rfc9705v2.txt | rfc9705.txt | |||
---|---|---|---|---|
skipping to change at line 12 ¶ | skipping to change at line 12 ¶ | |||
Internet Engineering Task Force (IETF) C. Ramachandran | Internet Engineering Task Force (IETF) C. Ramachandran | |||
Request for Comments: 9705 Juniper Networks, Inc. | Request for Comments: 9705 Juniper Networks, Inc. | |||
Updates: 4090 T. Saad | Updates: 4090 T. Saad | |||
Category: Standards Track Cisco Systems, Inc. | Category: Standards Track Cisco Systems, Inc. | |||
ISSN: 2070-1721 I. Minei | ISSN: 2070-1721 I. Minei | |||
Google, Inc. | Google, Inc. | |||
D. Pacella | D. Pacella | |||
Verizon, Inc. | Verizon, Inc. | |||
January 2025 | January 2025 | |||
Refresh-Interval Independent RSVP-TE Fast Reroute Facility Protection | Refresh-Interval Independent RSVP Fast Reroute Facility Protection | |||
Abstract | Abstract | |||
The RSVP-TE Fast Reroute (FRR) extensions specified in RFC 4090 | The RSVP-TE Fast Reroute (FRR) extensions specified in RFC 4090 | |||
define two local repair techniques to reroute Label Switched Path | define two local repair techniques to reroute Label Switched Path | |||
(LSP) traffic over pre-established backup tunnels. Facility backup | (LSP) traffic over pre-established backup tunnels. Facility backup | |||
method allow one or more LSPs traversing a connected link or node to | method allows one or more LSPs traversing a connected link or node to | |||
be protected using a bypass tunnel. The many-to-one nature of local | be protected using a bypass tunnel. The many-to-one nature of local | |||
repair technique is attractive from a scalability point of view. | repair technique is attractive from a scalability point of view. | |||
This document enumerates facility backup procedures in RFC 4090 that | This document enumerates facility backup procedures in RFC 4090 that | |||
rely on refresh timeout, hence, making facility backup method | rely on refresh timeout, hence, making facility backup method | |||
refresh-interval dependent. The RSVP-TE extensions defined in this | refresh-interval dependent. The RSVP-TE extensions defined in this | |||
document will enhance the facility backup protection mechanism by | document will enhance the facility backup protection mechanism by | |||
making the corresponding procedures refresh-interval independent, and | making the corresponding procedures refresh-interval independent, and | |||
hence, compatible with the Refresh-Interval Independent RSVP (RI- | hence, compatible with the Refresh-Interval Independent RSVP (RI- | |||
RSVP) capability specified in RFC 8370. Hence, this document updates | RSVP) capability specified in RFC 8370. Hence, this document updates | |||
RFC 4090 in order to support the RI-RSVP capability specified in RFC | RFC 4090 in order to support the RI-RSVP capability specified in RFC | |||
skipping to change at line 1101 ¶ | skipping to change at line 1101 ¶ | |||
on node B for an LSP that has only requested link protection, that | on node B for an LSP that has only requested link protection, that | |||
is, B has not initiated the backup LSP signaling for the LSP. If | is, B has not initiated the backup LSP signaling for the LSP. If | |||
node B receives a normal PathTear at this time from ingress A | node B receives a normal PathTear at this time from ingress A | |||
because of a management event initiated on A, then B simply | because of a management event initiated on A, then B simply | |||
deletes the LSP state without sending a Remote PathTear to the LP- | deletes the LSP state without sending a Remote PathTear to the LP- | |||
MP C, so C may end up holding on to the stale state until the | MP C, so C may end up holding on to the stale state until the | |||
(long) refresh timeout. | (long) refresh timeout. | |||
5. Security Considerations | 5. Security Considerations | |||
The security considerations pertaining to the original RSVP protocols | The security considerations pertaining to the original RSVP protocol | |||
([RFC2205], [RFC3209], and [RFC5920]) remain relevant. When using | ([RFC2205], [RFC3209], and [RFC5920]) remain relevant. When using | |||
RSVP cryptographic authentication [RFC2747], more robust algorithms | RSVP cryptographic authentication [RFC2747], more robust algorithms | |||
such as HMAC-SHA256, HMAC-SHA384, or HMAC-SHA512 [RFC2104] | such as HMAC-SHA256, HMAC-SHA384, or HMAC-SHA512 [RFC2104] | |||
[FIPS-180-4] SHOULD be used when computing the keyed message digest | [FIPS-180-4] SHOULD be used when computing the keyed message digest | |||
where possible. | where possible. | |||
This document extends the applicability of Node-ID-based Hello | This document extends the applicability of Node-ID-based Hello | |||
sessions between immediate neighbors. The Node-ID-based Hello | sessions between immediate neighbors. The Node-ID-based Hello | |||
session between the PLR and the NP-MP may require the two routers to | session between the PLR and the NP-MP may require the two routers to | |||
exchange Hello messages with a non-immediate neighbor. Therefore, | exchange Hello messages with a non-immediate neighbor. Therefore, | |||
End of changes. 3 change blocks. | ||||
3 lines changed or deleted | 3 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |