . . . . . . . 6
5. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 6
6. References . . . . . . . . . . . . . . . . . . . . . . . . . 7
6.1. Normative References . . . . . . . . . . . . . . . . . . 7
6.2. Informational References . . . . . . . . . . . . . . . . 8
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 8
1. Introduction
IS-IS is a link state routing protocol defined in [ISO10589] and
[RFC1195]. Extensions in support of advertising new forms of IP/IPv6
prefix reachability are defined in [RFC5305], [RFC5308], and
[RFC5120].
There are existing use cases in which knowing additional attributes
of a prefix is useful.
It is useful to know whether an advertised prefix is directly
connected to the advertising router or not. In the case of [SR]
knowing whether a prefix is directly connected or not determines what
action should be taken as regards processing of labels associated
with an incoming packet.
Ginsberg, et al. Expires July 7, 2016 [Page 2]
Internet-Draft isis-prefix-attributes January 2016
It is useful to know what addresses can be used as addresses of the
node in support of services (e.g., Remote Loop Free Alternate (RLFA)
endpoint).
Current formats of the Extended Reachability TLVs for both IP and
IPv6 are fixed and do not allow the introduction of additional flags
without backwards compatibility issues. Therefore a new sub-TLV is
introduced which allows for the advertisement of attribute flags
associated with prefix advertisements.
In cases where multiple node addresses are advertised by a given
router it is also useful to be able to associate all of these
addresses with a single Router-ID even when prefixes are advertised
outside of the area in which they are originated. Therefore a new
sub-TLV is introduced to advertise the router-id of the originator of
a prefix advertisement.
2. New sub-TLVs for Extended Reachability TLVs
The following new sub-TLVs are introduced:
o IPv4/IPv6 Extended Reachability Attributes
o IPv4 Source Router ID
o IPv6 Source Router ID
All sub-TLVs are applicable to TLVs 135, 235, 236, and/or 237.
2.1. IPv4/IPv6 Extended Reachability Attribute Flags
This sub-TLV supports the advertisement of additional flags
associated with a given prefix advertisement. The behavior of each
flag when a prefix advertisement is leaked from one level to another
(upwards or downwards) is explicitly defined below.
All flags are applicable to TLVs 135, 235, 236, 237 unless otherwise
stated.
Ginsberg, et al. Expires July 7, 2016 [Page 3]
Internet-Draft isis-prefix-attributes January 2016
Prefix Attribute Flags
Type: 4 (suggested - to be assigned by IANA)
Length: Number of octets to follow
Value
(Length * 8) bits.
0 1 2 3 4 5 6 7...
+-+-+-+-+-+-+-+-+...
|X|R|N| ...
+-+-+-+-+-+-+-+-+...
Bits are defined/sent starting with Bit #0 defined below. Additional
bit definitions which may be defined in the future SHOULD be assigned
in ascending bit order so as to minimize the number of bits which
will need to be transmitted.
Undefined bits MUST be transmitted as 0 and MUST be
ignored on receipt.
Bits which are NOT transmitted MUST be treated as if they are
set to 0 on receipt.
X-Flag: External Prefix Flag (Bit 0)
Set if the prefix has been redistributed from another protocol.
This includes the case where multiple virtual routers are
supported and the source of the redistributed prefix is another
IS-IS instance.
The flag MUST be preserved when leaked between levels.
In TLVs 236 and 237 this flag SHOULD always be sent as 0 and
MUST be ignored on receipt. This is because there is an existing
X flag defined in the fixed format of these TLVs as specified in
[RFC5308] and [RFC5120].
R-Flag: Re-advertisement Flag (Bit 1)
Set when the prefix has been leaked from one level to another
(upwards or downwards).
N-flag: Node Flag (Bit 2)
Set when the prefix identifies the advertising router i.e., the
prefix is a host prefix advertising a globally reachable address
typically associated with a loopback address.
The advertising router MAY choose to NOT set this flag even when
the above conditions are met.
If the flag is set and the prefix length is NOT a host prefix
(/32 for IPV4, /128 for IPv6) then the flag MUST be ignored.
The flag MUST be preserved when leaked between levels.
Ginsberg, et al. Expires July 7, 2016 [Page 4]
Internet-Draft isis-prefix-attributes January 2016
2.2. IPv4/IPv6 Source Router ID
When a reachability advertisement is leaked from one level to
another, the source of the original advertisement is unknown. In
cases where the advertisement is an identifier for the advertising
router (e.g., N-flag set in the Extended Reachability Attribute sub-
TLV as described in the previous section) it may be useful for other
routers to know the source of the advertisement. The sub-TLVs
defined below provide this information.
Note that the Router ID advertised is always the Router ID of the IS-
IS instance which originated the advertisement. This would be true
even if the prefix has been learned from another protocol (X-flag set
as defined in Section 2.1).
IPv4 Source Router ID
Type: 11 (suggested - to be assigned by IANA)
Length: 4
Value: IPv4 Router ID of the source of the advertisement
Inclusion of this TLV is optional and MAY occur in TLVs
135, 235, 236, or 237. When included the value MUST be
identical to the value advertised in Traffic Engineering
router ID (TLV 134) defined in [RFC5305].
If present the sub-TLV MUST be included when the prefix
advertisement is leaked to another level.
IPv6 Source Router ID
Type: 12 (suggested - to be assigned by IANA)
Length: 16
Value: IPv6 Router ID of the source of the advertisement
Inclusion of this TLV is optional and MAY occur in TLVs
135, 235, 236, or 237. When included the value MUST be
identical to the value advertised in IPv6 TE Router ID
(TLV 140) defined in [RFC6119].
If present the sub-TLV MUST be included when the prefix
advertisement is leaked to another level.
2.3. Advertising Router IDs
[RFC5305] and [RFC6119] define the advertisement of router IDs for
IPv4 and IPv6 respectively. Although both drafts discuss the use of
router ID in the context of Traffic Engineering (TE), the
advertisement of router IDs is explicitly allowed for purposes other
Ginsberg, et al. Expires July 7, 2016 [Page 5]
Internet-Draft isis-prefix-attributes January 2016
than TE. The use of router IDs to identify the source of a prefix
advertisement as defined in the previous section is one such use
case. Therefore, whenever the source router ID sub-TLVs defined in
the previous section are used, the originating router SHOULD also
advertise the corresponding address-family specific router ID TLV(s).
3. IANA Considerations
This document adds the following new sub-TLVs to the registry of sub-
TLVs for TLVs 135, 235, 236, 237.
Value: 4 (suggested - to be assigned by IANA)
Name: Prefix Attribute Flags
Value: 11 (suggested - to be assigned by IANA)
Name: IPv4 Source Router ID
Value: 12 (suggested - to be assigned by IANA)
Name: IPv6 Source Router ID
This document also introduces a new registry for bit values in the
Prefix Attribute Flags sub-TLV. Registration policy is Expert Review
as defined in [RFC5226]. This registry is to be part of the IS-IS
TLV Codepoints registry. The name of the registry is "Bit values for
Prefix Attribute Flags sub-TLV". Defined values are:
Bit # Name
----- ------------------------
0 External Prefix Flag (X-flag)
1 Re-advertisement Flag (R-flag)
2 Node Flag (N-flag)
4. Security Considerations
Security concerns for IS-IS are addressed in [RFC5304] and [RFC5310].
Advertisement of the additional information defined in this document
introduces no new security concerns.
5. Contributors
The following people gave a substantial contribution to the content
of this document and should be considered as co-authors:
Ginsberg, et al. Expires July 7, 2016 [Page 6]
Internet-Draft isis-prefix-attributes January 2016
Clarence Filsfils
Cisco Systems
Email: cf@cisco.com
Stephane Litkowski
Orange Business Service
Email: stephane.litkowski@orange.com
6. References
6.1. Normative References
[ISO10589]
International Organization for Standardization,
"Intermediate system to Intermediate system intra-domain
routeing information exchange protocol for use in
conjunction with the protocol for providing the
connectionless-mode Network Service (ISO 8473)", ISO/
IEC 10589:2002, Second Edition, Nov 2002.
[RFC1195] Callon, R., "Use of OSI IS-IS for routing in TCP/IP and
dual environments", RFC 1195, DOI 10.17487/RFC1195,
December 1990, <http://www.rfc-editor.org/info/rfc1195>.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<http://www.rfc-editor.org/info/rfc2119>.
[RFC5120] Przygienda, T., Shen, N., and N. Sheth, "M-ISIS: Multi
Topology (MT) Routing in Intermediate System to
Intermediate Systems (IS-ISs)", RFC 5120,
DOI 10.17487/RFC5120, February 2008,
<http://www.rfc-editor.org/info/rfc5120>.
[RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", BCP 26, RFC 5226,
DOI 10.17487/RFC5226, May 2008,
<http://www.rfc-editor.org/info/rfc5226>.
[RFC5304] Li, T. and R. Atkinson, "IS-IS Cryptographic
Authentication", RFC 5304, DOI 10.17487/RFC5304, October
2008, <http://www.rfc-editor.org/info/rfc5304>.
Ginsberg, et al. Expires July 7, 2016 [Page 7]
Internet-Draft isis-prefix-attributes January 2016
[RFC5305] Li, T. and H. Smit, "IS-IS Extensions for Traffic
Engineering", RFC 5305, DOI 10.17487/RFC5305, October
2008, <http://www.rfc-editor.org/info/rfc5305>.
[RFC5308] Hopps, C., "Routing IPv6 with IS-IS", RFC 5308,
DOI 10.17487/RFC5308, October 2008,
<http://www.rfc-editor.org/info/rfc5308>.
[RFC5310] Bhatia, M., Manral, V., Li, T., Atkinson, R., White, R.,
and M. Fanto, "IS-IS Generic Cryptographic
Authentication", RFC 5310, DOI 10.17487/RFC5310, February
2009, <http://www.rfc-editor.org/info/rfc5310>.
[RFC6119] Harrison, J., Berger, J., and M. Bartlett, "IPv6 Traffic
Engineering in IS-IS", RFC 6119, DOI 10.17487/RFC6119,
February 2011, <http://www.rfc-editor.org/info/rfc6119>.
6.2. Informational References
[SR] "IS-IS Extensions for Segment Routing, draft-ietf-isis-
segment-routing-extensions-06(work in progress)", December
2015.
Authors' Addresses
Les Ginsberg (editor)
Cisco Systems
510 McCarthy Blvd.
Milpitas, CA 95035
USA
Email: ginsberg@cisco.com
Bruno Decraene
Orange
38 rue du General Leclerc
Issy Moulineaux cedex 9 92794
France
Email: bruno.decraene@orange.com
Ginsberg, et al. Expires July 7, 2016 [Page 8]
Internet-Draft isis-prefix-attributes January 2016
Stefano Previdi
Cisco Systems
Via Del Serafico 200
Rome 0144
Italy
Email: sprevidi@cisco.com
Xiaohu Xu
Huawei
Email: xuxiaohu@huawei.com
Uma Chunduri
Ericsson
Email: uma.chunduri@ericsson.com
Ginsberg, et al. Expires July 7, 2016 [Page 9]