RFC 9314: YANG Data Model for Bidirectional Forwarding Detection (BFD)
- M. Jethanandani, Ed.,
- R. Rahman, Ed.,
- L. Zheng, Ed.,
- S. Pallagatti,
- G. Mirsky
Abstract
This document defines a YANG data model that can be used to configure and manage Bidirectional Forwarding Detection (BFD).¶
The YANG modules in this document conform to the Network Management Datastore Architecture (NMDA) (RFC 8342). This document updates "YANG Data Model for Bidirectional Forwarding Detection (BFD)" (RFC 9127).¶
Status of This Memo
This is an Internet Standards Track document.¶
This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 7841.¶
Information about the current status of this document, any
errata, and how to provide feedback on it may be obtained at
https://
Copyright Notice
Copyright (c) 2022 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://
1. Introduction
This document defines a YANG data model that can be used to configure and manage Bidirectional Forwarding Detection (BFD) [RFC5880]. BFD is a network protocol that is used for liveness detection of arbitrary paths between systems. Some examples of different types of paths over which we have BFD are as follows:¶
BFD typically does not operate on its own. Various control protocols, also known as BFD clients, use the services provided by BFD for their own operation, as described in "Generic Application of Bidirectional Forwarding Detection (BFD)" [RFC5882]. The obvious candidates that use BFD are those that do not have "hellos" to detect failures, e.g., static routes, and routing protocols whose "hellos" do not support sub-second failure detection, e.g., OSPF and IS-IS.¶
The YANG modules in this document conform to the Network Management Datastore Architecture (NMDA) [RFC8342]. This means that the data models do not have separate top-level or sibling containers for configuration data and operational state data.¶
1.1. Tree Diagrams
This document uses the graphical representation of data models, as defined in [RFC8340].¶
2. Design of the Data Model
Since BFD is used for liveness detection of various forwarding paths, there is no uniform key to identify a BFD session. Therefore, the BFD data model is split into multiple YANG modules where each module corresponds to one type of forwarding path. For example, BFD for IP single-hop is in one YANG module, and BFD for MPLS is in another YANG module. The main difference between these modules is how a BFD session is uniquely identified, i.e., the key for the list containing the BFD sessions for that forwarding path. To avoid duplication of BFD definitions, we have common types and groupings that are used by all the modules.¶
A new control plane protocol, "bfdv1", is defined, and a "bfd" container
is created under "control
BFD can operate in the following contexts:¶
When used at the network device level, the BFD YANG data model is used "as is". When the BFD YANG data model is used in an LNE or network instance, the BFD YANG data model augments the mounted routing model for the LNE or network instance.¶
2.1. Design of the Configuration Model
The configuration model consists mainly of the parameters specified in BFD [RFC5880] -- for example, desired minimum transmit interval, required minimum receive interval, and detection multiplier.¶
BFD clients are applications that use BFD for fast detection of failures. Some implementations have BFD session configuration under the BFD clients -- for example, BFD session configuration under routing applications such as OSPF, IS-IS, or BGP. Other implementations have BFD session configuration centralized under BFD, i.e., outside the multiple BFD clients.¶
The main BFD parameters of interest to a BFD client are those
related to the
multiplier and interval(s), since those parameters impact the
convergence time of the BFD clients when a failure occurs. Other
parameters, such as BFD authentication, are not specific to the
requirements of the BFD client. Configuration of BFD for all
clients should be centralized. However, this is a problem for BFD clients
that auto-discover their peers. For example, IGPs do not have the
peer address configured; instead, the IGP is enabled on an interface,
and the IGP peers are auto
2.1.1. Common BFD Configuration Parameters
The basic BFD configuration parameters are as follows:¶
- local-multiplier
- This is the detection time multiplier as defined in BFD [RFC5880].¶
- desired
-min -tx -interval - This is the Desired Min TX Interval as defined in BFD [RFC5880].¶
- required
-min -rx -interval - This is the Required Min RX Interval as defined in BFD [RFC5880].¶
Although BFD [RFC5880]
allows for different values for transmit and receive intervals, some
implementations allow users to specify just one interval that is
used for both transmit and receive intervals, or separate values for
transmit and receive intervals. The BFD YANG data model supports this:
there is a choice between "min-interval", used for both transmit and
receive intervals, and "desired
For BFD authentication, we have the following:¶
2.1.2. Single-Hop IP
For single-hop IP, there is an augment of the "bfd" data node, as described in Section 2. The "ip-sh" node contains a list of IP single-hop sessions where each session is uniquely identified by the interface and destination address pair. We use the configuration parameters defined in Section 2.1.1. The "ip-sh" node also contains a list of interfaces and is used to specify authentication parameters for BFD sessions that are created by BFD clients. See Section 2.1.¶
[RFC5880] and [RFC5881] do not specify whether the Echo function operates continuously or on demand. Therefore, the mechanism used to start and stop the Echo function is implementation specific and should be done by augmentation:¶
2.1.3. Multihop IP
For multihop IP, there is an augment of the "bfd" data node, as described in Section 2.¶
Because of multiple paths, there could be multiple multihop IP
sessions between a source and a destination address. We identify
this set of sessions as a "session
- Source address
- Address belonging to the local system as per "Bidirectional Forwarding Detection (BFD) for Multihop Paths" [RFC5883].¶
- Destination address
- Address belonging to the remote system as per [RFC5883].¶
We use the configuration parameters defined in Section 2.1.1.¶
This document also provides the following parameters:¶
2.1.4. MPLS Label Switched Paths
Here, we address MPLS LSPs whose
Forwarding Equivalence Class (FEC) [RFC3031] is an IP
address. The "bfd"
node (Section 2) is augmented
with "mpls", which contains a list of sessions uniquely identified by
an IP prefix. Because of multiple paths, there could be multiple
MPLS sessions to an MPLS FEC. We identify this set of sessions as a
"session
Since these LSPs are unidirectional, there is no LSP configuration on the egress node.¶
The BFD parameters for the egress node are added under "mpls".¶
2.1.5. Link Aggregation Groups
Per "Bidirectional Forwarding Detection (BFD) on Link Aggregation Group (LAG) Interfaces" [RFC7130], configuring BFD on a LAG consists of having micro-BFD sessions on each LAG member link. Since the BFD parameters are an attribute of the LAG, they should be under the LAG. However, there is no LAG YANG data model that we can augment. So, a "lag" data node is added to the "bfd" node; see Section 2. The configuration is per LAG: we have a list of LAGs. The destination IP address of the micro-BFD sessions is configured per LAG and per address family (IPv4 and IPv6).¶
2.2. Design of the Operational State Model
The operational state model contains both the overall statistics for the BFD sessions running on the device and the per-session operational information.¶
The overall statistics for the BFD sessions consist of the number of BFD sessions, the number of BFD sessions that are up, etc. This information is available globally (i.e., for all BFD sessions) under the "bfd" node (Section 2) and also per type of forwarding path.¶
For each BFD session, three main categories of operational state data are shown.¶
For some path types, there may be more than one session on the
virtual path to the destination. For example, with IP multihop and
MPLS LSPs, there could be multiple BFD sessions from the source to the
same destination to test the various paths (ECMP) to the destination.
This is represented by having multiple "sessions" under each
"session
2.3. Notifications
This YANG data model defines notifications to inform end users of important events detected during the protocol operation. The local discriminator identifies the corresponding BFD session on the local system, and the remote discriminator identifies the BFD session on the remote system. Notifications also give more important details about BFD sessions, e.g., new state, time in previous state, network instance, and the reason that the BFD session state changed. The notifications are defined for each type of forwarding path but use groupings for common information.¶
2.4. RPC Operations
None.¶
2.5. BFD Top-Level Hierarchy
At the "bfd" node under "control
2.6. BFD IP Single-Hop Hierarchy
An "ip-sh" node is added under the "bfd" node in
"control
2.7. BFD IP Multihop Hierarchy
An "ip-mh" node is added under the "bfd" node in
"control
2.8. BFD-over-LAG Hierarchy
A "lag" node is added under the "bfd" node in
"control
2.9. BFD-over-MPLS-LSPs Hierarchy
An "mpls" node is added under the "bfd" node in
"control
2.10. Interaction with Other YANG Modules
"Generic YANG Data Model for the Management
of Operations, Administration, and Maintenance (OAM) Protocols That
Use Connectionless Communications" [RFC8532] describes how the
Layer
Also, the operation of the BFD data model depends on configuration parameters that are defined in other YANG modules.¶
2.10.1. "ietf-interfaces" Module
The following boolean configuration is defined in "A YANG Data Model for Interface Management" [RFC8343]:¶
- /if
:interfaces /if :interface /if :enabled - If this configuration is set to "false", no BFD packets can be transmitted or received on that interface.¶
2.10.2. "ietf-ip" Module
The following boolean configuration is defined in "A YANG Data Model for IP Management" [RFC8344]:¶
- /if
:interfaces /if :interface /ip :ipv4 /ip :enabled - If this configuration is set to "false", no BFD IPv4 packets can be transmitted or received on that interface.¶
- /if
:interfaces /if :interface /ip :ipv4 /ip :forwarding - If this configuration is set to "false", no BFD IPv4 packets can be transmitted or received on that interface.¶
- /if
:interfaces /if :interface /ip :ipv6 /ip :enabled - If this configuration is set to "false", no BFD IPv6 packets can be transmitted or received on that interface.¶
- /if
:interfaces /if :interface /ip :ipv6 /ip :forwarding - If this configuration is set to "false", no BFD IPv6 packets can be transmitted or received on that interface.¶
2.10.3. "ietf-mpls" Module
The following boolean configuration is defined in "A YANG Data Model for MPLS Base" [RFC8960]:¶
- /rt
:routing /mpls :mpls /mpls :interfaces /mpls :interface /mpls :mpls -enabled - If this configuration is set to "false", no BFD MPLS packets can be transmitted or received on that interface.¶
2.11. BFD Types YANG Module
This YANG module imports typedefs from [RFC6991] and [RFC8177].
It also imports definitions from
[RFC5880], [RFC5881],
[RFC5883], [RFC5884], and
[RFC7130], as well as the
"control
2.12. BFD Top-Level YANG Module
This YANG module imports and augments
"
2.13. BFD IP Single-Hop YANG Module
This YANG module imports "interface-ref" from [RFC8343] and typedefs from [RFC6991]. It also imports and augments
"
2.14. BFD IP Multihop YANG Module
This YANG module imports typedefs from
[RFC6991]. It also imports and augments
"
3. Data Model Examples
This section presents some simple and illustrative examples of how to configure BFD.¶
The examples are represented in XML [W3C
3.1. IP Single-Hop
The following is an example configuration for a BFD IP single-hop session. The desired transmit interval and the required receive interval are both set to 10 ms.¶
3.2. IP Multihop
The following is an example configuration for a BFD IP multihop session group. The desired transmit interval and the required receive interval are both set to 150 ms.¶
3.3. LAG
The following is an example of BFD configuration for a LAG session. In this case, an interface named "Bundle-Ether1" of interface type "ieee8023adLag" has a desired transmit interval and required receive interval set to 10 ms.¶
3.4. MPLS
The following is an example of BFD configured for an MPLS LSP. In this case, the desired transmit interval and required receive interval are both set to 250 ms.¶
4. Security Considerations
The YANG modules specified in this document define a schema for data
that is designed to be accessed via network management protocols such
as NETCONF [RFC6241] or RESTCONF [RFC8040].
The lowest NETCONF layer is the secure transport layer, and the
mandatory
The Network Configuration Access Control Model (NACM) [RFC8341] provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.¶
There are a number of data nodes defined in these YANG modules that are
writable
- /routing
/control -plane -protocols /control -plane -protocol /bfd /ip -sh /sessions : -
This list specifies the IP single-hop BFD sessions.¶
Data nodes "local
-multiplier", "desired -min -tx -interval", "required -min -rx -interval", and "min-interval" all impact the BFD IP single-hop session. The "source-addr" and "dest-addr" data nodes can be used to send BFD packets to unwitting recipients. [RFC5880] describes how BFD mitigates such threats. Authentication data nodes "key-chain" and "meticulous" impact the security of the BFD IP single-hop session.¶ - /routing
/control -plane -protocols /control -plane -protocol /bfd /ip -mh /session -group : -
This list specifies the IP multihop BFD session groups.¶
Data nodes "local
-multiplier", "desired -min -tx -interval", "required -min -rx -interval", and "min-interval" all impact the BFD IP multihop session. The "source-addr" and "dest-addr" data nodes can be used to send BFD packets to unwitting recipients. [RFC5880] describes how BFD mitigates such threats. Authentication data nodes "key-chain" and "meticulous" impact the security of the BFD IP multihop session.¶ - /routing
/control -plane -protocols /control -plane -protocol /bfd /lag /sessions : -
This list specifies the BFD sessions over a LAG.¶
Data nodes "local
-multiplier", "desired -min -tx -interval", "required -min -rx -interval", and "min-interval" all impact the BFD-over-LAG session. The "ipv4 -dest -addr" and "ipv6 -dest -addr" data nodes can be used to send BFD packets to unwitting recipients. [RFC5880] describes how BFD mitigates such threats. Authentication data nodes "key-chain" and "meticulous" impact the security of the BFD-over-LAG session.¶ - /routing
/control -plane -protocols /control -plane -protocol /bfd /mpls /session -group : -
This list specifies the session groups for BFD over MPLS.¶
Data nodes "local
-multiplier", "desired -min -tx -interval", "required -min -rx -interval", and "min-interval" all impact the BFD -over -MPLS -LSPs session. Authentication data nodes "key-chain" and "meticulous" impact the security of the BFD -over -MPLS -LSPs session.¶ - /routing
/control -plane -protocols /control -plane -protocol /bfd /mpls /egress : - Data nodes "local
-multiplier", "desired -min -tx -interval", "required -min -rx -interval", and "min-interval" all impact the BFD -over -MPLS -LSPs sessions for which this device is an MPLS LSP egress node. Authentication data nodes "key-chain" and "meticulous" impact the security of the BFD -over -MPLS -LSPs sessions for which this device is an MPLS LSP egress node.¶
The YANG modules have writable data nodes that can be used for the creation of BFD sessions and the modification of BFD session parameters. The system should "police" the creation of BFD sessions to prevent new sessions from causing existing BFD sessions to fail. In the case of BFD session modification, the BFD protocol has mechanisms in place that allow for in-service modification.¶
When BFD clients are used to modify BFD configuration (as described in Section 2.1), the BFD clients need to be included in an analysis of the security properties of the system that uses BFD (e.g., when considering the authentication and authorization of control actions). In many cases, BFD is not the most vulnerable portion of such a composite system, since BFD is limited to generating well-defined traffic at a fixed rate on a given path; in the case of an IGP acting as a BFD client, attacking the IGP could cause more broad-scale disruption than would (de)configuring a BFD session.¶
Some of the readable data nodes in these YANG modules may be considered
sensitive or vulnerable in some network environments. It is thus
important to control read access (e.g., via get, get-config, or
notification) to these data nodes. These are the subtrees and data nodes
and their sensitivity
- /routing
/control -plane -protocols /control -plane -protocol /bfd /ip -sh /summary : - Access to this information discloses the number of BFD IP single-hop sessions that are in the "up", "down", or "admin-down" state. The counters include BFD sessions for which the user does not have read access.¶
- /routing
/control -plane -protocols /control -plane -protocol /bfd /ip -sh /sessions /session /: - Access to data nodes "local
-discriminator" and "remote -discriminator" (combined with the data nodes in the authentication container) provides the ability to spoof BFD IP single-hop packets.¶ - /routing
/control -plane -protocols /control -plane -protocol /bfd /ip -mh /summary : - Access to this information discloses the number of BFD IP multihop sessions that are in the "up", "down", or "admin-down" state. The counters include BFD sessions for which the user does not have read access.¶
- /routing
/control -plane -protocols /control -plane -protocol /bfd /ip -mh /session -groups /session -group /sessions : - Access to data nodes "local
-discriminator" and "remote -discriminator" (combined with the data nodes in the session group's authentication container) provides the ability to spoof BFD IP multihop packets.¶ - /routing
/control -plane -protocols /control -plane -protocol /bfd /lag /micro -bfd -ipv4 -session -statistics /summary : - Access to this information discloses the number of micro-BFD IPv4 LAG sessions that are in the "up", "down", or "admin-down" state. The counters include BFD sessions for which the user does not have read access.¶
- /routing
/control -plane -protocols /control -plane -protocol /bfd /lag /sessions /session /member -links /member -link /micro -bfd -ipv4 : - Access to data nodes "local
-discriminator" and "remote -discriminator" (combined with the data nodes in the session's authentication container) provides the ability to spoof BFD IPv4 LAG packets.¶ - /routing
/control -plane -protocols /control -plane -protocol /bfd /lag /micro -bfd -ipv6 -session -statistics /summary : - Access to this information discloses the number of micro-BFD IPv6 LAG sessions that are in the "up", "down", or "admin-down" state. The counters include BFD sessions for which the user does not have read access.¶
- /routing
/control -plane -protocols /control -plane -protocol /bfd /lag /sessions /session /member -links /member -link /micro -bfd -ipv6 : - Access to data nodes "local
-discriminator" and "remote -discriminator" (combined with the data nodes in the session's authentication container) provides the ability to spoof BFD IPv6 LAG packets.¶ - /routing
/control -plane -protocols /control -plane -protocol /bfd /mpls /summary : - Access to this information discloses the number of BFD sessions over MPLS LSPs that are in the "up", "down", or "admin-down" state. The counters include BFD sessions for which the user does not have read access.¶
- /routing
/control -plane -protocols /control -plane -protocol /bfd /mpls /session -groups /session -group /sessions : - Access to data nodes "local
-discriminator" and "remote -discriminator" (combined with the data nodes in the session group's authentication container) provides the ability to spoof BFD -over -MPLS -LSPs packets.¶
This document does not define any RPC operations.¶
5. IANA Considerations
This document registers the following namespace URIs in the "IETF XML Registry" [RFC3688]:¶
- URI:
- urn
:ietf :params :xml :ns :yang :ietf -bfd -types ¶ - Registrant Contact:
- The IESG.¶
- XML:
- N/A; the requested URI is an XML namespace.¶
- URI:
- urn
:ietf :params :xml :ns :yang :ietf -bfd ¶ - Registrant Contact:
- The IESG.¶
- XML:
- N/A; the requested URI is an XML namespace.¶
- URI:
- urn
:ietf :params :xml :ns :yang :ietf -bfd -ip -sh ¶ - Registrant Contact:
- The IESG.¶
- XML:
- N/A; the requested URI is an XML namespace.¶
- URI:
- urn
:ietf :params :xml :ns :yang :ietf -bfd -ip -mh ¶ - Registrant Contact:
- The IESG.¶
- XML:
- N/A; the requested URI is an XML namespace.¶
- URI:
- urn
:ietf :params :xml :ns :yang :ietf -bfd -lag ¶ - Registrant Contact:
- The IESG.¶
- XML:
- N/A; the requested URI is an XML namespace.¶
- URI:
- urn
:ietf :params :xml :ns :yang :ietf -bfd -mpls ¶ - Registrant Contact:
- The IESG.¶
- XML:
- N/A; the requested URI is an XML namespace.¶
This document registers the following YANG modules in the "YANG Module Names" registry [RFC6020]:¶
- Name:
- ietf-bfd-types¶
- Namespace:
- urn
:ietf :params :xml :ns :yang :ietf -bfd -types ¶ - Prefix:
- bfd-types¶
- Reference:
- RFC 9314¶
- Name:
- ietf-bfd-ip-sh¶
- Namespace:
- urn
:ietf :params :xml :ns :yang :ietf -bfd -ip -sh ¶ - Prefix:
- bfd-ip-sh¶
- Reference:
- RFC 9314¶
- Name:
- ietf-bfd-ip-mh¶
- Namespace:
- urn
:ietf :params :xml :ns :yang :ietf -bfd -ip -mh ¶ - Prefix:
- bfd-ip-mh¶
- Reference:
- RFC 9314¶
6. References
6.1. Normative References
- [RFC3688]
-
Mealling, M., "The IETF XML Registry", BCP 81, RFC 3688, DOI 10
.17487 , , <https:///RFC3688 www >..rfc -editor .org /info /rfc3688 - [RFC5586]
-
Bocci, M., Ed., Vigoureux, M., Ed., and S. Bryant, Ed., "MPLS Generic Associated Channel", RFC 5586, DOI 10
.17487 , , <https:///RFC5586 www >..rfc -editor .org /info /rfc5586 - [RFC5880]
-
Katz, D. and D. Ward, "Bidirectional Forwarding Detection (BFD)", RFC 5880, DOI 10
.17487 , , <https:///RFC5880 www >..rfc -editor .org /info /rfc5880 - [RFC5881]
-
Katz, D. and D. Ward, "Bidirectional Forwarding Detection (BFD) for IPv4 and IPv6 (Single Hop)", RFC 5881, DOI 10
.17487 , , <https:///RFC5881 www >..rfc -editor .org /info /rfc5881 - [RFC5882]
-
Katz, D. and D. Ward, "Generic Application of Bidirectional Forwarding Detection (BFD)", RFC 5882, DOI 10
.17487 , , <https:///RFC5882 www >..rfc -editor .org /info /rfc5882 - [RFC5883]
-
Katz, D. and D. Ward, "Bidirectional Forwarding Detection (BFD) for Multihop Paths", RFC 5883, DOI 10
.17487 , , <https:///RFC5883 www >..rfc -editor .org /info /rfc5883 - [RFC5884]
-
Aggarwal, R., Kompella, K., Nadeau, T., and G. Swallow, "Bidirectional Forwarding Detection (BFD) for MPLS Label Switched Paths (LSPs)", RFC 5884, DOI 10
.17487 , , <https:///RFC5884 www >..rfc -editor .org /info /rfc5884 - [RFC5885]
-
Nadeau, T., Ed. and C. Pignataro, Ed., "Bidirectional Forwarding Detection (BFD) for the Pseudowire Virtual Circuit Connectivity Verification (VCCV)", RFC 5885, DOI 10
.17487 , , <https:///RFC5885 www >..rfc -editor .org /info /rfc5885 - [RFC6020]
-
Bjorklund, M., Ed., "YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)", RFC 6020, DOI 10
.17487 , , <https:///RFC6020 www >..rfc -editor .org /info /rfc6020 - [RFC6241]
-
Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed., and A. Bierman, Ed., "Network Configuration Protocol (NETCONF)", RFC 6241, DOI 10
.17487 , , <https:///RFC6241 www >..rfc -editor .org /info /rfc6241 - [RFC6242]
-
Wasserman, M., "Using the NETCONF Protocol over Secure Shell (SSH)", RFC 6242, DOI 10
.17487 , , <https:///RFC6242 www >..rfc -editor .org /info /rfc6242 - [RFC6991]
-
Schoenwaelder, J., Ed., "Common YANG Data Types", RFC 6991, DOI 10
.17487 , , <https:///RFC6991 www >..rfc -editor .org /info /rfc6991 - [RFC7130]
-
Bhatia, M., Ed., Chen, M., Ed., Boutros, S., Ed., Binderberger, M., Ed., and J. Haas, Ed., "Bidirectional Forwarding Detection (BFD) on Link Aggregation Group (LAG) Interfaces", RFC 7130, DOI 10
.17487 , , <https:///RFC7130 www >..rfc -editor .org /info /rfc7130 - [RFC8040]
-
Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF Protocol", RFC 8040, DOI 10
.17487 , , <https:///RFC8040 www >..rfc -editor .org /info /rfc8040 - [RFC8177]
-
Lindem, A., Ed., Qu, Y., Yeung, D., Chen, I., and J. Zhang, "YANG Data Model for Key Chains", RFC 8177, DOI 10
.17487 , , <https:///RFC8177 www >..rfc -editor .org /info /rfc8177 - [RFC8340]
-
Bjorklund, M. and L. Berger, Ed., "YANG Tree Diagrams", BCP 215, RFC 8340, DOI 10
.17487 , , <https:///RFC8340 www >..rfc -editor .org /info /rfc8340 - [RFC8341]
-
Bierman, A. and M. Bjorklund, "Network Configuration Access Control Model", STD 91, RFC 8341, DOI 10
.17487 , , <https:///RFC8341 www >..rfc -editor .org /info /rfc8341 - [RFC8343]
-
Bjorklund, M., "A YANG Data Model for Interface Management", RFC 8343, DOI 10
.17487 , , <https:///RFC8343 www >..rfc -editor .org /info /rfc8343 - [RFC8344]
-
Bjorklund, M., "A YANG Data Model for IP Management", RFC 8344, DOI 10
.17487 , , <https:///RFC8344 www >..rfc -editor .org /info /rfc8344 - [RFC8349]
-
Lhotka, L., Lindem, A., and Y. Qu, "A YANG Data Model for Routing Management (NMDA Version)", RFC 8349, DOI 10
.17487 , , <https:///RFC8349 www >..rfc -editor .org /info /rfc8349 - [RFC8446]
-
Rescorla, E., "The Transport Layer Security (TLS) Protocol Version 1.3", RFC 8446, DOI 10
.17487 , , <https:///RFC8446 www >..rfc -editor .org /info /rfc8446 - [RFC8960]
-
Saad, T., Raza, K., Gandhi, R., Liu, X., and V. Beeram, "A YANG Data Model for MPLS Base", RFC 8960, DOI 10
.17487 , , <https:///RFC8960 www >..rfc -editor .org /info /rfc8960 - [RFC9127]
-
Rahman, R., Ed., Zheng, L., Ed., Jethanandani, M., Ed., Pallagatti, S., and G. Mirsky, "YANG Data Model for Bidirectional Forwarding Detection (BFD)", RFC 9127, DOI 10
.17487 , , <https:///RFC9127 www >..rfc -editor .org /info /rfc9127
6.2. Informative References
- [RFC3031]
-
Rosen, E., Viswanathan, A., and R. Callon, "Multiprotocol Label Switching Architecture", RFC 3031, DOI 10
.17487 , , <https:///RFC3031 www >..rfc -editor .org /info /rfc3031 - [RFC8342]
-
Bjorklund, M., Schoenwaelder, J., Shafer, P., Watsen, K., and R. Wilton, "Network Management Datastore Architecture (NMDA)", RFC 8342, DOI 10
.17487 , , <https:///RFC8342 www >..rfc -editor .org /info /rfc8342 - [RFC8529]
-
Berger, L., Hopps, C., Lindem, A., Bogdanovic, D., and X. Liu, "YANG Data Model for Network Instances", RFC 8529, DOI 10
.17487 , , <https:///RFC8529 www >..rfc -editor .org /info /rfc8529 - [RFC8530]
-
Berger, L., Hopps, C., Lindem, A., Bogdanovic, D., and X. Liu, "YANG Model for Logical Network Elements", RFC 8530, DOI 10
.17487 , , <https:///RFC8530 www >..rfc -editor .org /info /rfc8530 - [RFC8532]
-
Kumar, D., Wang, Z., Wu, Q., Ed., Rahman, R., and S. Raghavan, "Generic YANG Data Model for the Management of Operations, Administration, and Maintenance (OAM) Protocols That Use Connectionless Communications", RFC 8532, DOI 10
.17487 , , <https:///RFC8532 www >..rfc -editor .org /info /rfc8532 - [W3C
.REC -xml -20081126] -
Bray, T., Paoli, J., Sperberg
-Mc , Maler, E., and F. Yergeau, "Extensible Markup Language (XML) 1.0 (Fifth Edition)", World Wide Web Consortium Recommendation RECQueen, M. -xml , , <https://-20081126 www >..w3 .org /TR /2008 /REC -xml -20081126
Appendix A. Echo Function Configuration Example
As mentioned in Section 2.1.2, the mechanism to start and stop the Echo function, as defined in [RFC5880] and discussed in [RFC5881], is implementation specific. In this appendix, we provide an example of how the Echo function can be implemented via configuration.¶
A.1. Example YANG Module for BFD Echo Function Configuration
This appendix provides an example YANG module for
configuration of the BFD Echo function. It imports and augments
"
Appendix B. Updates since RFC 9127
This document updates the 'ietf
The iana-bfd-types module, created in RFC 9127, was delegated to IANA for maintenance. No changes are requested from IANA as part of this update.¶
Acknowledgments
We would like to thank Nobo Akiya and Jeff Haas for their encouragement on this work. We would also like to thank Tom Petch for his comments on the document. We would also like to thank Acee Lindem for his guidance. Thanks also to Jürgen Schönwälder, who was instrumental in improving the YANG modules.¶