Routing Area Working GroupInternet Engineering Task Force (IETF) S. Litkowski, Ed.Internet-DraftRequest for Comments: 7916 B. DecraeneIntended status:Category: Standards Track OrangeExpires: December 27, 2015ISSN: 2070-1721 C. Filsfils K. Raza Cisco Systems M. Horneffer Deutsche Telekom P. SarkarJuniper NetworksIndividual Contributor June25, 20152016 OperationalmanagementManagement ofLoop FreeLoop-Free Alternatesdraft-ietf-rtgwg-lfa-manageability-11AbstractLoop FreeLoop-Free Alternates(LFA),(LFAs), as defined in RFC5286 is5286, constitute an IP FastReRouteReroute (IP FRR) mechanism enabling traffic protection for IP traffic(and(and, by extension, MPLS LDPtraffic by extension).traffic). Followingfirstearly deployment experiences, this document provides operational feedback onLFA,LFAs, highlights some limitations, and proposes a set of refinements to address those limitations. It also proposes required management specifications. This proposal is also applicable toremote LFA solution. Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].remote-LFA solutions. Status of This Memo ThisInternet-Draftissubmitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documentsan Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF).Note that other groups may also distribute working documents as Internet-Drafts. The listIt represents the consensus ofcurrent Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents validthe IETF community. It has received public review and has been approved fora maximumpublication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 5741. Information about the current status ofsix monthsthis document, any errata, and how to provide feedback on it may beupdated, replaced, or obsoleted by other documentsobtained atany time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on December 27, 2015.http://www.rfc-editor.org/info/rfc7916. Copyright Notice Copyright (c)20152016 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 1.1. Requirements Language . . . . . . . . . . . . . . . . . . 3 2. Definitions . . . . . . . . . . . . . . . . . . . . . . . . . 3 3. OperationalissuesIssues withdefaultDefault LFAtie breakersTiebreakers . . . . . . . 4 3.1. Case 1: PErouter protecting failuresRouter Protecting against Failures withincore networkCore Network . . . . . . . . . . . . . . . . . . . . . . . . . 4 3.2. Case 2: PErouter choosenRouter Chosen toprotect core failuresProtect against Core Failures while ProuterRouter LFAexists . . .Exists . . . . . . . . . . . . . . . . 5 3.3. Case 3:suboptimalSuboptimal Prouter alternate choiceRouter Alternate Choice . . . . . . 6 3.4. Case 4:No-transitNo-Transit LFAcomputing nodeComputing Node . . . . . . . . . . 7 4. Need forcoverage monitoringCoverage Monitoring . . . . . . . . . . . . . . . . 8 5. Need for LFAactivation granularityActivation Granularity . . . . . . . . . . . . . 9 6. ConfigurationrequirementsRequirements . . . . . . . . . . . . . . . . . 9 6.1. LFAenabling/disabling scopeEnabling/Disabling Scope . . . . . . . . . . . . . . 10 6.2.Policy basedPolicy-Based LFAselectionSelection . . . . . . . . . . . . . . . 10 6.2.1. Connectedvs remote alternates . .versus Remote Alternates . . . . . . . . . 11 6.2.2. MandatorycriteriaCriteria . . . . . . . . . . . . . . . . . 12 6.2.3. AdditionalcriteriaCriteria . . . . . . . . . . . . . . . . . 12 6.2.4. Evaluation of Criteriaevaluation . .. . . . . . . . . . . . . . . 12 6.2.5. Retrievingalternate path attributesAlternate Path Attributes . . . . . . . . 16 6.2.6. ECMP LFAs . . . . . . . . . . . . . . . . . . . . . .2221 7. OperationalaspectsAspects . . . . . . . . . . . . . . . . . . . . .2322 7.1.No-transit conditionNo-Transit Condition on LFAcomputing nodeComputing Node . . . . . . .2322 7.2. ManualtriggeringTriggering of FRR . . . . . . . . . . . . . . . .2423 7.3. Requiredlocal informationLocal Information . . . . . . . . . . . . . . .2524 7.4. CoveragemonitoringMonitoring . . . . . . . . . . . . . . . . . . .2524 7.5.LFALFAs andnetwork planningNetwork Planning . . . . . . . . . . . . . . . .2625 8. Security Considerations . . . . . . . . . . . . . . . . . . .2625 9.IANA Considerations . .References . . . . . . . . . . . . . . . . . . .27 10. Contributors. . . . . . 26 9.1. Normative References . . . . . . . . . . . . . . . . . .27 11.26 9.2. Informative References . . . . . . . . . . . . . . . . .. . . . . . . .2711.1. Normative References . . . . . . . . .Contributors . . . . . . . . .27 11.2. Informative References. . . . . . . . . . . . . . . . . 28 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . .2928 1. Introduction Following the first deployments ofLoop FreeLoop-Free Alternates(LFA),(LFAs), this document provides feedback to the community about the management ofLFA.LFAs. o Section 3 provides realusesuse cases illustrating some limitations and suboptimal behavior. o Section 4 provides requirements for LFA simulations. o Section 5 proposes requirements for activation granularity andpolicy basedpolicy-based selection of the alternate. o Section 6expressexpresses requirements for the operational management ofLFA and especiallyLFAs and, in particular, a policy framework to manage alternates. o Section 7 details some operational considerations ofLFA like IS- ISLFAs, such as IS-IS overload bit managementorand troubleshootinginformations.information. 1.1. Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119]. 2. Definitions o Per-prefix LFA: LFA computation, andcomputation: Evaluation for the best alternateevaluationis done for each destination prefix, as opposed to"Per-next hop"the "per-next-hop" simplificationalsotechnique proposed in[RFC5286]Section3.8.3.8 of [RFC5286]. o PErouter :router: Provider Edge router. These routersare connectingconnect customers to each other. o Prouter :router: Provider router. These routers are corerouters,routers without customer connections. They provide transit between PEroutersrouters, and they form the core network. o Corenetwork :network: subset of the network composedbyof P routers and links between them. o Corelink :link: network link part of the corenetwork i.e.network, i.e., a link between Prouter to P router link.routers. o Link-protectingLFA :LFA: alternate providing protection against link failure. o Node-protectingLFA :LFA: alternate providing protection against node failure. o Connectedalternate :alternate: alternate adjacent (at the IGP level) to thepointPoint oflocal repair (i.e.Local Repair (PLR) (i.e., an IGP neighbor). o Remote alternate: alternate: alternate which isthat does not share an IGP adjacency with thepoint of local repair.PLR. 3. OperationalissuesIssues withdefaultDefault LFAtie breakersTiebreakers [RFC5286] introduces the notion oftie breakerstiebreakers when selecting the LFA among multiple candidate alternatenext-hops.next hops. When multipleLFALFAs exist,RFC 5286[RFC5286] has favored the selection of the LFAprovidingthat provides the best coverageofagainst the failure cases. While this is indeed a goal,thisit is one among multiple goals, and in somedeploymentdeployments thisleadleads to the selection of a suboptimal LFA. The following sectionsdetailsdetail real use casesofrelated to such limitations. Note that the use caseoffor LFA computation per destination (per-prefix LFA) is assumed throughout this analysis. We also assume in the network figures that all IP prefixes are advertised with zero cost. 3.1. Case 1: PErouter protecting failuresRouter Protecting against Failures withincore networkCore Network P1 --------- P2 ---------- P3 --------- P4 | 1 100 1 | | | | 100 | 100 | | | 1 100 1 | 1 5k P5 --------- P6 ---------- P7 --------- P8 --- P9 -- PE1 | | | | | | 5k| |5k 5k| |5k | 5k | 5k | | | | | | | +-- PE4 --+ | +---- PE2 ----+ | | | +---- PE5 ----+ | 5k | PE3Figure 1Px routers are P routers usingn*10Gn * 10 Gbps links. PEs are connected using links with lower bandwidth. Figure 1 InfigureFigure 1, let us consider the traffic flowing from PE1 to PE4. The nominal path is P9-P8-P7-P6-PE4. Let us now consider the failure of link P7-P8. As the P4 primary path to PE4 is P8-P7-P6-PE4, P4 is not an LFA for P8 (because P4 will loopbacktraffic back toP8)P8), and the only available LFA is PE2. When the core link P8-P7 fails, P8 switches all traffic destined to PE4/PE5 towards the node PE2.HenceHence, a PE node and PE links are used to protect against the failure of a core link. Typically, PE links have less capacity than corelinkslinks, and congestion may occur on PE2 links. Note that although PE2wasis not directly affected by the failure, its links becomecongestedcongested, and its traffic will suffer from the congestion. In summary, in the case of P8-P7 link failure, the impact on customer traffic is: o FromPE2PE2's point ofview :view: * without LFA: noimpactimpact. * with LFA: traffic is partially dropped (but possibly prioritized by a QoS mechanism). It must be highlighted that in such a situation, traffic not affected by the failure may be affected by the congestion. o FromP8P8's point of view: * without LFA: traffic is totally dropped until convergence occurs. * with LFA: traffic is partially dropped (but possibly prioritized by a QoS mechanism). Besides the congestion aspects of usingan Edgea PE router as an alternate to protect against a core failure, a service provider may consider thisasto be a bad routing design and wouldlikewant to prevent it. 3.2. Case 2: PErouter choosenRouter Chosen toprotect core failuresProtect against Core Failures while ProuterRouter LFAexistsExists P1 --------- P2 ------------ P3--------------- P4 | 1 100 | 1 | | | | | 100 | 30 | 30 | | | | 1 50 50 | 10 | 1 5k P5 --------- P6 --- P10 ---- P7--------------- P8 --- P9 -- PE1 | | | | \ | 5k| |5k 5k| |5k \ 5k | 5k | | | | \ | | +-- PE4 --+ | +---- PE2 ----+ | | | +---- PE5 ----+ | 5k | PE3Figure 2Px routers are P routers meshed withn*10Gn * 10 Gbps links. PEs are meshed using links with lower bandwidth. Figure 2 Inthe figureFigure 2, let us consider the traffic coming from PE1 to PE4.NominalThe nominal path is P9-P8-P7-P10-P6-PE4. Let us now consider the failure of the link P7-P8. For P8, P4 is a link-protecting LFA and PE2 is a node-protecting LFA. PE2 is chosen as the bestLFALFA, due toitsthe better type of protectiontype.that it provides. Justlikeas in case 1, this may lead to congestion on PE2 links upon LFA activation. 3.3. Case 3:suboptimalSuboptimal Prouter alternate choiceRouter Alternate Choice +--- PE3--+---+ / \ 1000 / \ 1000 / \ +----- P1 ---------------- P2 ----+ | | 500 | | | 10 | | | 10 | | | | R5 | 10 | 10 R7 | | | | | 10 | | | 10 | | 500 | | +---- P3--------------------------------- P4-----+----+ \ / 1000 \ / 1000 \ / +--- PE1 ---+Figure 3Px routers are P routers. P1-P2 and P3-P4 links are1G1 Gbps links. Allothers inter Pxother inter-Px links are10G10 Gbps links. Figure 3 Inthe figure above,Figure 3, let us consider the failure of link P1-P3. For destination PE3, P3 has two possible alternates: o P4, which is node-protecting o R5, which is link-protecting P4 is chosen as the bestLFALFA, due toitsthe better type of protectiontype.that it provides. However, for bandwidth capacity reasons, it may not be desirable to useP4 for bandwidth capacity reason.P4. A service provider may prefer to usehigh bandwidthhigh-bandwidth links aspreferedthe preferred LFA. In this example,preferingpreferring the shortest path overprotectionthe type of protection may achieve the expected behavior, but in cases wheremetric aremetrics do notreflectingreflect the bandwidth,itthis technique would not work and some other criteria would need to be involved when selecting the best LFA. 3.4. Case 4:No-transitNo-Transit LFAcomputing nodeComputing Node P1 P2 | \ / | 50 | 50 \/ 50 | 50 | /\ | PE1-+ +-- PE2 \ / 45 \ / 45 -PE3- (No-transit condition set) Figure 4 The IS-IS and OSPF protocols define some way to prevent a routerto befrom being usedasfor transit. The IS-IS overload bit is defined in[ISO10589][ISO10589], and the OSPF R-bit is defined in [RFC5340]. Also, the OSPFStub Routerstub router isalsodefined in [RFC6987] as a method to prevent transit on a node by advertising MaxLinkMetric on allnon stubnon-stub links. Inthe figure above,Figure 4, PE3 has its no-transit condition set (permanently, for designreason)reasons) and wants to protect traffic using an LFA for destination PE2. On PE3, the loop-free condition is notsatisfied :satisfied: 100 !< 45 + 45. PE1 is thus not considered as an LFA.HoweverHowever, thanks to theno- transitno-transit condition on PE3, we know that PE1 will not loop the traffic back to PE3.SoSo, PE1 is an LFA to reach PE2. In the case of a no-transit condition set on a node, LFA behavior must be clarified. 4. Need forcoverage monitoringCoverage Monitoring As per [RFC6571], LFA coveragehighlydepends strongly on theusednetworktopology.topology that is in use. Even ifremote LFA ([RFC7490]) extendsthe remote-LFA mechanism [RFC7490] significantly extends the coverage of the basic LFA specification, thereisare still some cases where protection would not be available. As network topologies are constantly evolving (network extension,capacity addings,additional capacity, latencyoptimizationoptimization, etc.), the protection coverage may change. FastrerouteReroute (FRR) functionality may be critical for some services supported by thenetwork,network; a service provider mustconstantlyalways know what type of protection coverage is currently available on the network. Moreover, predictingtheprotection coverage incasethe event of network topologychangechanges is mandatory.TodayToday, network simulationtooltools associated withwhatif"what if" scenariosfunctionalityare often used by service providers for the overall network design (capacity, pathoptimizationoptimization, etc.).Section 7.5, Section 7.4Sections 7.3, 7.4, andSection 7.37.5 of this document proposeto addthe addition of LFAinformationsinformation into suchtooltools and within routers, so that a service provider may be able:to: otoevaluate protection coverage after a topology change. otoadjust the topology change to cover the primary need(e.g.(e.g., latencyoptimization oroptimization, bandwidth increase) as well as LFA protection. oto monitorconstantly monitor the LFA coverage in the live network andbeing alerted.receive alerts. Documentation of LFA selection algorithms by implementers (default and tuning options) is important in order toleave possibilitymake it possible for3rd partythird-party modules to model thesepolicy-LFA expressions.policy-based LFA selection algorithms. 5. Need for LFAactivation granularityActivation Granularity As in all FRRmechanism,mechanisms, an LFA installs backup paths in the Forwarding Information Base (FIB). Depending on the hardware used by a service provider, FIBresourceresources may be critical. ActivatingLFA,LFAs bydefault,default on all available components (IGP topologies,interface,interfaces, addressfamiliesfamilies, etc.) may lead to a waste of FIBresourceresources, as generallyin a networkonly a few destinations in a network should be protected(e.g.(e.g., loopback addresses supporting MPLS services) compared to the number of destinations in theRIB. MoreoverRouting Information Base (RIB). Moreover, a service provider may implement multiple different FRRmechanismmechanisms in its networks for differentusages (MRT,applications (e.g., Maximally Redundant Trees (MRTs), TE FRR). In this scenario, an implementation MAY allowto computethe computation of alternates for a specific destination even if the destination is already protected by another mechanism. This willbringprovide redundancy andlet the ability forpermit the operator to select the best option forFRRFRR, using a policy language. Section 6of this document proposeprovides some implementation guidelines. 6. ConfigurationrequirementsRequirements Controlling the selection of the best alternate and the granularity of LFA activationgranularityis a requirement forService Providers.service providers. This section defines configuration requirements forLFA.LFAs. 6.1. LFAenabling/disabling scopeEnabling/Disabling Scope The granularity of LFA activation SHOULD be controlled (as alternate nexthophops consume memory in the forwarding plane). An implementation of an LFA SHOULD allow itsactivationactivation, with the following granularities: o Per routing context:VRF,Virtual Routing and Forwarding (VRF), virtual/logical router, global routing table, etc. o Perinterfaceinterface. o Per protocol instance, topology,areaarea. o Perprefixes: prefixprefix: Prefix protection SHOULD have a higher priority compared to interface protection. This means that if a specific prefix must be protected due to a configuration request, an LFA MUST be computed and installed forthisthat prefix even if the primary outgoing interface is not configured for protection. An implementation of an LFA MAY allow itsactivationactivation, with the following criteria: o Peraddress-family: ipv4address family: IPv4 unicast,ipv6 unicastIPv6 unicast. o Per MPLS control plane:forFor MPLS control planes that inherit routingdecisiondecisions from the IGP routing protocol, the MPLSdataplanedata plane may be protected by an LFA. The implementation may allow an operator to control this inheritance of protection from the IP prefix to the MPLS label bound to this prefix. Theprotectioninheritance of protection will concern: IP to MPLS, MPLS to MPLS,IP-to-MPLS, MPLS-to-MPLS, andMPLS to IPMPLS-to-IP entries. As an example, LDP andsegment-routingSegment Routing extensions [SEG-RTG-ARCH] forISISIS-IS and OSPF arecontrol planecontrol-plane eligibletofor this inheritance of protection. 6.2.Policy basedPolicy-Based LFAselectionSelection When multiple alternates exist, the LFA selection algorithm is based ontie breakers.tiebreakers. Currenttie breakerstiebreakers do not provide sufficient controlonregarding how the best alternate is chosen. This document proposes an enhancedtie breakertiebreaker allowing service providers to manage all specific cases: 1. Animplementation ofLFA implementation SHOULD support policy-baseddecisiondecisions for determining the best LFA. 2.Policy based decisionPolicy-based decisions SHOULD be based on multiplecriterions,criteria, with eachcriteriacriterion having a level of preference. 3. If the defined policy does not allow the determination of a unique best LFA, an implementation SHOULD pick only one based on its own decision.AnFor load-balancing purposes, an implementation SHOULD also support the election of multipleLFAs, for loadbalancing purposes.LFAs. 4.PolicyThe policy SHOULD be applicable to a protected interface ortoa specific set of destinations. In the case ofapplication onapplicability to the protected interface, all destinations primarily routed onthisthat interface SHOULD use theinterface policy.policy for that interface. 5.It is an implementationThe choiceto reevaluate policy dynamicallyof whether or not to dynamically re-evaluate policy (incasethe event of a policychange).change) is left to the implementation. If a dynamic approach is chosen, the implementation SHOULD recompute the best LFAs and reinstall them inFIB,the FIB without service disruption. If anon- dynamicnon-dynamic approach is chosen, the policy would be taken into account upon the next IGP event. In this case, the implementation SHOULD support a command to manually force the recomputation/reinstallation of LFAs. 6.2.1. Connectedvs remote alternatesversus Remote Alternates In addition to connected LFAs, tunnels(e.g.(e.g., IP, LDP,RSVP-TE orRSVP-TE, Segment Routing) to distant routers may be used to complement LFA coverage (tunnel tail used as virtual neighbor). When a router has multiple alternate candidates for a specific destination, it may have connected alternates and remote alternates (reachable via a tunnel). Connected alternates may not always provide an optimal routingpathpath, and it may be preferable to select a remote alternate over a connected alternate. Someusageuses of tunnels to extend LFA([RFC5286])[RFC5286] coverageisare described ineither[RFC7490]or [I-D.francois-segment-routing-ti-lfa]. These documentsand [TI-LFA]. [RFC7490] and [TI-LFA] present some use casesoffor LDP tunnels([RFC7490]) orand Segment Routingtunnels ([I-D.francois-segment-routing-ti-lfa]).tunnels, respectively. This document considers any type of tunneling techniques to reach remote alternates (IP,GRE,Generic Routing Encapsulation (GRE), LDP, RSVP-TE,L2TP,the Layer 2 Tunneling Protocol (L2TP), SegmentRoutingRouting, etc.) and does not restrict the remote alternates to theusageuses presented inthe referenced document.these other documents. InfigureFigure 1, there is no P router alternate for P8 to reach PE4 orPE5 ,PE5, so P8 is using PE2 asalternate, whichan alternate; this may generate congestion when FRR is activated. Instead, we could have a remote alternate for P8 to protect traffic to PE4 and PE5. For example, a tunnel from P8 to P3 (following the shortest path) can besetupset up, and P8 would be able to use P3 as a remote alternate to protect traffic to PE4 and PE5. In this scenario, traffic will not use a PE link during FRR activation. When selecting the best alternate, the selection algorithm MUST consider all available alternates (connected or tunnel). Forexampleexample, withRemote LFA,remote LFAs, computation of PQset ([RFC7490])sets [RFC7490] SHOULD be performed before the selection of the bestalternate selection.alternate. 6.2.2. MandatorycriteriaCriteria Animplementation ofLFA implementation MUST support the following criteria: oNon candidateNon-candidate link: A link marked as"non candidate""non-candidate" will never be used as an LFA. o A primary next hop being protected by another primary next hop of the same prefix (ECMP case). o Type of protection provided by the alternate: linkprotection,protection or node protection. In the case of preference for nodeprotection preference,protection, an implementation SHOULD supportfall backfallback to link protection if node protection is not available. o Shortest path: lowest IGP metric used to reach the destination. oSRLGShared Risk Link Groups (SRLGs) (as defined in[RFC5286]Section3,3 of [RFC5286]; see also Section 6.2.4.1 for more details). 6.2.3. AdditionalcriteriaCriteria Animplementation ofLFA implementation SHOULD support the following criteria: oDownstreamness of an alternate : preference ofA downstream alternate: Preference for a downstream path over anon downstreamnon-downstream path SHOULD be configurable. o Link coloring with: include, exclude"include", "exclude", andpreference based systempreference-based systems (see Section 6.2.4.2). o LinkBandwidthbandwidth (see Section 6.2.4.3). o Alternatepreference/Nodepreference / node coloring (see Section 6.2.4.4). 6.2.4. Evaluation of Criteriaevaluation6.2.4.1.SRLG [RFC5286]SRLGs Section3.3 of [RFC5286] proposestothe reuse of GMPLS IGP extensions to encodeShared Risk Link Groups ([RFC4205] and [RFC4203]). The section isSRLGs [RFC5307] [RFC4203]. Section 3 of [RFC5286] alsodescribingdescribes the algorithm to compute SRLG protection. When SRLG protection is computed, an implementation SHOULD allow thefollowing :following: o Exclusion of alternatesviolating SRLG.in violation of SRLGs. o Maintenance of a preference system between alternates based on SRLG violations. How the preference system is implemented is out of scopeoffor thisdocumentdocument, but here arefew examples :two examples: * Preference based on the number of violations. In thiscase : thecase, more violations =theless preferred. * Preference based on violation cost. In this case, each SRLG violation has an associated cost. The lower violationcost sum iscosts are preferred. When applying SRLG criteria, the SRLG violation check SHOULD be performed onsourcesources toalternatealternates as well asalternatealternates to destinationpathspaths, based on the SRLG set of the primary path. In the case of remoteLFA, PQ to destinationLFAs, PQ-to-destination path attributes would be retrieved fromSPTthe Shortest Path Tree (SPT) rooted at the PQ. 6.2.4.2. LinkcoloringColoring Link coloring is a powerful system to control the choice of alternates. Link colors are markers that will allowto encodethe encoding of properties of a particular link. Protecting interfaces are tagged with colors. Protected interfaces are configured to include some colors with a preferencelevel,level and exclude others. Link color information SHOULD besignalledsignaled in theIGPIGP, andadmin- groupsadministrative-group IGP extensions([RFC5305] and [RFC3630])[RFC5305] [RFC3630] that are already standardized,implementedimplemented, andwidely-used,widely used SHOULD be used for encoding andsignallingsignaling link colors. PE2 | +---- P4 | / PE1 ---- P1 --------- P2 |10Gb 1Gb10 Gbps 1 Gbps | | P3 Figure8 Example :5 In the example in Figure 5, the P1 router is connected to three P routers and two PEs. P1 is configured to protect the P1-P4 link. We assumethatthat, given the topology, all neighbors are candidateLFA.LFAs. We would like to enforce a policy in the network where only a core router may protect against the failure of a corelink,link and wherehigh capacityhigh-capacity links areprefered.preferred. In this example, we can use the proposed link coloring by: o MarkingPEsthe PE links with the colorREDRED. o Marking10Gb COREthe 10 Gbps core link with the colorBLUEBLUE. o Marking1Gb COREthe 1 Gbps core link with the colorYELLOWYELLOW. oConfiguredConfiguring the protected interface P1->P4with :as follows: * Include BLUE, preference200200. * Include YELLOW, preference100100. * ExcludeREDRED. Using this, PE links will never be used to protect against P1-P4 linkfailurefailure, and10Gbthe 10 Gbps link will bebepreferred. The main advantage of this solution is that it can easily be duplicated on other interfaces and other nodes without change. AService Providerservice provider has only to define the color system (associate a color with a level of significance), as it is done already for TE affinities or BGP communities. An implementation of link coloring: o SHOULD support multipleinclude"include" andexclude"exclude" colors on a single protected interface. o SHOULD provide a level of preference between included colors. o SHOULD support the configuration of multiple colorsconfigurationon a single protecting interface. 6.2.4.3. Bandwidth As mentioned in previous sections, not taking into account the bandwidth of an alternate could lead to congestion during FRR activation. We proposeto basethat the bandwidth criteria be based on the link speedinformationinformation, for the followingreason :reasons: oifIf a router S has a set of X destinationsprimarlyprimarily forwarded to N, usingper prefix LFAper-prefix LFAs may lead tohavehaving a subset of X protected by a neighbor N1, another subset by N2, another subset byNxNx, etc. o S is not awareaboutof traffic flows to eachdestination anddestination, so in the case of FRR activation, S is not able to evaluate how much traffic will be sent toN1,N2,N1, N2, Nx, etc.Nx in case of FRR activation.Based on this, it is not useful to gather available bandwidth on alternate paths, as the router does not know how much bandwidth it requires for protection. The proposed link speed approach provides a good approximationwith a small costat low cost, as information is easily available. The bandwidth criteria of the policy framework SHOULD work in at least the following twoways :ways: oPRUNE : exclude aPrune: Exclude an LFA if the link speed to reach it is lower than the link speed of the primarynext hopnext-hop interface. oPREFER : prefer aPrefer: Prefer an LFA based on its bandwidth to reach it compared to the link speed of the primarynext hopnext-hop interface. 6.2.4.4. Alternatepreference/Node coloringPreference / Node Coloring Rather than tagginginterfaceinterfaces on each node (using linkcolor)colors) to identify the types of alternatenode typenodes (as an example), it would be helpful if routers could be identified in the IGP. This would allowagrouped processing on multiple nodes. As an implementationneedneeds to exclude some specific alternates (see Section 6.2.3), an implementation: oSHOULD be abletoto: o giveapreference to a specific alternate. oSHOULD be able togiveapreference to a group ofalternate.alternates. oSHOULD be able toexclude a specific alternate. oSHOULD be able toexclude a group ofalternate.alternates. A specific alternate may be identified by its interface, IPaddressaddress, or routerIDID, and a group of alternates may be identified by a marker (tag) advertised in IGP. The IGP encoding andsignallingsignaling for markinggroupgroups of alternates SHOULD be doneusing [I-D.ietf-isis-node-admin-tag], [I-D.ietf-ospf-node-admin-tag].according to [RFC7917] and [RFC7777]. Using a tag/marker is referred to asNode coloring in comparison"node coloring", as compared to the link coloring option presented in Section 6.2.4.2. Consider the following network: PE3 | | PE2 | +---- P4 | / PE1 ---- P1 -------- P2 |10Gb 1Gb10 Gbps 1 Gbps | | P3 Figure96 In the example above, each node is configured with a specific tag flooded through the IGP. o PE1,PE3: 200(non candidate).(non-candidate). o PE2: 100 (edge/core). o P1,P2,P3: 50 (core). A simple policy could be configured on P1 to choose the best alternate for P1->P4 based onrouter function/rolethe function or role of the router, asfollows :follows: ocriteriacriterion 1 -> alternate preference: excludetagtags 100 and 200. ocriteriacriterion 2 -> bandwidth. 6.2.5. Retrievingalternate path attributesAlternate Path Attributes 6.2.5.1. AlternatepathPath The alternate path is composed of two distinctparts :parts: PLR to alternate and alternate to destination. N1 -- R1 ---- R2 /50 \ \ / R3 --- R4 / \ S -------- E ------- D \\ // \\ // N2 ---- PQ ---- R5 Figure57 Inthe figure above,Figure 7, we consider a primary path from S to D, with S using E as the primarynexthop.next hop. All metrics are11, except{S,N1}=50.that {S,N1} = 50. Two alternate paths are available: o{S,N1,R1,R2|R3,R4,D}{S,N1,R1,R2|R3,R4,D}, where N1 is a connected alternate. This consists of two sub-paths: * {S,N1}: path from the PLR to the alternate. * {N1,R1,R2|R3,R4,D}: path from the alternate to the destination. o{S,N2,PQ,R5,D}{S,N2,PQ,R5,D}, where the PQ is a remote alternate.AgainAgain, the path consists of two sub-paths: * {S,N2,PQ}: path from the PLR to the alternate. * {PQ,R5,D}: path from the alternate to the destination. As displayed inthe figure,Figure 7, somepartparts of the alternate path mayfanout in multipathfan out to multiple paths due to ECMP. 6.2.5.2. Alternatepath attributesPath Attributes Somecriterionscriteria listed in the previous sectionsare requiring to retrieverequire the retrieval of somecharacteristiccharacteristics of the alternate path (SRLG, bandwidth, color,tagtag, etc.). We call these characteristics "path attributes". A path attribute can record a list of node properties(e.g.(e.g., node tag) or link properties(e.g.(e.g., link color). This document defines two types of path attributes: o Cumulative attribute:whenWhen a path attribute is cumulative, the implementation SHOULD record the value of the attribute on each element (link and node) along the alternate path. SRLG, link color, and node color are cumulative attributes. o Unitary attribute:whenWhen a path attribute is unitary, the implementation SHOULD record the value of the attribute only on the first element along the alternate path (first node, or first link). Bandwidth is a unitary attribute. N1 -- R1 ---- R2 / \ / 50 R4 / \ S -------- E ------- D Figure 8 Inthe figure above,Figure 8, N1 is a connected alternate toeachreach D from S. We consider that all links have a RED color except{R1,R2}{R1,R2}, which is BLUE. We consider all links to be10Gbps,10 Gbps except{N1,R1}{N1,R1}, which is2.5Gbps.2.5 Gbps. The bandwidth attribute collected for the alternate path will be10Gbps.10 Gbps. As the attribute is unitary, only the link speed of the first link {S,N1} is recorded. The link color attribute collected for the alternate path will be {RED,RED,BLUE,RED,RED}. As the attribute is cumulative, the value of the attribute on each link along the path is recorded. 6.2.5.3. ConnectedalternateAlternate For an alternate path using a connected alternate: oattributesAttributes from the PLR to the alternate are retrieved from the interface connected to the alternate.In caseIf the alternate is connected through multiple interfaces, the evaluation of attributes SHOULD be done once per interface (each interface is considered as a separate alternate) and once per ECMP group of interfaces (Layer 3 bundle). opathPath attributes from the alternate to the destination are retrieved fromSPFthe SPT rooted at the alternate. As the alternate is a connected alternate, theSPFSPT has already been computed to find the alternate, so there is no needoffor additional computation. N1 -- R1 ---- R2 50//50 \ // \ i1//i2 \ S -------- E -------- D Figure69 Inthe figure above,Figure 9, we consider a primary path from S to D, with S using E as the primarynexthop.next hop. All metrics are considered as 1expectexcept {S,N1}linkslinks, which are using a metric of 50. We consider the followingSRLG groupsSRLGs on links: o {S,N1} usingi1 : SRLG1,SRLG10i1: SRLG1,SRLG10. o {S,N1} usingi2 : SRLG2,SRLG20i2: SRLG2,SRLG20. o {N1,R1}: SRLG3. o {R1,R2}: SRLG4. o{N1,R1} : SRLG3 o {R1,R2} : SRLG4 o {R2,D} : SRLG5 o {S,E} : SRLG10 o {E,D} : SRLG6{R2,D}: SRLG5. o {S,E}: SRLG10. o {E,D}: SRLG6. S is connected to the alternate using twointerfacesinterfaces: i1 and i2. If i1 and i2 are not part of an ECMP group, the evaluation of attributes is done once per interface, and each interface is considered as a separate alternate path. Two alternate paths will be available with the associated SRLGattributes :attributes: o Alternate path#1 :#1: {S,N1 using if1,R1,R2,D}: SRLG1,SRLG10,SRLG3,SRLG4,SRLG5. o Alternate path#2 :#2: {S,N1 using if2,R1,R2,D}: SRLG2,SRLG20,SRLG3,SRLG4,SRLG5. Alternate path #1 is sharing risks with the primary path and may bedepreferredpruned, orpruned by user definedits preference may be revoked, per user-defined policy. If i1 and i2 are part of an ECMP group, the evaluation of attributes is done once per ECMP group, and the implementation considers a single alternate path {S,N1 using if1|if2,R1,R2,D} with the following SRLG attributes: SRLG1,SRLG10,SRLG2,SRLG20,SRLG3,SRLG4,SRLG5.AlternateThe alternate path is sharing risks with the primary path and may bedepreferredpruned, orpruned by user definedits preference may be revoked, per user-defined policy. 6.2.5.4. RemotealternateAlternate For alternate path using a remote alternate(tunnel) :(tunnel): o Attributes on the path from the PLR to the alternate are retrieved using the PLR's primarySPFSPT (when using aPQ-nodePQ node fromP-Space)the P-space) or the immediate neighbor'sSPFSPT (when using a PQ from the extendedP-Space).P-space). These are then combined with the attributes of the link(s) to reach the immediate neighbor. In both cases, no additionalSPFSPT is required. o Attributes from the remote alternate to the destination path may be retrieved fromSPFthe SPT rooted at the remote alternate. An additional forwardSPFSPT is required for each remote alternate(PQ-node)(PQ node), as indicated in[I-D.ietf-rtgwg-rlfa-node-protection] section 3.2 .Section 2.3.2 of [REMOTE-LFA-NODE]. In someremote alternateremote-alternate scenarios, like[I-D.francois-segment- routing-ti-lfa], alternate to[TI-LFA], alternate-to- destination path attributes may be obtained using a different technique. The number of remote alternates may be very high..In the case of remoteLFA,LFAs, simulations of real-world network topologies have shown thatorder of hundrethsas many as hundreds ofPQ may bePQs are possible. The computational overheadto collectof collecting all path attributes of allPQsuch PQs to destination pathsmaycould grow beyondpractical reason.reasonable levels. To handle this situation, implementations need to limit the number of remote alternates to be evaluated to a finite number before collecting alternate path attributes and running the policy evaluation.[I-D.ietf-rtgwg-rlfa-node-protection]Section 2.3.3 of [REMOTE-LFA-NODE] provides a way to reduce the number ofPQPQs to be evaluated. Some other remote alternate techniques using static or dynamic tunnels may not require this pruning. Link Remote Remote alternate alternate alternate ------------- ------------------ ------------- Alternates | LFA | | rLFA (PQs) | | Static/ | | | | | | Dynamic | sources | | | | | tunnels | ------------- ------------------ ------------- | | | | | | | -------------------------- | | | Prune some alternates | | | | (sorting strategy) | | | -------------------------- | | | | | | | ------------------------------------------------ | Collect alternate attributes | ------------------------------------------------ | | ------------------------- | Evaluate policy | ------------------------- | | Best alternates Figure 10 6.2.5.5. CollectingattributesAttributes incasethe Case ofmultipathMultiple Paths As described in Section 6.2.5, there may be somesituationsituations where an alternate path or part of an alternate path fans out to multiple paths(e.g.(e.g., ECMP). When collecting path attributes in such a case, an implementation SHOULD consider the union of attributes of eachsub- path.sub-path. Inthe figure 5Figure 7 (in Section6.2.5),6.2.5.1), S has twoalternatesalternate paths to reach D. Each alternate path fans outinto multipathto multiple paths due to ECMP.ConsideringConsider the following link colorattributes :attributes: all links are RED except{R1,R3}{R1,R3}, which is BLUE. The user wants to use an alternate path with only RED links. The first alternate path {S,N1,R1,R2|R3,R4,D} does not fit the constraint, as {R1,R3} is BLUE. The second alternate path {S,N2,PQ,R5,D} fits the constraint and will bepreferredpreferred, as it uses only RED links. 6.2.6. ECMP LFAs 10 PE2 - PE3 | | 50 | 5 | 50 P1----P2 \\ // 50 \\ // 50 PE1Figure 7Links between P1 and PE1 are L1 andL2, linksL2. Links between P2 and PE1 are L3 andL4L4. Figure 11 In Figure 11, thefigure above,primary path from PE1 to PE2 is throughP1P1, using ECMP on two parallel links -- L1 and L2. In the case of standard ECMP behavior, if L1 is failing,postconvergencethe post-convergence next hop would become L2 andthereECMP wouldbeno longerECMP.be in use. If an LFA is activated, as stated in[RFC5286]Section3.4.,3.4 of [RFC5286], "alternate next-hops may themselves also be primary next-hops, but need not be" and "alternate next-hops should maximize the coverage of the failurecases".cases." In thisscenarioscenario, there is no alternate providing node protection,LFA willso PE1 will prefer L2 as the alternate to protectL1 whichL1; this makes sense compared topostconvergencepost-convergence behavior.ConsideringConsider a differentscenario using figure 7,scenario, again referring to Figure 11, where L1 and L2 are configured as alayerLayer 3 bundle using a localfeature, as well as L3/ L4 beingfeature and L3/L4 comprise a secondlayerLayer 3 bundle. Layer 3 bundles are configured as if a link in the bundle isfailing,failing; the traffic must be rerouted out of the bundle. Layer 3 bundles are generally introduced to increase bandwidth between nodes. In a nominal situation, ECMP is still available from PE1 to PE2, but if L1 is failing,postconvergencethe post-convergence next hop would become the ECMP on L3 and L4. In this case, LFA behavior SHOULD be adapted in order to reflect the bandwidth requirement. We would expect the following FIB entry onPE1 :PE1: OnPE1 :PE1: PE2 +--> ECMP -> L1 | | | +----> L2 | +-->LFA(ECMP)LFA (ECMP) -> L3 |+--------->+----------> L4 Figure 12 If L1 or L2 is failing, traffic must be switched on the LFA ECMP bundle rather than using the other primary next hop. As mentioned in[RFC5286]Section3.4.,3.4 of [RFC5286], protecting a link within an ECMP by another primary next hop is not a MUST. Moreover,weas alreadypresenteddiscussed in this document,thatmaximizingthecoverageofagainst the failurecasecases may not be the rightapproachapproach, andpolicy baseda policy-based choice of an alternate may be preferred. An implementation SHOULD allowto prefersetting a preference to protect a primary next hopbywith another primary next hop. An implementation SHOULD also allowto prefersetting a preference to protect a primary next hopbywith aNON primaryNON-primary next hop. An implementation SHOULD allowtothe use of an ECMP bundle asaan LFA. 7. OperationalaspectsAspects 7.1.No-transit conditionNo-Transit Condition on LFAcomputing nodeComputing Node In[RFC5286],Section3.5,3.5 of [RFC5286], the setting of the no-transit condition (through the IS-IS overload bit or the OSPF R-bit) in an LFA computation is only taken into account for the case where a neighbor has the no-transit condition set. In addition toRFC 5286 inequalityInequality 1Loop-Free Criterion(Loop-Free Criterion) (Distance_opt(N, D) < Distance_opt(N, S) + Distance_opt(S,D)),D)) [RFC5286], the IS-IS overload bit or the OSPF R-bit of the LFA calculating neighbor (S) SHOULD be taken into account. Indeed, if it has the IS-IS overload bit set or the OSPF R-bit clear, no neighbor will loopback totraffic back to itself. An OSPF router acting as a stub router[RFC 6987][RFC6987] SHOULD behave as if the R-bit was clear regarding the LFA computation. 7.2. ManualtriggeringTriggering of FRR Service providers often perform manual link shutdown (usingrouter CLI)a router's command-line interface (CLI)) to performsomenetwork changes/tests. A manual link shutdown may be done at multiplelevel :levels: physical interface, logical interface, IGP interface,BFD sessionBidirectional Forwarding Detection (BFD) session, etc.EspeciallyIn particular, testing or troubleshooting FRR requiresto perform thethat manual shutdown be performed on the remote end of thelinklink, asgenerallya local shutdown would not generally trigger FRR. Toenhancepermit such a situation, an implementation SHOULD support triggering/activating LFAFast RerouteFRR for a given link when a manual shutdown is done on a component that currently supports FRR activation. An implementation MAY also support FRR activation for a specific interface or a specific prefix on a primary next-hop interface and revert without any action on any running component of the node (links or protocols). In this use case, the FRR activation timeneedneeds to be controlled by a timer in case the operator forgot to revert the trafficonto the primary path. When the timer expires, the traffic is automatically reverted to the primary path. This willmake easier testssimplify the testing offast-reroute path andthe FRR path; traffic can thenrevertbe reverted back to the primary path without causing a global network convergence. Forexample :example: oifIf an implementation supports FRR activation upon a BFDsession downsession-down event,thisthat implementation SHOULD support FRR activation when a manual shutdown is done on the BFD session. But if an implementation does not support FRR activationonupon a BFDsession down,session-down event, there is no need forthisthat implementation to support FRR activationonupon manual shutdown of a BFD session. oifIf an implementation supports FRR activationonupon a physicallink downlink-down event(e.g.(e.g., Rx laserOff"off" detection,orerror thresholdraised etc.), thisraised), that implementation SHOULD support FRR activation when a manual shutdownatof a physical interface is done. But if an implementation does not support FRR activationonupon a physicallink downlink-down event, there is no need forthisthat implementation to support FRR activationonupon manual shutdown of a physicallink shutdown.link. o A CLI command may allowto switchswitching from the primary path to the FRR pathfor testingto test the FRR path for aspecific.specific interface or prefix. There is no impact oncontrolplane,the control plane; onlydataplanethe data plane of the local nodecouldmay be changed. A similar command may allowto switch backswitching traffic back from the FRR path to the primary path. 7.3. Requiredlocal information LFALocal Information The introduction of LFAs in a network requires someenhancement inenhancements to standard routing information provided by implementations. Moreover, due tothe non 100%"non-100%" coverage, coverageinformationsinformation is also required.HenceHence, animplementation :implementation: o MUST be able to display, for every prefix, the primary next hop as well as the alternatenext hopnext-hop information. o MUST provide coverage information per LFA activation domainof LFA(area, level, topology, instance, virtual router, addressfamilyfamily, etc.). o MUST provide the number of protected prefixes as well asnon protectednon-protected prefixes globally. o SHOULD provide the number of protected prefixes as well asnon protectednon-protected prefixes per link. o MAY provide the number of protected prefixes as well asnon protectednon-protected prefixes per priority if the implementation supports prefix-priority insertion in the RIB/FIB. o SHOULD provide a reason for choosing an alternate (policy and criteria) and for excluding an alternate. o SHOULD provide the list ofnon protectednon-protected prefixes and the reason why they are not protected(no(e.g., no protectionrequired orrequired, no alternate available). 7.4. CoveragemonitoringMonitoring It is pretty easy to evaluate the coverage of a network in a nominal situation, but topology changes may change the level of coverage. In some situations, the network may no longer be able to provide the required level of protection. Hence, it becomes very important for service providers toget alerted aboutreceive alerts regarding changesofin coverage. An implementationSHOULD :SHOULD: o provide an alert system if total coverage (for a node) is below a defined threshold orcomes backwhen coverage returns toa normal situation.normal. o provide an alert system if coverageoffor a specific link is below a defined threshold orcomes backwhen coverage returns toa normal situation.normal. An implementationMAY :MAY: o trigger an alert if a specific destination is not protected anymore or when protection comes back up for thisdestinationdestination. Although the procedures for providing alerts are beyond the scope of this document, we recommend that implementations consider standard andwell usedwell-used mechanisms like syslog or SNMP traps. 7.5.LFALFAs andnetwork planningNetwork Planning The operator may choose to run simulations in order to ensurefull coverage ofa certain type of full coverage for the whole network or a given subset of the network. This is particularly likely if he operates the network in the sense of the third backboneprofilesprofile described in[RFC6571],Section 4 of [RFC6571]; that is, he seeks to design and engineer the network topology in such a way that a certain level of coverage is always achieved.ObviouslyObviously, a complete and exact simulation of the IP FRR coverage can only beachieved,achieved if the behavior is deterministic andifthe algorithm used is available to the simulation tool. Thus, an implementation SHOULD: o Behavedeterministicdeterministically in itsselectionLFA selection process.I.e.That is, in the same topology and with the same policy configuration, the implementation MUST always choose the same alternate for a given prefix. o Document its behavior. The implementation SHOULD provide enough documentationofregarding its behaviorthat allowsto allow an implementer of a simulationtool,tool to foresee the exact choice of the LFA implementation for every prefix in a given topology. This SHOULD take into account all possible policy configuration options. One possible way to document this behavior is to disclose the algorithm used to choose alternates. 8. Security Considerations The policy mechanism introduced in this document allowsto tunethe tuning of the selection of the alternate. This is not seen as a securitythreat as:threat, because: o all candidates are already eligible as per [RFC5286] and considereduseable.usable. o the policy is based on information from the router's own configuration and from theIGPIGP, both of which arebothconsidered trusted.HenceHence, this document does not introduce any new security considerations as compared to [RFC5286].This document does not introduce any change in security consideration compared to [RFC5286]. TheAs noted above, the policy mechanism introduced in this documentallow to tuneallows the tuning of the selection of the best alternatechoicebut does not change the list of alternates that are eligible. Asdefineddescribed in[RFC5286]Section7.,7 of [RFC5286], this best alternate "can be used anyway when a different topological change occurs, and hence this can't be viewed as a new securitythreat.".threat." 9.IANA Considerations This document has no action for IANA. 10. Contributors Significant contributions were made by Pierre Francois, Hannes Gredler, Chris Bowers, Jeff Tantsura, Uma Chunduri, Acee Lindem and Mustapha Aissaoui which the authors would like to acknowledge. 11.References11.1.9.1. Normative References[I-D.ietf-isis-node-admin-tag] Sarkar, P., Gredler, H., Hegde, S., Litkowski, S., Decraene, B., Li, Z., Aries, E., Rodriguez, R., and H. Raghuveer, "Advertising Per-node Admin Tags in IS-IS", draft-ietf-isis-node-admin-tag-02 (work in progress), June 2015. [I-D.ietf-ospf-node-admin-tag] Hegde, S., Raghuveer, H., Gredler, H., Shakir, R., Smirnov, A., Li, Z., and B. Decraene, "Advertising per- node administrative tags in OSPF", draft-ietf-ospf-node- admin-tag-02 (work in progress), June 2015.[ISO10589] International Organization for Standardization, "IntermediatesystemSystem to IntermediatesystemSystem intra-domainroutingrouteing information exchange protocol for use in conjunction with the protocol for providing the connectionless-modeNetwork Servicenetwork service (ISO8473), ISO/IEC 10589:2002, Second Edition.", Nov8473)", ISO Standard 10589, 2002. [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March1997. [RFC3137] Retana, A., Nguyen, L., White, R., Zinin, A., and D. McPherson, "OSPF Stub Router Advertisement", RFC 3137, June 2001.1997, <http://www.rfc-editor.org/info/rfc2119>. [RFC3630] Katz, D., Kompella, K., and D. Yeung, "Traffic Engineering (TE) Extensions to OSPF Version 2", RFC 3630, DOI 10.17487/RFC3630, September2003.2003, <http://www.rfc-editor.org/info/rfc3630>. [RFC4203] Kompella,K.K., Ed. and Y. Rekhter, Ed., "OSPF Extensions in Support of Generalized Multi-Protocol Label Switching (GMPLS)", RFC 4203, DOI 10.17487/RFC4203, October2005. [RFC4205] Kompella, K. and Y. Rekhter, "Intermediate System to Intermediate System (IS-IS) Extensions in Support of Generalized Multi-Protocol Label Switching (GMPLS)", RFC 4205, October 2005.2005, <http://www.rfc-editor.org/info/rfc4203>. [RFC5286] Atlas,A.A., Ed. and A. Zinin, Ed., "Basic Specification for IP Fast Reroute: Loop-Free Alternates", RFC 5286, DOI 10.17487/RFC5286, September2008.2008, <http://www.rfc-editor.org/info/rfc5286>. [RFC5305] Li, T. and H. Smit, "IS-IS Extensions for Traffic Engineering", RFC 5305, DOI 10.17487/RFC5305, October2008.2008, <http://www.rfc-editor.org/info/rfc5305>. [RFC5307] Kompella,K.K., Ed. and Y. Rekhter, Ed., "IS-IS Extensions in Support of Generalized Multi-Protocol Label Switching (GMPLS)", RFC 5307, DOI 10.17487/RFC5307, October2008.2008, <http://www.rfc-editor.org/info/rfc5307>. [RFC5340] Coltun, R., Ferguson, D., Moy, J., and A. Lindem, "OSPF for IPv6", RFC 5340, DOI 10.17487/RFC5340, July2008.2008, <http://www.rfc-editor.org/info/rfc5340>. [RFC6571] Filsfils, C., Ed., Francois, P., Ed., Shand, M., Decraene, B., Uttaro, J., Leymann, N., and M. Horneffer, "Loop-Free Alternate (LFA) Applicability in Service Provider (SP) Networks", RFC 6571, DOI 10.17487/RFC6571, June2012.2012, <http://www.rfc-editor.org/info/rfc6571>. [RFC6987] Retana, A., Nguyen, L., Zinin, A., White, R., and D. McPherson, "OSPF Stub Router Advertisement", RFC 6987, DOI 10.17487/RFC6987, September2013.2013, <http://www.rfc-editor.org/info/rfc6987>. [RFC7490] Bryant, S., Filsfils, C., Previdi, S., Shand, M., and N. So, "Remote Loop-Free Alternate (LFA) Fast Reroute (FRR)", RFC 7490, DOI 10.17487/RFC7490, April2015. 11.2.2015, <http://www.rfc-editor.org/info/rfc7490>. [RFC7777] Hegde, S., Shakir, R., Smirnov, A., Li, Z., and B. Decraene, "Advertising Node Administrative Tags in OSPF", RFC 7777, DOI 10.17487/RFC7777, March 2016, <http://www.rfc-editor.org/info/rfc7777>. [RFC7917] Sarkar, P., Ed., Gredler, H., Hegde, S., Litkowski, S., and B. Decraene, "Advertising Node Administrative Tags in IS-IS", RFC 7917, DOI 10.17487/RFC7917, June 2016, <http://www.rfc-editor.org/info/rfc7917>. 9.2. Informative References[I-D.francois-segment-routing-ti-lfa][REMOTE-LFA-NODE] Sarkar, P., Ed., Hegde, S., Bowers, C., Gredler, H., and S. Litkowski, "Remote-LFA Node Protection and Manageability", Work in Progress, draft-ietf-rtgwg-rlfa- node-protection-05, December 2015. [SEG-RTG-ARCH] Filsfils, C., Ed., Previdi, S., Ed., Decraene, B., Litkowski, S., and R. Shakir, "Segment Routing Architecture", Work in Progress, draft-ietf-spring- segment-routing-08, May 2016. [TI-LFA] Francois, P., Filsfils, C., Bashandy, A.,and B.Decraene, B., and S. Litkowski, "Topology Independent Fast Reroute using Segment Routing",draft-francois-segment-routing-ti-lfa-00 (workWork inprogress),Progress, draft-francois- segment-routing-ti-lfa-00, November 2013.[I-D.ietf-rtgwg-rlfa-node-protection] Sarkar, P.,Contributors Significant contributions were made by Pierre Francois, Hannes Gredler,H., Hegde, S.,Chris Bowers,C., Litkowski, S., and H. Raghuveer, "Remote-LFA Node ProtectionJeff Tantsura, Uma Chunduri, Acee Lindem, andManageability", draft-ietf-rtgwg-rlfa-node-protection-02 (work in progress), June 2015.Mustapha Aissaoui, whom the authors would like to acknowledge. Authors' Addresses Stephane Litkowski (editor) Orange Email: stephane.litkowski@orange.com Bruno Decraene Orange Email: bruno.decraene@orange.com Clarence Filsfils Cisco Systems Email: cfilsfil@cisco.com Kamran Raza Cisco Systems Email: skraza@cisco.com Martin Horneffer Deutsche Telekom Email: Martin.Horneffer@telekom.de Pushpasis SarkarJuniper NetworksIndividual Contributor Email:psarkar@juniper.netpushpasis.ietf@gmail.com