draft-ietf-pim-igmp-mld-snooping-yang-16.txt   draft-ietf-pim-igmp-mld-snooping-yang-17.txt 
PIM Working Group H. Zhao PIM Working Group H. Zhao
Internet Draft Ericsson Internet Draft Ericsson
Intended status: Standards Track X. Liu Intended status: Standards Track X. Liu
Expires: January 05, 2021 Volta Networks Expires: January 07, 2021 Volta Networks
Y. Liu Y. Liu
China Mobile China Mobile
M. Sivakumar M. Sivakumar
Juniper Juniper
A. Peter A. Peter
Individual Individual
July 06, 2020 July 08, 2020
A Yang Data Model for IGMP and MLD Snooping A Yang Data Model for IGMP and MLD Snooping
draft-ietf-pim-igmp-mld-snooping-yang-16.txt draft-ietf-pim-igmp-mld-snooping-yang-17.txt
Abstract Abstract
This document defines a YANG data model that can be used to configure This document defines a YANG data model that can be used to configure
and manage Internet Group Management Protocol (IGMP) and Multicast and manage Internet Group Management Protocol (IGMP) and Multicast
Listener Discovery (MLD) Snooping devices. The YANG module in this Listener Discovery (MLD) Snooping devices. The YANG module in this
document conforms to Network Management Datastore Architecture (NMDA). document conforms to Network Management Datastore Architecture (NMDA).
Status of this Memo Status of this Memo
skipping to change at page 1, line 46 skipping to change at page 1, line 46
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html http://www.ietf.org/shadow.html
This Internet-Draft will expire on January 05, 2021. This Internet-Draft will expire on January 07, 2021.
Copyright Notice Copyright Notice
Copyright (c) 2020 IETF Trust and the persons identified as the Copyright (c) 2020 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 2, line 36 skipping to change at page 2, line 36
2. Design of Data Model...........................................4 2. Design of Data Model...........................................4
2.1. Overview..................................................5 2.1. Overview..................................................5
2.2. Optional Capabilities.....................................5 2.2. Optional Capabilities.....................................5
2.3. Position of Address Family in Hierarchy...................6 2.3. Position of Address Family in Hierarchy...................6
3. Module Structure...............................................6 3. Module Structure...............................................6
3.1. IGMP Snooping Instances...................................7 3.1. IGMP Snooping Instances...................................7
3.2. MLD Snooping Instances....................................9 3.2. MLD Snooping Instances....................................9
3.3. Using IGMP and MLD Snooping Instances....................11 3.3. Using IGMP and MLD Snooping Instances....................11
3.4. IGMP and MLD Snooping Actions............................12 3.4. IGMP and MLD Snooping Actions............................12
4. IGMP and MLD Snooping YANG Module.............................12 4. IGMP and MLD Snooping YANG Module.............................12
5. Security Considerations.......................................34 5. Security Considerations.......................................33
6. IANA Considerations...........................................35 6. IANA Considerations...........................................35
7. References....................................................36 7. References....................................................36
7.1. Normative References.....................................36 7.1. Normative References.....................................36
7.2. Informative References...................................38 7.2. Informative References...................................38
Appendix A. Data Tree Example...................................39 Appendix A. Data Tree Example...................................39
A.1 Bridge scenario...........................................39 A.1 Bridge scenario...........................................39
A.2 L2VPN scenario............................................42 A.2 L2VPN scenario............................................42
Authors' Addresses...............................................46 Authors' Addresses...............................................46
1. Introduction 1. Introduction
skipping to change at page 5, line 29 skipping to change at page 5, line 29
this document is to define a data model that provides a common user this document is to define a data model that provides a common user
interface to IGMP and MLD Snooping. interface to IGMP and MLD Snooping.
2.1. Overview 2.1. Overview
The IGMP and MLD Snooping YANG module defined in this document has all The IGMP and MLD Snooping YANG module defined in this document has all
the common building blocks for the IGMP and MLD Snooping switches. the common building blocks for the IGMP and MLD Snooping switches.
The YANG module includes IGMP and MLD Snooping instance definition, The YANG module includes IGMP and MLD Snooping instance definition,
using instance in the scenario of BRIDGE [dot1Qcp] and L2VPN [draft- using instance in the scenario of BRIDGE [dot1Qcp] and L2VPN [draft-
ietf-bess-l2vpn-yang]. The module also includes the RPC methods for ietf-bess-l2vpn-yang]. The module also includes actions for clearing
clearing IGMP and MLD Snooping group tables. IGMP and MLD Snooping group tables.
This YANG module conforms to Network Management Datastore Architecture
(NMDA)[RFC8342]. This NMDA architecture provides an architectural
framework for datastores as they are used by network management
protocols such as NETCONF [RFC6241], RESTCONF [RFC8040] and the YANG
[RFC7950] data modeling language.
2.2. Optional Capabilities 2.2. Optional Capabilities
This model is designed to represent the basic capability subsets of IGMP This model is designed to represent the basic capability subsets of IGMP
and MLD Snooping. The main design goals of this document are that the and MLD Snooping. The main design goals of this document are that the
basic capabilities described in the model are supported by any major basic capabilities described in the model are supported by any major
now-existing implementation, and that the configuration of all now-existing implementation, and that the configuration of all
implementations meeting the specifications is easy to express through implementations meeting the specifications is easy to express through
some combination of the optional features in the model and simple vendor some combination of the optional features in the model and simple vendor
augmentations. augmentations.
skipping to change at page 7, line 11 skipping to change at page 6, line 53
The "igmp-snooping-instance" container instantiates an IGMP Snooping The "igmp-snooping-instance" container instantiates an IGMP Snooping
Instance. The "mld-snooping-instance" container instantiates an MLD Instance. The "mld-snooping-instance" container instantiates an MLD
Snooping Instance. Snooping Instance.
The YANG data model defined in this document conforms to the Network The YANG data model defined in this document conforms to the Network
Management Datastore Architecture (NMDA) [RFC8342]. The operational Management Datastore Architecture (NMDA) [RFC8342]. The operational
state data is combined with the associated configuration data in the state data is combined with the associated configuration data in the
same hierarchy [RFC8407]. same hierarchy [RFC8407].
A configuration data node is marked as mandatory only when its value A configuration data node is marked as mandatory only when its value
must be provided by the user. Where nodes are not essential to protocol must be provided by the user. Where nodes are not essential to protocol
operation, they are marked as optional. Some other nodes are essential operation, they are marked as optional. Some other nodes are essential
but have a default specified, so that they are also optional and need but have a default specified, so that they are also optional and need
not be configured explicitly. not be configured explicitly.
3.1. IGMP Snooping Instances 3.1. IGMP Snooping Instances
The YANG module ietf-igmp-mld-snooping augments /rt:routing/rt:control- The YANG module ietf-igmp-mld-snooping augments /rt:routing/rt:control-
plane-protocols/rt:control-plane-protocol to add the igmp-snooping- plane-protocols/rt:control-plane-protocol to add the igmp-snooping-
instance container. instance container.
 End of changes. 7 change blocks. 
14 lines changed or deleted 8 lines changed or added

This html diff was produced by rfcdiff 1.47. The latest version is available from http://tools.ietf.org/tools/rfcdiff/