draft-ietf-pim-igmp-mld-snooping-yang-02.txt   draft-ietf-pim-igmp-mld-snooping-yang-03.txt 
PIM Working Group H. Zhao PIM Working Group H. Zhao
Internet Draft Ericsson Internet Draft Ericsson
Intended status: Standards Track X. Liu Intended status: Standards Track X. Liu
Expires: November 13, 2018 Jabil Expires: November 28, 2018 Jabil
Y. Liu Y. Liu
Huawei Huawei
M. Sivakumar M. Sivakumar
Cisco Cisco
A. Peter A. Peter
Individual Individual
May 14, 2018 May 29, 2018
A Yang Data Model for IGMP and MLD Snooping A Yang Data Model for IGMP and MLD Snooping
draft-ietf-pim-igmp-mld-snooping-yang-02.txt draft-ietf-pim-igmp-mld-snooping-yang-03.txt
Abstract Abstract
This document defines a YANG data model that can be used to This document defines a YANG data model that can be used to
configure and manage Internet Group Management Protocol (IGMP) and configure and manage Internet Group Management Protocol (IGMP) and
Multicast Listener Discovery (MLD) Snooping devices. Multicast Listener Discovery (MLD) Snooping devices.
Status of this Memo Status of this Memo
This Internet-Draft is submitted in full conformance with the This Internet-Draft is submitted in full conformance with the
skipping to change at page 1, line 45 skipping to change at page 1, line 45
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html http://www.ietf.org/shadow.html
This Internet-Draft will expire on November 13, 2018. This Internet-Draft will expire on November 28, 2018.
Copyright Notice Copyright Notice
Copyright (c) 2018 IETF Trust and the persons identified as the Copyright (c) 2018 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 2, line 32 skipping to change at page 2, line 32
1. Introduction...................................................3 1. Introduction...................................................3
1.1. Terminology...............................................3 1.1. Terminology...............................................3
1.2. Tree Diagrams.............................................3 1.2. Tree Diagrams.............................................3
2. Design of Data Model...........................................4 2. Design of Data Model...........................................4
2.1. Overview..................................................4 2.1. Overview..................................................4
2.2. IGMP Snooping Instances...................................4 2.2. IGMP Snooping Instances...................................4
2.3. MLD Snooping Instances....................................7 2.3. MLD Snooping Instances....................................7
2.4. IGMP and MLD Snooping References..........................9 2.4. IGMP and MLD Snooping References..........................9
2.5. Augment /if:interfaces/if:interface......................10 2.5. Augment /if:interfaces/if:interface......................10
2.6. IGMP and MLD Snooping RPC................................12 2.6. IGMP and MLD Snooping RPC................................12
3. IGMP and MLD Snooping YANG Module.............................13 3. IGMP and MLD Snooping YANG Module.............................12
4. Security Considerations.......................................42 4. Security Considerations.......................................42
5. IANA Considerations...........................................44 5. IANA Considerations...........................................43
6. Normative References..........................................44 6. Normative References..........................................44
Appendix A. Data Tree Example...................................46 Appendix A. Data Tree Example...................................45
Authors' Addresses...............................................52 Authors' Addresses...............................................49
1. Introduction 1. Introduction
This document defines a YANG [RFC6020] data model for the management This document defines a YANG [RFC6020] data model for the management
of Internet Group Management Protocol (IGMP) and Multicast Listener of Internet Group Management Protocol (IGMP) and Multicast Listener
Discovery (MLD) Snooping devices. Discovery (MLD) Snooping devices.
The YANG model in this document conforms to the Network Management The YANG model in this document conforms to the Network Management
Datastore Architecture defined in [I-D.ietf-netmod-revised- Datastore Architecture defined in [I-D.ietf-netmod-revised-
datastores]. The "Network Management Datastore Architecture" (NMDA) datastores]. The "Network Management Datastore Architecture" (NMDA)
skipping to change at page 16, line 46 skipping to change at page 16, line 30
type leafref { type leafref {
path "/mld-snooping-instances/mld-snooping-instance/name"; path "/mld-snooping-instances/mld-snooping-instance/name";
} }
description description
"This type is used by data models that need to reference mld "This type is used by data models that need to reference mld
snooping instance."; snooping instance.";
} }
typedef l2vpn-instance-ac-ref { typedef l2vpn-instance-ac-ref {
type leafref { type leafref {
path "/ni:network-instances/ni:network-instance/l2vpn:endpoint/l2vpn:name"; path "/ni:network-instances/ni:network-instance/l2vpn:endpoint/l2vpn:name";
} }
description "l2vpn-instance-ac-ref"; description "l2vpn-instance-ac-ref";
} }
typedef l2vpn-instance-pw-ref { typedef l2vpn-instance-pw-ref {
type leafref { type leafref {
path "/ni:network-instances/ni:network-instance/l2vpn:endpoint/l2vpn:name"; path "/ni:network-instances/ni:network-instance/l2vpn:endpoint/l2vpn:name";
} }
description "l2vpn-instance-pw-ref"; description "l2vpn-instance-pw-ref";
} }
typedef source-ipv4-addr-type { typedef source-ipv4-addr-type {
type union { type union {
type enumeration { type enumeration {
enum '*' { enum '*' {
description description
"Any source address."; "Any source address.";
skipping to change at page 47, line 9 skipping to change at page 46, line 9
| +--+ | | +--+ |
| | | | | | | |
| | | | | | | |
+-------+ | | +-------+ | |
Source Source
The configuration instance data tree for R1 in the above figure could be The configuration instance data tree for R1 in the above figure could be
as follows: as follows:
{ {
"ietf-igmp-mld-snooping:igmp-snooping-instances": {
"ietf-igmp-mld-snooping:igmp-snooping-instances": { "igmp-snooping-instance": [
{
"igmp-snooping-instance": [ "name": "ins101",
"type": "bridge",
{ "enable": true
}
"name": "ins101", ]
},
"type": "bridge", "ietf-igmp-mld-snooping:mld-snooping-instances": {
"mld-snooping-instance": [
"enable": true {
"name": "ins102",
} "type": "bridge",
"enable": true
] }
]
}, },
"ietf-igmp-mld-snooping:bridges": {
"ietf-igmp-mld-snooping:mld-snooping-instances": { "bridge": [
{
"mld-snooping-instance": [ "name": "isp",
"component": [
{ {
"name": "comp1",
"name": "ins102", "bridge-vlan": {
"vlan": [
"type": "bridge", {
"vid": 101,
"enable": true "igmp-snooping-instance": "ins101"
},
} {
"vid": 102,
] "mld-snooping-instance": "ins102"
}
}, ]
}
"ietf-igmp-mld-snooping:bridges": { }
]
"bridge": [ }
]
{ }
}
"name": "isp",
"component": [
{
"name": "comp1",
"bridge-vlan": {
"vlan": [
{
"vid": 101,
"igmp-snooping-instance": "ins101"
},
{
"vid": 102,
"mld-snooping-instance": "ins102"
}
]
}
}
]
}
]
}
}
The corresponding operational state data for R1 could be as follows: The corresponding operational state data for R1 could be as follows:
{ {
"ietf-interfaces:interfaces": {
"ietf-igmp-mld-snooping:igmp-snooping-instances": { "interface": [
{
"igmp-snooping-instance": [ "name": "1/1",
"type": "iana-if-type:ethernetCsmacd",
{ "admin-status": "up",
"if-index": 214748,
"name": "ins101", "oper-status": "up",
"type": "bridge", "statistics": {
"discontinuity-time": "2018-05-23T12:34:56-05:00"
"enable": true, }
},
"forwarding-mode": "ip", {
"name": "1/2",
"explicit-tracking": false, "type": "iana-if-type:ethernetCsmacd",
"admin-status": "up",
"exclude-lite": false, "if-index": 214749,
"oper-status": "up",
"send-query": true, "statistics": {
"discontinuity-time": "2018-05-23T12:35:06-05:02"
"immediate-leave": [null], }
}
"last-member-query-interval": 1, ]
},
"query-interval": 125, "ietf-igmp-mld-snooping:igmp-snooping-instances": {
"igmp-snooping-instance": [
"query-max-response-time": 10, {
"name": "ins101",
"require-router-alert": false, "type": "bridge",
"enable": true,
"robustness-variable": 2, "forwarding-mode": "ip",
"explicit-tracking": false,
"entries-count": 1, "exclude-lite": false,
"send-query": true,
"bridge-mrouter-interface": ["1/1"], "immediate-leave": [null],
"last-member-query-interval": 1,
"group": [ "query-interval": 125,
"query-max-response-time": 10,
{ "require-router-alert": false,
"robustness-variable": 2,
"address": "223.0.0.1", "entries-count": 1,
"bridge-mrouter-interface": ["1/1"],
"mac-address": "01:00:5e:00:00:01", "group": [
{
"expire": 120, "address": "223.0.0.1",
"mac-address": "01:00:5e:00:00:01",
"expire": 120,
"up-time": 180,
"last-reporter": "100.0.0.1",
"source": [
{
"address": "192.168.0.1",
"bridge-outgoing-interface": ["1/2"],
"up-time": 180, "up-time": 180,
"last-reporter": "100.0.0.1",
"source": [
{
"address": "192.168.0.1",
"bridge-outgoing-interface": ["1/2"],
"up-time": 180,
"expire": 120,
"last-reporter": "100.0.0.1"
}
]
}
]
}
]
},
"ietf-igmp-mld-snooping:mld-snooping-instances": {
"mld-snooping-instance": [
{
"name": "ins102",
"type": "bridge",
"enable": true,
"forwarding-mode": "ip",
"explicit-tracking": false,
"exclude-lite": false,
"send-query": true,
"immediate-leave": [null],
"last-member-query-interval": 1,
"query-interval": 125,
"query-max-response-time": 10,
"require-router-alert": false,
"robustness-variable": 2,
"entries-count": 1,
"bridge-mrouter-interface": ["1/1"],
"group": [
{
"address": "FF0E::1",
"mac-address": "01:00:5e:00:00:01",
"expire": 120, "expire": 120,
"last-reporter": "100.0.0.1"
}
]
}
]
}
]
},
"ietf-igmp-mld-snooping:mld-snooping-instances": {
"mld-snooping-instance": [
{
"name": "ins102",
"type": "bridge",
"enable": true,
"forwarding-mode": "ip",
"explicit-tracking": false,
"exclude-lite": false,
"send-query": true,
"immediate-leave": [null],
"last-member-query-interval": 1,
"query-interval": 125,
"query-max-response-time": 10,
"require-router-alert": false,
"robustness-variable": 2,
"entries-count": 1,
"bridge-mrouter-interface": ["1/1"],
"group": [
{
"address": "FF0E::1",
"mac-address": "01:00:5e:00:00:01",
"expire": 120,
"up-time": 180,
"last-reporter": "2001::1",
"source": [
{
"address": "3001::1",
"bridge-outgoing-interface": ["1/2"],
"up-time": 180, "up-time": 180,
"expire": 120,
"last-reporter": "2001::1", "last-reporter": "2001::1"
}
"source": [ ]
}
{ ]
}
"address": "3001::1", ]
}
"bridge-outgoing-interface": ["1/2"], }
"up-time": 180,
"expire": 120,
"last-reporter": "2001::1"
}
]
}
]
}
]
}
Authors' Addresses Authors' Addresses
Hongji Zhao Hongji Zhao
Ericsson (China) Communications Company Ltd. Ericsson (China) Communications Company Ltd.
Ericsson Tower, No. 5 Lize East Street, Ericsson Tower, No. 5 Lize East Street,
Chaoyang District Beijing 100102, P.R. China Chaoyang District Beijing 100102, P.R. China
Email: hongji.zhao@ericsson.com Email: hongji.zhao@ericsson.com
Xufeng Liu Xufeng Liu
 End of changes. 14 change blocks. 
247 lines changed or deleted 153 lines changed or added

This html diff was produced by rfcdiff 1.46. The latest version is available from http://tools.ietf.org/tools/rfcdiff/