draft-ietf-pim-igmp-mld-snooping-yang-16.txt | draft-ietf-pim-igmp-mld-snooping-yang-17.txt | |||
---|---|---|---|---|
PIM Working Group H. Zhao | PIM Working Group H. Zhao | |||
Internet Draft Ericsson | Internet Draft Ericsson | |||
Intended status: Standards Track X. Liu | Intended status: Standards Track X. Liu | |||
Expires: January 05, 2021 Volta Networks | Expires: January 07, 2021 Volta Networks | |||
Y. Liu | Y. Liu | |||
China Mobile | China Mobile | |||
M. Sivakumar | M. Sivakumar | |||
Juniper | Juniper | |||
A. Peter | A. Peter | |||
Individual | Individual | |||
July 06, 2020 | July 08, 2020 | |||
A Yang Data Model for IGMP and MLD Snooping | A Yang Data Model for IGMP and MLD Snooping | |||
draft-ietf-pim-igmp-mld-snooping-yang-16.txt | draft-ietf-pim-igmp-mld-snooping-yang-17.txt | |||
Abstract | Abstract | |||
This document defines a YANG data model that can be used to configure | This document defines a YANG data model that can be used to configure | |||
and manage Internet Group Management Protocol (IGMP) and Multicast | and manage Internet Group Management Protocol (IGMP) and Multicast | |||
Listener Discovery (MLD) Snooping devices. The YANG module in this | Listener Discovery (MLD) Snooping devices. The YANG module in this | |||
document conforms to Network Management Datastore Architecture (NMDA). | document conforms to Network Management Datastore Architecture (NMDA). | |||
Status of this Memo | Status of this Memo | |||
skipping to change at page 1, line 46 ¶ | skipping to change at page 1, line 46 ¶ | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
http://www.ietf.org/ietf/1id-abstracts.txt | http://www.ietf.org/ietf/1id-abstracts.txt | |||
The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
http://www.ietf.org/shadow.html | http://www.ietf.org/shadow.html | |||
This Internet-Draft will expire on January 05, 2021. | This Internet-Draft will expire on January 07, 2021. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2020 IETF Trust and the persons identified as the | Copyright (c) 2020 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
skipping to change at page 2, line 36 ¶ | skipping to change at page 2, line 36 ¶ | |||
2. Design of Data Model...........................................4 | 2. Design of Data Model...........................................4 | |||
2.1. Overview..................................................5 | 2.1. Overview..................................................5 | |||
2.2. Optional Capabilities.....................................5 | 2.2. Optional Capabilities.....................................5 | |||
2.3. Position of Address Family in Hierarchy...................6 | 2.3. Position of Address Family in Hierarchy...................6 | |||
3. Module Structure...............................................6 | 3. Module Structure...............................................6 | |||
3.1. IGMP Snooping Instances...................................7 | 3.1. IGMP Snooping Instances...................................7 | |||
3.2. MLD Snooping Instances....................................9 | 3.2. MLD Snooping Instances....................................9 | |||
3.3. Using IGMP and MLD Snooping Instances....................11 | 3.3. Using IGMP and MLD Snooping Instances....................11 | |||
3.4. IGMP and MLD Snooping Actions............................12 | 3.4. IGMP and MLD Snooping Actions............................12 | |||
4. IGMP and MLD Snooping YANG Module.............................12 | 4. IGMP and MLD Snooping YANG Module.............................12 | |||
5. Security Considerations.......................................34 | 5. Security Considerations.......................................33 | |||
6. IANA Considerations...........................................35 | 6. IANA Considerations...........................................35 | |||
7. References....................................................36 | 7. References....................................................36 | |||
7.1. Normative References.....................................36 | 7.1. Normative References.....................................36 | |||
7.2. Informative References...................................38 | 7.2. Informative References...................................38 | |||
Appendix A. Data Tree Example...................................39 | Appendix A. Data Tree Example...................................39 | |||
A.1 Bridge scenario...........................................39 | A.1 Bridge scenario...........................................39 | |||
A.2 L2VPN scenario............................................42 | A.2 L2VPN scenario............................................42 | |||
Authors' Addresses...............................................46 | Authors' Addresses...............................................46 | |||
1. Introduction | 1. Introduction | |||
skipping to change at page 5, line 29 ¶ | skipping to change at page 5, line 29 ¶ | |||
this document is to define a data model that provides a common user | this document is to define a data model that provides a common user | |||
interface to IGMP and MLD Snooping. | interface to IGMP and MLD Snooping. | |||
2.1. Overview | 2.1. Overview | |||
The IGMP and MLD Snooping YANG module defined in this document has all | The IGMP and MLD Snooping YANG module defined in this document has all | |||
the common building blocks for the IGMP and MLD Snooping switches. | the common building blocks for the IGMP and MLD Snooping switches. | |||
The YANG module includes IGMP and MLD Snooping instance definition, | The YANG module includes IGMP and MLD Snooping instance definition, | |||
using instance in the scenario of BRIDGE [dot1Qcp] and L2VPN [draft- | using instance in the scenario of BRIDGE [dot1Qcp] and L2VPN [draft- | |||
ietf-bess-l2vpn-yang]. The module also includes the RPC methods for | ietf-bess-l2vpn-yang]. The module also includes actions for clearing | |||
clearing IGMP and MLD Snooping group tables. | IGMP and MLD Snooping group tables. | |||
This YANG module conforms to Network Management Datastore Architecture | ||||
(NMDA)[RFC8342]. This NMDA architecture provides an architectural | ||||
framework for datastores as they are used by network management | ||||
protocols such as NETCONF [RFC6241], RESTCONF [RFC8040] and the YANG | ||||
[RFC7950] data modeling language. | ||||
2.2. Optional Capabilities | 2.2. Optional Capabilities | |||
This model is designed to represent the basic capability subsets of IGMP | This model is designed to represent the basic capability subsets of IGMP | |||
and MLD Snooping. The main design goals of this document are that the | and MLD Snooping. The main design goals of this document are that the | |||
basic capabilities described in the model are supported by any major | basic capabilities described in the model are supported by any major | |||
now-existing implementation, and that the configuration of all | now-existing implementation, and that the configuration of all | |||
implementations meeting the specifications is easy to express through | implementations meeting the specifications is easy to express through | |||
some combination of the optional features in the model and simple vendor | some combination of the optional features in the model and simple vendor | |||
augmentations. | augmentations. | |||
skipping to change at page 7, line 11 ¶ | skipping to change at page 6, line 53 ¶ | |||
The "igmp-snooping-instance" container instantiates an IGMP Snooping | The "igmp-snooping-instance" container instantiates an IGMP Snooping | |||
Instance. The "mld-snooping-instance" container instantiates an MLD | Instance. The "mld-snooping-instance" container instantiates an MLD | |||
Snooping Instance. | Snooping Instance. | |||
The YANG data model defined in this document conforms to the Network | The YANG data model defined in this document conforms to the Network | |||
Management Datastore Architecture (NMDA) [RFC8342]. The operational | Management Datastore Architecture (NMDA) [RFC8342]. The operational | |||
state data is combined with the associated configuration data in the | state data is combined with the associated configuration data in the | |||
same hierarchy [RFC8407]. | same hierarchy [RFC8407]. | |||
A configuration data node is marked as mandatory only when its value | A configuration data node is marked as mandatory only when its value | |||
must be provided by the user. Where nodes are not essential to protocol | must be provided by the user. Where nodes are not essential to protocol | |||
operation, they are marked as optional. Some other nodes are essential | operation, they are marked as optional. Some other nodes are essential | |||
but have a default specified, so that they are also optional and need | but have a default specified, so that they are also optional and need | |||
not be configured explicitly. | not be configured explicitly. | |||
3.1. IGMP Snooping Instances | 3.1. IGMP Snooping Instances | |||
The YANG module ietf-igmp-mld-snooping augments /rt:routing/rt:control- | The YANG module ietf-igmp-mld-snooping augments /rt:routing/rt:control- | |||
plane-protocols/rt:control-plane-protocol to add the igmp-snooping- | plane-protocols/rt:control-plane-protocol to add the igmp-snooping- | |||
instance container. | instance container. | |||
End of changes. 7 change blocks. | ||||
14 lines changed or deleted | 8 lines changed or added | |||
This html diff was produced by rfcdiff 1.47. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |