<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc comments="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-teas-yang-te-37" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="TE YANG Data Model">A YANG Data Model for Traffic Engineering Tunnels, Label Switched Paths and Interfaces</title>

    <author initials="T." surname="Saad" fullname="Tarek Saad">
      <organization>Cisco Systems Inc</organization>
      <address>
        <email>tsaad.net@gmail.com</email>
      </address>
    </author>
    <author initials="R." surname="Gandhi" fullname="Rakesh Gandhi">
      <organization>Cisco Systems Inc</organization>
      <address>
        <email>rgandhi@cisco.com</email>
      </address>
    </author>
    <author initials="X." surname="Liu" fullname="Xufeng Liu">
      <organization>Alef Edge</organization>
      <address>
        <email>xufeng.liu.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="V. P." surname="Beeram" fullname="Vishnu Pavan Beeram">
      <organization>Juniper Networks</organization>
      <address>
        <email>vbeeram@juniper.net</email>
      </address>
    </author>
    <author initials="I." surname="Bryskin" fullname="Igor Bryskin">
      <organization>Individual</organization>
      <address>
        <email>i_bryskin@yahoo.com</email>
      </address>
    </author>

    <date year="2024" month="October" day="09"/>

    
    <workgroup>TEAS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document defines a YANG data model for the provisioning and management of
Traffic Engineering (TE) tunnels, Label Switched Paths (LSPs), and interfaces.
The model covers data that is independent of any technology or dataplane encapsulation
and is divided into two YANG modules that cover device-specific, and device independent
data.</t>

<t>This model covers data for configuration, operational state, remote procedural
calls, and event notifications.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>YANG <xref target="RFC6020"/> and <xref target="RFC7950"/> is a data modeling language that was
introduced to define the contents of a conceptual data store that allows
networked devices to be managed using NETCONF <xref target="RFC6241"/>. YANG has proved
relevant beyond its initial confines, as bindings to other interfaces (e.g.
RESTCONF <xref target="RFC8040"/>) and encoding other than XML (e.g. JSON) are being defined.
Furthermore, YANG data models can be used as the basis of implementation for
other interfaces, such as CLI and programmatic APIs.</t>

<t>This document describes a YANG data model for Traffic Engineering (TE) tunnels,
Label Switched Paths (LSPs), and interfaces. The data model is divided into two
YANG modules. The module 'ietf-te.yang' includes data that is generic and
device-independent, while the module 'ietf-te-device.yang' includes data that is
device-specific.</t>

<t>The document describes a high-level relationship between the modules defined in
this document, as well as other external protocol YANG modules.  The TE generic
YANG data model does not include any data specific to a signaling protocol.  It
is expected other data plane technology model(s) will augment the TE generic
YANG data model.</t>

<t>Also, it is expected other YANG modules that model TE signaling protocols,
such as RSVP-TE (<xref target="RFC3209"/>, <xref target="RFC3473"/>), or Segment-Routing TE (SR-TE) 
<xref target="RFC9256"/> will augment the generic TE YANG  module.</t>

</section>
<section anchor="terms-and-conventions"><name>Terms and Conventions</name>

<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The following terms are defined in <xref target="RFC6241"/> and are used in this specification:</t>

<t><list style="symbols">
  <t>client</t>
  <t>configuration data</t>
  <t>state data</t>
</list></t>

<t>This document also makes use of the following terminology introduced in the
YANG Data Modeling Language <xref target="RFC7950"/>:</t>

<t><list style="symbols">
  <t>augment</t>
  <t>data model</t>
  <t>data node</t>
</list></t>

</section>
<section anchor="prefixes-in-data-node-names"><name>Prefixes in Data Node Names</name>

<t>In this document, names of data nodes and other data model objects are prefixed
using the standard prefix associated with the corresponding YANG imported
modules, as shown in <xref target="tab1"/>.</t>

<texttable title="Prefixes and corresponding YANG modules" anchor="tab1">
      <ttcol align='left'>Prefix</ttcol>
      <ttcol align='left'>YANG module</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>yang</c>
      <c>ietf-yang-types</c>
      <c><xref target="RFC6991"/></c>
      <c>inet</c>
      <c>ietf-inet-types</c>
      <c><xref target="RFC6991"/></c>
      <c>rt-types</c>
      <c>ietf-routing-types</c>
      <c><xref target="RFC8294"/></c>
      <c>te-types</c>
      <c>ietf-te-types</c>
      <c><xref target="I-D.draft-ietf-teas-rfc8776-update"/></c>
      <c>te-packet-types</c>
      <c>ietf-te-packet-types</c>
      <c><xref target="I-D.draft-ietf-teas-rfc8776-update"/></c>
      <c>te</c>
      <c>ietf-te</c>
      <c>this document</c>
      <c>te-dev</c>
      <c>ietf-te-device</c>
      <c>this document</c>
</texttable>

</section>
<section anchor="model-tree-diagrams"><name>Model Tree Diagrams</name>

<t>The tree diagrams extracted from the module(s) defined in this document are given in
subsequent sections as per the syntax defined in <xref target="RFC8340"/>.</t>

</section>
</section>
<section anchor="design-considerations"><name>Design Considerations</name>

<t>This document describes a generic TE YANG data model that is independent of
any dataplane technology.  One of the design objectives is to allow specific
data plane technology models to reuse the TE generic data model and possibly
augment it with technology specific data.</t>

<t>The elements of the generic TE YANG data model, including TE Tunnels, LSPs, and
interfaces have leaf(s) that identify the technology layer where they reside.
For example, the LSP encoding type can identify the technology associated with a
TE Tunnel or LSP.</t>

<t>Also, the generic TE YANG data model does not cover signaling protocol data.
The signaling protocol used to instantiate TE LSPs are outside the scope of this
document and expected to be covered by augmentations defined in other document(s).</t>

<t>The following other design considerations are taken into account with respect to data
organization:</t>

<t><list style="symbols">
  <t>The generic TE YANG data model 'ietf-te' contains device independent data and
can be used to model data off a device (e.g. on a TE controller). When the
model is used to manage a specific device, the model contains the TE Tunnels
originating from the specific device.  When the model is used to manage a TE
controller, the 'tunnel' list contains all TE Tunnels and TE tunnel segments
originating from device(s) that the TE controller manages.</t>
  <t>The device-specific TE data is defined in module 'ietf-te-device' as
shown in <xref target="figctrl"/>.</t>
  <t>In general, minimal elements in the model are designated as "mandatory" to
allow freedom to vendors to adapt the data model to their specific product
implementation.</t>
  <t>Suitable defaults are specified for all configurable elements.</t>
  <t>The model declares a number of TE functions as features that can be
optionally supported.</t>
</list></t>

<section anchor="state-data-organization"><name>State Data Organization</name>

<t>The Network Management Datastore Architecture (NMDA) <xref target="RFC8342"/> addresses
modeling state data for ephemeral objects.  This document adopts the NMDA model
for configuration and state data representation as per IETF guidelines for new
IETF YANG models.</t>

</section>
</section>
<section anchor="model-overview"><name>Model Overview</name>

<t>The data models defined in this document cover the core TE features that are
commonly supported by different vendor implementations. The support of extended
or vendor specific TE feature(s) is expected to either be in augmentations, or
deviations to this model that are defined in separate documents.</t>

<section anchor="module-relationship"><name>Module Relationship</name>

<t>The generic TE YANG data model that is defined in "ietf-te.yang" covers the
building blocks that are device independent and agnostic of any specific
technology or control plane instances. The TE device model defined in
"ietf-te-device.yang" augments the generic TE YANG data model and covers data
that is specific to a device --  for example, attributes of TE interfaces, or
TE timers that are local to a TE node.</t>

<t>The TE data models for specific instances of data plane technology exist in
separate YANG modules that augment the generic TE YANG data model.  The TE
data models for specific instances of signaling protocols are outside the scope
of this document and are defined in other documents. For example, the RSVP-TE
YANG model augmentation of the TE model is covered in a separate document.</t>

<figure title="Relationship of TE module(s) with signaling protocol modules" anchor="figctrl"><artwork><![CDATA[
  TE generic     +---------+         o: augment
  module         | ietf-te |o-------------+
                 +---------+               \
                        o                   \
                        |\                   \
                        | \ TE device module  \
                        |  +----------------+  \
                        |  | ietf-te-device |   \
                        |  +----------------+    \
                        |       o                 \
                        |     /                    \
                        |   /                       \
                 +---------------+           +---------------+
  RSVP-TE module | ietf-rsvp-te^ |o .       | ietf-te-mpls^ |
                 +---------------+  \       +---------------+
                    |                \
                    |                 \
                    |                  \
                    |                   \
                    |                    \
                    o                 +-------------------+
                 +------------+       | ietf-rsvp-otn-te^ |
  RSVP module    | ietf-rsvp^ |       +-------------------+
                 +------------+          RSVP-TE with OTN
                                         extensions

                X---oY indicates that module X augments module Y
                ^ indicates a module defined in other documents
]]></artwork></figure>

</section>
</section>
<section anchor="te-yang-model"><name>TE YANG Model</name>

<t>The generic TE YANG module ('ietf-te') is meant for the management and
operation of a TE network. This includes creating, modifying and retrieving
information about TE Tunnels, LSPs, and interfaces and their associated
attributes (e.g.  Administrative-Groups, SRLGs, etc.).</t>

<t>A full tree diagram of the TE model is shown in the Appendix in
<xref target="fig-te-tree-full"/>.</t>

<section anchor="module-structure"><name>Module Structure</name>

<t>The 'te' container is the top level container in the 'ietf-te' module. The
presence of the 'te' container enables TE function system wide.  Below provides
further descriptions of containers that exist under the 'te' top level
container.</t>

<t>There are three further containers grouped under the 'te'
container as shown in <xref target="fig-highlevel"/> and described below.</t>

<t>globals:</t>

<ul empty="true"><li>
  <t>The 'globals' container maintains the set of global TE attributes that can be
applicable to TE Tunnels and interfaces.</t>
</li></ul>

<t>tunnels:</t>

<ul empty="true"><li>
  <t>The 'tunnels' container includes the list of TE Tunnels that are instantiated.
Refer to <xref target="TE_TUNNELS"/> for further details on the properties of a TE Tunnel.</t>
</li></ul>

<t>lsps:</t>

<ul empty="true"><li>
  <t>The 'lsps' container includes the list of TE LSP(s) that are instantiated for
TE Tunnels. Refer to <xref target="TE_LSPS"/> for further details on the properties of a TE LSP.</t>
</li></ul>

<t>The model also contains two Remote Procedure Calls (RPCs) as shown
in <xref target="fig-te-tree-full"/> and described below.</t>

<t>tunnels-path-compute:</t>

<ul empty="true"><li>
  <t>A RPC to request path computation for a specific TE Tunnel.
The RPC allows requesting path computation using atomic and stateless operation.
A tunnel may also be configured in 'compute-only' mode to provide stateful path updates
- see <xref target="TE_TUNNELS"/> for further details.</t>
</li></ul>

<t>tunnels-action:</t>

<ul empty="true"><li>
  <t>An RPC to request a specific action (e.g. reoptimize, or tear-and-setup) to be taken
on a specific tunnel or all tunnels.</t>
</li></ul>

<t><xref target="fig-te-tree-full"/> shows the relationships of these containers and RPCs within
the 'ietf-te' module.</t>

<figure title="TE Tunnel model high-level YANG tree view" anchor="fig-highlevel"><artwork><![CDATA[
module: ietf-te
  +--rw te!
     +--rw globals
     |     ...
     +--rw tunnels
     |     ...
     +--ro lsps
           ...

  rpcs:
    +---x tunnels-path-compute
    |  +---w input
    |  |     ...
    |  +--ro output
    |        ...
    +---x tunnels-actions
       +---w input
       |     ...
       +--ro output
             ...

]]></artwork></figure>

<section anchor="TeGlobals"><name>TE Globals</name>

<t>The 'globals' container covers properties that control a TE feature's
behavior system-wide, and its respective state as shown in <xref target="fig-globals"/>
and described in the text that follows.</t>

<figure title="TE globals YANG subtree high-level structure" anchor="fig-globals"><artwork><![CDATA[
     +--rw globals
     |  +--rw named-admin-groups
     |  |  +--rw named-admin-group* [name]
     |  |        ...
     |  +--rw named-srlgs
     |  |  +--rw named-srlg* [name]
     |  |        ...
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
]]></artwork></figure>

<t>named-admin-groups:</t>

<ul empty="true"><li>
  <t>A YANG container for the list of named (extended) administrative groups that may be applied
to TE links.</t>
</li></ul>

<t>named-srlgs:</t>

<ul empty="true"><li>
  <t>A YANG container for the list of named Shared Risk Link Groups (SRLGs) that may be
applied to TE links.</t>
</li></ul>

<t>named-path-constraints:</t>

<ul empty="true"><li>
  <t>A YANG container for a list of named path constraints. Each named path constraint is
composed of a set of constraints that can be applied during path computation.
A named path constraint can be applied to multiple TE Tunnels. Path constraints may also
be specified directly under the TE Tunnel. The path constraints specified under
the TE Tunnel take precedence over the path constraints 
derived from the referenced named path constraint. A named path constraint entry can be
formed of the path constraints shown in <xref target="fig-named-constraints"/>:</t>
</li></ul>

<figure title="Named path constraints YANG subtree" anchor="fig-named-constraints"><artwork><![CDATA[
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
     |             {te-types:named-path-constraints}?
     |        +--rw name                             string
     |        +--rw te-bandwidth
     |        |     ...
     |        +--rw link-protection?                 identityref
     |        +--rw setup-priority?                  uint8
     |        +--rw hold-priority?                   uint8
     |        +--rw signaling-type?                  identityref
     |        +--rw path-metric-bounds
     |        |     ...
     |        +--rw path-affinities-values
     |        |     ...
     |        +--rw path-affinity-names
     |        |     ...
     |        +--rw path-srlgs-lists
     |        |     ...
     |        +--rw path-srlgs-names
     |        |     ...
     |        +--rw disjointness?
     |        |       te-path-disjointness
     |        +--rw explicit-route-objects
     |        |     ...
     |        +--rw path-in-segment!
     |        |     ...
     |        +--rw path-out-segment!
     |              ...

]]></artwork></figure>

<ul empty="true"><li>
  <ul empty="true"><li>

    <t><list style="symbols">
      <t>name: A YANG leaf that holds the named path constraint entry. This is unique in the list
and used as a key.</t>
      <t>te-bandwidth: A YANG container that holds the technology agnostic TE bandwidth constraint.</t>
      <t>link-protection: A YANG leaf that holds the link protection type constraint required for the links to be included in the computed path.</t>
      <t>setup/hold priority: YANG leafs that hold the LSP setup and hold admission priority as defined in <xref target="RFC3209"/>.</t>
      <t>signaling-type: A YANG leaf that holds the LSP setup type, such as RSVP-TE or SR.</t>
      <t>path-metric-bounds: A YANG container that holds the set of metric bounds applicable on the
computed TE tunnel path.</t>
      <t>path-affinities-values: A YANG container that holds the set of affinity values and
mask to be used during path computation.</t>
      <t>path-affinity-names: A YANG container that holds the set of named affinity constraints and
corresponding inclusion or exclusion instructions for each to be used during path computation.</t>
      <t>path-srlgs-lists: A YANG container that holds the set of SRLG values and
corresponding inclusion or exclusion instructions to be used during path computation.</t>
      <t>path-srlgs-names: A YANG container that holds the set of named SRLG constraints and
corresponding inclusion or exclusion instructions for each to be used during path computation.</t>
      <t>disjointness: The level of resource disjointness constraint that the secondary path
of a TE tunnel has to adhere to.</t>
      <t>explicit-route-objects: A YANG container that holds path constraints in the form of route entries present in following two lists:      <list style="symbols">
          <t>'route-object-exclude-always': a list of route entries that are always excluded from the path computation. The exclusion of a route entry in this list
during path computation is not order sensitive.</t>
          <t>'route-object-include-exclude': a list of route entries to include or exclude route entry constraints for the path computation. The constraint type (include or exclude)
is specified with each route entry. The path computation considers route entry constraints in the order they appear in this list. Once a route entry
constraint is consumed from this list, it is not considered any further in the computation of the path.</t>
        </list></t>
    </list></t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>The 'route-object-include-exclude' is used to configure constraints on which route objects (e.g., nodes, links) are included or excluded in the path computation.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>The interpretation of an empty 'route-object-include-exclude' list depends on the TE Tunnel (end-to-end or Tunnel Segment) and on the specific path, according to the following rules:</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>

      <t><list style="numbers">
        <t>An empty 'route-object-include-exclude' list for the primary path of an end-to-end TE Tunnel indicates that there are no route objects to be included or excluded in the path computation.</t>
        <t>An empty 'route-object-include-exclude' list for the primary path of a TE Tunnel Segment indicates that no primary LSP is required for that TE Tunnel.</t>
        <t>An empty 'route-object-include-exclude' list for a reverse path means it always follows the forward path (i.e., the TE Tunnel is co-routed). When the 'route-object-include-exclude' list is not empty, the reverse path is routed independently of the forward path.</t>
        <t>An empty 'route-object-include-exclude' list for the secondary (forward) path indicates that the secondary path has the same endpoints as the primary path.</t>
      </list></t>
    </li></ul>

    <t><list style="symbols">
      <t>path-in-segment: A YANG container that contains a list of label restrictions
that have to be taken into considerations when crossing domains. This TE
tunnel segment in this case is being stitched to the upstream TE tunnel segment.</t>
      <t>path-out-segment: A YANG container that contains a list of label restrictions
that have to be taken into considerations when crossing domains. The TE
tunnel segment in this case is being stitched to the downstream TE tunnel segment.</t>
    </list></t>
  </li></ul>
</li></ul>

</section>
<section anchor="TE_TUNNELS"><name>TE Tunnels</name>

<t>The 'tunnels' container holds the list of TE Tunnels that are provisioned on
ingress LER devices in the network as shown in <xref target="fig-te-tunnel"/>.</t>

<figure title="TE Tunnel YANG subtree structure" anchor="fig-te-tunnel"><artwork><![CDATA[
module: ietf-te
  +--rw te
     +--rw tunnels
        +--rw tunnel* [name]
           +--rw name                            string
           +--rw alias?                          string
           +--rw identifier?                     uint32
           +--rw color?                          uint32
           +--rw description?                    string
           +--rw admin-state?                    identityref
           +--ro operational-state?              identityref
           +--rw encoding?                       identityref
           +--rw switching-type?                 identityref
           +--rw source
           |     ...
           +--rw destination
           |     ...
           +--rw bidirectional?                  boolean
           +--rw controller
           |     ...
           +--rw reoptimize-timer?               uint16
           +--rw association-objects
           |     ...
           +--rw protection
           |     ...
           +--rw restoration
           |     ...
           +--rw network-id?                     nw:network-id
           +--rw te-topology-identifier
           |     ...
           +--rw te-bandwidth
           |     ...
           +--rw link-protection?                identityref
           +--rw setup-priority?                 uint8
           +--rw hold-priority?                  uint8
           +--rw signaling-type?                 identityref
           +--rw hierarchy
           |     ...
           +--rw primary-paths
           |     ...
           +--rw secondary-paths
           |     ...
           +--rw secondary-reverse-paths
           |     ...
           +---x tunnel-action
           |     ...
           +---x protection-external-commands
                 ...

]]></artwork></figure>

<t>When the model is used to manage a specific device, the 'tunnel' list contains
the TE Tunnels originating from the specific device. When the model is used to
manage a TE controller, the 'tunnel' list contains all TE Tunnels and TE
tunnel segments originating from device(s) that the TE controller manages.</t>

<t>The TE Tunnel model allows the configuration and management of the following TE
tunnel objects:</t>

<t>TE Tunnel:</t>

<ul empty="true"><li>
  <t>A YANG container of one or more TE LSPs established between the source and destination
TE Tunnel termination points.</t>
</li></ul>

<t>TE Path:</t>

<ul empty="true"><li>
  <t>An engineered path that once instantiated in the forwarding plane can be used
to forward traffic from the source to the destination TE Tunnel termination points.</t>
</li></ul>

<t>TE LSP:</t>

<ul empty="true"><li>
  <t>A TE LSP is a connection-oriented service established over a TE Path
and that allows the delivery of traffic between the TE Tunnel source and
destination termination points.</t>
</li></ul>

<t>TE Tunnel Segment:</t>

<ul empty="true"><li>
  <t>A part of a multi-domain TE Tunnel that is within a specific network domain.</t>
</li></ul>

<t>The TE Tunnel has a number of attributes that are set directly under the
tunnel (as shown in <xref target="fig-te-tunnel"/>). The main attributes of a TE Tunnel are described below:</t>

<t>operational-state:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the operational state of the tunnel.</t>
</li></ul>

<t>name:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the name of a TE Tunnel.  The name of the
TE Tunnel uniquely identifies the tunnel within the TE tunnel list.  The name
of the TE Tunnel can be formatted as a Uniform Resource Indicator (URI) by
including the namespace to ensure uniqueness of the name amongst all the TE
Tunnels present on devices and controllers. The configured TE Tunnels can
be reported with the name of the device embedded within the TE Tunnel name.
For initiated TE Tunnels from the controller, the controller is responsible
to ensures that TE Tunnel names are unique.</t>
</li></ul>

<t>alias:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds an alternate name to the TE tunnel. Unlike the TE tunnel
name, the alias can be modified at any time during the lifetime of the TE tunnel.</t>
</li></ul>

<t>identifier:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds an identifier of the tunnel. This identifier is unique amongst tunnels
originated from the same ingress device.</t>
</li></ul>

<t>color:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the color associated with the TE tunnel. The color is used
to map or steer services that carry matching color on to the TE tunnel as described in
<xref target="RFC9012"/>.</t>
</li></ul>

<t>admin-state:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the tunnel administrative state. The administrative
status in state datastore transitions to 'tunnel-admin-up' when the tunnel used
by the client layer, and to 'tunnel-admin-down' when it is not used by the
client layer.</t>
</li></ul>

<t>operational-state:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the tunnel operational state.</t>
</li></ul>

<t>encoding/switching:</t>

<ul empty="true"><li>
  <t>The 'encoding' and 'switching-type' are YANG leafs that define the specific
technology in which the tunnel operates in as described in <xref target="RFC3945"/>.</t>
</li></ul>

<t>source/destination:</t>

<ul empty="true"><li>
  <t>YANG containers that hold the tunnel source and destination node endpoints identities, including:</t>
</li></ul>

<ul empty="true"><li>
  <t><list style="symbols">
    <t>te-node-id: A YANG leaf that holds the identifier of the source or destination of the TE Tunnel
TE node identifiers as defined in <xref target="I-D.draft-ietf-teas-rfc8776-update"/>.</t>
    <t>node-id: A YANG leaf that holds the identifier of the source or destination of the TE Tunnel
node identifiers as defined in <xref target="RFC8345"/>.</t>
    <t>tunnel-tp-id: A YANG leaf that holds the identifier of the source or destination of the TE Tunnel
Termination Points (TTPs) as defined in <xref target="RFC8795"/>. The TTP identifiers are optional
on nodes that have a single TTP per node. For example, TTP identifiers are optional for packet
(IP/MPLS) routers.</t>
  </list></t>
</li></ul>

<t>bidirectional:</t>

<ul empty="true"><li>
  <t>A YANG leaf that when present indicates the LSP of a TE Tunnel is bidirectional
as defined in <xref target="rfc3473"/>.</t>
</li></ul>

<t>controller:</t>

<ul empty="true"><li>
  <t>A YANG container that holds tunnel data relevant to an optional external TE controller that
may initiate or control a tunnel. This target node may be augmented by external module(s), for example, to add data for PCEP initiated and/or
delegated tunnels.</t>
</li></ul>

<t>reoptimize-timer:</t>

<ul empty="true"><li>
  <t>A YANG leaf to set the interval period for tunnel reoptimization.</t>
</li></ul>

<t>association-objects:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the set of associations of the TE Tunnel to other
TE Tunnels. Associations at the TE Tunnel level apply to all paths of the TE
Tunnel. The TE tunnel associations can be overridden by associations
configured directly under the TE Tunnel path.</t>
</li></ul>

<t>protection:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the TE Tunnel protection properties.</t>
</li></ul>

<t>restoration:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the TE Tunnel restoration properties.</t>
</li></ul>

<t>te-topology-identifier:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the topology identifier associated with the topology where paths for the TE tunnel are computed as defined in <xref target="RFC8795"/>.</t>
</li></ul>

<t>network-id:</t>

<ul empty="true"><li>
  <t>A YANG leaf that can optionally be used to identify the network topology where paths for the TE tunnel are computed as defined in <xref target="RFC8345"/>.</t>
</li></ul>

<t>hierarchy:</t>

<ul empty="true"><li>
  <t>A YANG container that holds hierarchy related properties of the TE Tunnel. A TE LSP
  can be set up in MPLS or Generalized MPLS (GMPLS) networks to be used as
  a TE link to carry traffic in other (client) networks <xref target="RFC6107"/>.  In this
  case, the model introduces the TE Tunnel hierarchical link endpoint parameters
  to identify the specific link in the client layer that the underlying TE Tunnel is
  associated with. The hierarchy container includes the following:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>

    <t><list style="symbols">
      <t>dependency-tunnels: A set of hierarchical TE Tunnels provisioned or to be
provisioned in the immediate lower layer that this TE tunnel depends on for
multi-layer path computation. A dependency TE Tunnel is provisioned if and
only if it is used (selected by path computation) at least by one client
layer TE Tunnel. The TE link in the client layer network topology supported
by a dependent TE Tunnel is dynamically created only when the dependency TE
Tunnel is actually provisioned.</t>
      <t>hierarchical-link: A YANG container that holds the identity of the
hierarchical link (in the client layer) that is supported by this TE Tunnel.
The endpoints of the hierarchical link are defined by TE tunnel source and
destination node endpoints. The hierarchical link can be identified by its source
and destination link termination point identifiers.</t>
    </list></t>
  </li></ul>
</li></ul>

<t>primary-paths:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the list of primary paths.
A primary path is identified by 'name'. A primary path is selected from the list
to instantiate a primary forwarding LSP for the tunnel.  The list of primary
paths is visited by order of preference. A primary path has the following
attributes:</t>
</li></ul>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>primary-reverse-path: A YANG container that holds properties of the
primary reverse path. The reverse path is applicable to
bidirectional TE Tunnels.</t>
  </list></t>
</li></ul>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>candidate-secondary-paths: A YANG container that holds a list of candidate
secondary paths which may be used for the primary path to support path
protection. The candidate secondary path(s) reference path(s)  from the
tunnel secondary paths list.  The preference of the secondary paths is
specified within the list and dictates the order of visiting the secondary
path from the list. The attributes of a secondary path can be defined
separately from the primary path. The attributes of a secondary path will be
inherited from the associated 'active' primary when not explicitly defined
for the secondary path.</t>
  </list></t>
</li></ul>

<ul empty="true"><li>

</li></ul>

<t>secondary-paths:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the set of secondary paths. A secondary path is
 identified by 'name'. A secondary path can be referenced from the TE Tunnel's
'candidate-secondary-path' list.</t>
</li></ul>

<t>secondary-reverse-paths:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the set of secondary reverse paths. A secondary reverse
path is identified by 'name'. A secondary reverse path can be referenced from the
TE Tunnel's 'candidate-secondary-reverse-paths' list. A secondary reverse path contains
attributes similar to a primary path.</t>
</li></ul>

<t>The following set of common path attributes are shared for primary (forward and reverse) and secondary paths:</t>

<t>path-computation-method:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the method used for computing the TE path.</t>
</li></ul>

<t>path-computation-server:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the path computation server properties when the path is
 externally queried.</t>
</li></ul>

<t>compute-only:</t>

<ul empty="true"><li>
  <t>A path of a TE Tunnel is, by default, provisioned so that it can be instantiated
  in the forwarding plane so that it can carry traffic as soon as a valid path
  is computed. In some cases, a TE path may be configured only for the
  purpose of computing a path and reporting it without the need to instantiate
  the LSP or commit any resources. In such a case, the path is configured in
  'compute-only' mode to distinguish it from the default behavior. A
  'compute-only' path is configured as a usual with the associated per path
  constraint(s) and properties on a device or TE controller. The device or TE
  controller computes the feasible path(s) subject to configured constraints.
  A client may query the 'compute-only' computed path properties 'on-demand',
  or alternatively, can subscribe to be notified of computed path(s) and
  whenever the path properties change.</t>
</li></ul>

<t>use-path-computation:</t>

<ul empty="true"><li>
  <t>A YANG leaf that indicates whether or not path computation is to
  be used for a specified path.</t>
</li></ul>

<t>lockdown:</t>

<ul empty="true"><li>
  <t>A YANG leaf that when set indicates the existing path should not be reoptimized
  after a failure on any of its traversed links.</t>
</li></ul>

<t>path-scope:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the path scope if segment or an end-to-end path.</t>
</li></ul>

<t>preference:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the preference for the path. The lower the number
 higher the preference.</t>
</li></ul>

<t>k-requested-paths:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the number of k-shortest-paths requested from the path
computation server and returned sorted by its optimization
objective.</t>
</li></ul>

<t>association-objects:</t>

<ul empty="true"><li>
  <t>A YANG container that holds a list of tunnel association properties.</t>
</li></ul>

<t>optimizations:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the optimization objectives
  that path computation will use to select a path.</t>
</li></ul>

<t>named-path-constraint:</t>

<ul empty="true"><li>
  <t>A YANG leafref that references an entry from the global list of named path constraints.</t>
</li></ul>

<t>te-bandwidth:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the path bandwidth (see <xref target="I-D.draft-ietf-teas-rfc8776-update"/>).</t>
</li></ul>

<t>link-protection:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the link protection type required for the links to
be included the computed path (see <xref target="I-D.draft-ietf-teas-rfc8776-update"/>).</t>
</li></ul>

<t>setup/hold-priority:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>signaling-type:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. This value overrides
the provided one in the referenced named-path-constraint.</t>
</li></ul>

<t>path-metric-bounds:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-affinities-values:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-affinity-names:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-srlgs-lists:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-srlgs-names:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>disjointness:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>explicit-route-objects:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-in-segment:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-out-segment:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>computed-paths-properties:</t>

<ul empty="true"><li>
  <t>A YANG container that holds properties for the list of computed paths.</t>
</li></ul>

<t>computed-path-error-infos:</t>

<ul empty="true"><li>
  <t>A YANG container that holds a list of errors related to the path.</t>
</li></ul>

<t>lsp-provisioning-error-infos:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the list of LSP provisioning error information. The
TE system populates entries in this list whenever an error is encountered during the LSP provisioning.</t>
</li></ul>

<t>computed-path-error-infos:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the list of path computation error information. The
TE system populates entries in this list whenever an error is encountered during the compuation of the TE path.</t>
</li></ul>

<t>path-compute-info:</t>

<ul empty="true"><li>
  <t>A YANG grouping that contains leafs representing the path attributes that are passed to the TE path computation engine
to be considered during the path computation. This includes:</t>

  <t><list style="symbols">
    <t>path constraints,</t>
    <t>path optimization objectives, and</t>
    <t>path assocociations</t>
  </list></t>

  <t>Note, unless overriden under a specific path of the TE tunnel, the TE tunnel's primary path constraints, optimization objectives, and associations are inherited by the primary reverse path, secondary path and secondary reverse path.</t>
</li></ul>

<t>lsps:</t>

<ul empty="true"><li>
  <t>A YANG container that holds a list of LSPs that have been instantiated for this specific path.</t>
</li></ul>

<t>In addition to the path common attributes, the primary path has the following
attributes that are not present in the secondary path:</t>

<t><list style="symbols">
  <t>Only the primary path contains the list of 'candidate-secondary-paths' that
can protect the primary path.</t>
  <t>Only the primary path can contain a primary-reverse-path associated with the
primary path (and its associated list of
'candidate-secondary-reverse-path').</t>
</list></t>

</section>
<section anchor="TE_LSPS"><name>TE LSPs</name>

<t>The 'lsps' container includes the set of TE LSP(s) that have been instantiated.
A TE LSP is identified by a 3-tuple ('tunnel-name', 'lsp-id', 'node').</t>

<t>When the model is used to manage a specific device, the 'lsps' list contains all TE
LSP(s) that traverse the device (including ingressing, transiting and egressing the device).</t>

<t>When the model is used to manage a TE controller, the 'lsps' list
contains the TE LSP(s) on devices managed by the controller that act as ingress, and may optionally include
TE LSPs on devices managed by the controller that act as transit or egress role.</t>

</section>
</section>
<section anchor="tree-diagram"><name>Tree Diagram</name>

<t><xref target="fig-te-tree"/> shows the tree diagram of depth=4 for the generic TE YANG model defined in
modules 'ietf-te.yang'. The full tree diagram is shown in <xref target="AppendixB"/>.</t>

<figure title="Tree diagram of depth-4 of TE Tunnel YANG data model" anchor="fig-te-tree"><artwork><![CDATA[
module: ietf-te
  +--rw te
     +--rw enable?    boolean
     +--rw globals
     |  +--rw named-admin-groups
     |  |  +--rw named-admin-group* [name]
     |  |          {te-types:extended-admin-groups,
     |  |           te-types:named-extended-admin-groups}?
     |  |        ...
     |  +--rw named-srlgs
     |  |  +--rw named-srlg* [name] {te-types:named-srlg-groups}?
     |  |        ...
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
     |             {te-types:named-path-constraints}?
     |           ...
     +--rw tunnels
     |  +--rw tunnel* [name]
     |     +--rw name                            string
     |     +--rw alias?                          string
     |     +--rw identifier?                     uint32
     |     +--rw color?                          uint32
     |     +--rw description?                    string
     |     +--rw admin-state?                    identityref
     |     +--ro operational-state?              identityref
     |     +--rw encoding?                       identityref
     |     +--rw switching-type?                 identityref
     |     +--rw source
     |     |     ...
     |     +--rw destination
     |     |     ...
     |     +--rw bidirectional?                  boolean
     |     +--rw controller
     |     |     ...
     |     +--rw reoptimize-timer?               uint16
     |     +--rw association-objects
     |     |     ...
     |     +--rw protection
     |     |     ...
     |     +--rw restoration
     |     |     ...
     |     +--rw network-id?                     nw:network-id
     |     +--rw te-topology-identifier
     |     |     ...
     |     +--rw te-bandwidth
     |     |     ...
     |     +--rw link-protection?                identityref
     |     +--rw setup-priority?                 uint8
     |     +--rw hold-priority?                  uint8
     |     +--rw signaling-type?                 identityref
     |     +--rw hierarchy
     |     |     ...
     |     +--rw primary-paths
     |     |     ...
     |     +--rw secondary-paths
     |     |     ...
     |     +--rw secondary-reverse-paths
     |     |     ...
     |     +---x tunnel-action
     |     |     ...
     |     +---x protection-external-commands
     |           ...
     +--ro lsps
        +--ro lsp* [tunnel-name lsp-id node]
           +--ro tunnel-name                         string
           +--ro lsp-id                              uint16
           +--ro node
           |       te-types:te-node-id
           +--ro source?
           |       te-types:te-node-id
           +--ro destination?
           |       te-types:te-node-id
           +--ro tunnel-id?                          uint16
           +--ro extended-tunnel-id?
           |       yang:dotted-quad
           +--ro operational-state?                  identityref
           +--ro signaling-type?                     identityref
           +--ro origin-type?                        enumeration
           +--ro lsp-resource-status?                enumeration
           +--ro lockout-of-normal?                  boolean
           +--ro freeze?                             boolean
           +--ro lsp-protection-role?                enumeration
           +--ro lsp-protection-state?               identityref
           +--ro protection-group-ingress-node-id?
           |       te-types:te-node-id
           +--ro protection-group-egress-node-id?
           |       te-types:te-node-id
           +--ro lsp-actual-route-information
                 ...

  rpcs:
    +---x tunnels-path-compute
    |  +---w input
    |  |  +---w path-compute-info
    |  +--ro output
    |     +--ro path-compute-result
    +---x tunnels-actions
       +---w input
       |  +---w tunnel-info
       |  |  +---w (filter-type)
       |  |        ...
       |  +---w action-info
       |     +---w action?       identityref
       |     +---w disruptive?   empty
       +--ro output
          +--ro action-result?   identityref

]]></artwork></figure>

</section>
<section anchor="yang-module"><name>YANG Module</name>

<t>The generic TE YANG module 'ietf-te' imports the following modules:</t>

<t><list style="symbols">
  <t>ietf-te-types defined in <xref target="I-D.draft-ietf-teas-rfc8776-update"/></t>
  <t>ietf-yang-types and ietf-inet-types defined in <xref target="RFC6991"/></t>
  <t>ietf-network and ietf-network-topology defined in <xref target="RFC8345"/></t>
</list></t>

<t>This module references the following documents:
<xref target="RFC4206"/>, <xref target="RFC4427"/>,
<xref target="RFC4872"/>, <xref target="RFC3209"/>, <xref target="RFC6780"/>,
<xref target="RFC7471"/>, <xref target="RFC9012"/>, <xref target="RFC8570"/>,
<xref target="RFC8232"/>, <xref target="RFC7271"/>, <xref target="RFC8234"/>, <xref target="RFC7308"/>, and <xref target="ITU_G.808.1"/>.</t>

<figure title="TE Tunnel data model YANG module" anchor="fig-basic-te"><artwork><![CDATA[
<CODE BEGINS> file "ietf-te@2024-01-10.yang"
module ietf-te {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-te";

  /* Replace with IANA when assigned */

  prefix te;

  /* Import TE generic types */

  import ietf-te-types {
    prefix te-types;
    reference
      "draft-ietf-teas-rfc8776-update: Common YANG Data Types
       for Traffic Engineering.";
  }
  import ietf-yang-types {
    prefix yang;
    reference
      "RFC6991: Common YANG Data Types.";
  }

  import ietf-network {
    prefix "nw";
    reference "RFC 8345: A YANG Data Model for Network Topologies";
  }

  import ietf-network-topology {
    prefix "nt";
    reference "RFC 8345: A YANG Data Model for Network Topologies";
  }

  organization
    "IETF Traffic Engineering Architecture and Signaling (TEAS)
     Working Group.";
  contact
    "WG Web:   <https://tools.ietf.org/wg/teas/>
     WG List:  <mailto:teas@ietf.org>

     Editor:   Tarek Saad
               <mailto:tsaad.net@gmail.com>

     Editor:   Rakesh Gandhi
               <mailto:rgandhi@cisco.com>

     Editor:   Vishnu Pavan Beeram
               <mailto:vbeeram@juniper.net>

     Editor:   Himanshu Shah
               <mailto:hshah@ciena.com>

     Editor:   Xufeng Liu
               <mailto: xufeng.liu.ietf@gmail.com>

     Editor:   Igor Bryskin
               <mailto:i_bryskin@yahoo.com>

     Editor:   Oscar Gonzalez de Dios
               <mailto: oscar.gonzalezdedios@telefonica.com>";

  description
    "YANG data module for TE configuration, state, and RPCs.
     The model fully conforms to the Network Management
     Datastore Architecture (NMDA).

     Copyright (c) 2023 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
     for full legal notices.";

  // RFC Ed.: replace XXXX with actual RFC number and remove this
  // note.
  // RFC Ed.: update the date below with the date of RFC publication
  // and remove this note.

  revision 2024-02-02 {
    description
      "Initial revision for the TE generic YANG module.";
    reference
      "RFCXXXX: A YANG Data Model for Traffic Engineering Tunnels
       and Interfaces.";
  }

  typedef tunnel-ref {
    type leafref {
      path "/te:te/te:tunnels/te:tunnel/te:name";
      require-instance false;
    }
    description
      "This type is used by data models that need to reference
       configured TE tunnel.";
  }

  /**
   * TE tunnel generic groupings
   */

  grouping path-common-properties {
    description
      "Common path attributes.";
    leaf name {
      type string;
      description
        "TE path name.";
    }
    leaf path-computation-method {
      type identityref {
        base te-types:path-computation-method;
      }
      default "te-types:path-locally-computed";
      description
        "The method used for computing the path, either
         locally computed, queried from a server or not
         computed at all (explicitly configured).";
    }
    container path-computation-server {
      when "derived-from-or-self(../path-computation-method, "
         + "'te-types:path-externally-queried')" {
        description
          "The path-computation server when the path is
           externally queried.";
      }
      uses te-types:te-generic-node-id;
      description
        "Address of the external path computation
         server.";
    }
    leaf compute-only {
      type empty;
      description
        "When present, the path is computed and updated whenever
         the topology is updated. No resources are committed
         or reserved in the network.";
    }
    leaf use-path-computation {
      when "derived-from-or-self(../path-computation-method, "
         + "'te-types:path-locally-computed')";
      type boolean;
      default "true";
      description
        "When 'true' indicates the path is dynamically computed
         and/or validated against the Traffic-Engineering Database
         (TED), and when 'false' indicates no path expansion or
         validation against the TED is required.";
    }
    leaf lockdown {
      type empty;
      description
        "When present, indicates no reoptimization to be attempted
         for this path.";
    }
    leaf path-scope {
      type identityref {
        base te-types:path-scope-type;
      }
      default "te-types:path-scope-end-to-end";
      config false;
      description
        "Indicates whether the path is a segment or portion of
         of the full path., or is the an end-to-end path for
         the TE Tunnel.";
    }
  }

  /* This grouping is re-used in path-computation rpc */
  grouping path-compute-info {
    description
      "Attributes used for path computation request.";
    uses tunnel-associations-properties;
    uses te-types:generic-path-optimization;
    leaf named-path-constraint {
      if-feature "te-types:named-path-constraints";
      type leafref {
        path "/te:te/te:globals/te:named-path-constraints/"
           + "te:named-path-constraint/te:name";
      }
      description
        "Reference to a globally defined named path constraint set.";
    }
    uses path-constraints-common;
  }

  /* This grouping is re-used in path-computation rpc */
  grouping path-forward-properties {
    description
      "The path preference.";
    leaf preference {
      type uint8 {
        range "1..255";
      }
      default "1";
      description
        "Specifies a preference for this path. The lower the number
         higher the preference.";
    }
    leaf co-routed {
      when "/te:te/te:tunnels/te:tunnel/te:bidirectional = 'true'" {
        description
          "Applicable to bidirectional tunnels only.";
      }
      type boolean;
      default "false";
      description
        "Indicates whether the reverse path must to be co-routed
         with the primary.";
    }
  }

  /* This grouping is re-used in path-computation rpc */
  grouping k-requested-paths {
    description
      "The k-shortest paths requests.";
    leaf k-requested-paths {
      type uint8;
      default "1";
      description
        "The number of k-shortest-paths requested from the path
         computation server and returned sorted by its optimization
         objective.";
    }
  }

  grouping path-state {
    description
      "TE per path state parameters.";
    uses path-computation-response;
    container lsp-provisioning-error-infos {
      config false;
      description
        "LSP provisioning error information.";
      list lsp-provisioning-error-info {
        description
          "List of LSP provisioning error info entries.";
        leaf error-reason {
          type identityref {
            base te-types:lsp-provisioning-error-reason;
          }
          description
            "LSP provision error type.";
        }
        leaf error-description {
          type string;
          description
            "The textual representation of the error occurred during
             path computation.";
        }
        leaf error-timestamp {
          type yang:date-and-time;
          description
            "Timestamp of when the reported error occurred.";
        }
        leaf error-node-id {
          type te-types:te-node-id;
          description
            "Node identifier of node where error occurred.";
        }
        leaf error-link-id {
          type te-types:te-tp-id;
          description
            "Link ID where the error occurred.";
        }
        leaf lsp-id {
          type uint16;
          description
            "The LSP-ID for which path computation was performed.";
        }
      }
    }
    container lsps {
      config false;
      description
        "The TE LSPs container.";
      list lsp {
        key "node lsp-id";
        description
          "List of LSPs associated with the tunnel.";
        leaf tunnel-name {
          type leafref {
            path "/te:te/te:lsps/te:lsp/te:tunnel-name";
          }
          description "TE tunnel name.";
        }
        leaf node {
          type leafref {
            path "/te:te/te:lsps/te:lsp[tunnel-name="
               + "current()/../te:tunnel-name][lsp-id="
               + "current()/../te:lsp-id]/te:node";
          }
          description "The node where the LSP state resides on.";
        }
        leaf lsp-id {
          type leafref {
            path "/te:te/te:lsps/te:lsp[tunnel-name="
               + "current()/../tunnel-name]/te:lsp-id";
          }
          description "The TE LSP identifier.";
        }
      }
    }
  }

  /* This grouping is re-used in path-computation rpc */
  grouping path-computation-response {
    description
      "Attributes reported by path computation response.";
    container computed-paths-properties {
      config false;
      description
        "Computed path properties container.";
      list computed-path-properties {
        key "k-index";
        description
          "List of computed paths.";
        leaf k-index {
          type uint8;
          description
            "The k-th path returned from the computation server.
             A lower k value path is more optimal than higher k
             value path(s)";
        }
        uses te-types:generic-path-properties {
          augment "path-properties" {
            description
              "additional path properties returned by path
               computation.";
            uses te-types:te-bandwidth;
            leaf disjointness-type {
              type te-types:te-path-disjointness;
              config false;
              description
                "The type of resource disjointness.
                 When reported for a primary path, it represents the
                 minimum level of disjointness of all the secondary
                 paths. When reported for a secondary path, it
                 represents the disjointness of the secondary path.";
            }
          }
        }
      }
    }
    container computed-path-error-infos {
      config false;
      description
        "Path computation information container.";
      list computed-path-error-info {
        description
          "List of path computation info entries.";
        leaf error-description {
          type string;
          description
            "Textual representation of the error that occurred
             during path computation.";
        }
        leaf error-timestamp {
          type yang:date-and-time;
          description
            "Timestamp of last path computation attempt.";
        }
        leaf error-reason {
          type identityref {
            base te-types:path-computation-error-reason;
          }
          description
            "Reason for the path computation error.";
        }
      }
    }
  }

  grouping protection-restoration-properties {
    description
      "Protection and restoration parameters.";
    container protection {
      description
        "Protection parameters.";
      leaf protection-type {
        type identityref {
          base te-types:lsp-protection-type;
        }
        default "te-types:lsp-protection-unprotected";
        description
          "LSP protection type.";
      }
      leaf protection-reversion-disable {
        type boolean;
        default "false";
        description
          "Disable protection reversion to working path.";
      }
      leaf hold-off-time {
        type uint32;
        units "milli-seconds";
        description
          "The time between the declaration of an SF or SD condition
           and the initialization of the protection switching
           algorithm.";
        reference
          "RFC4427";
      }
      leaf wait-to-revert {
        type uint16;
        units "seconds";
        description
          "Time to wait before attempting LSP reversion.";
        reference
          "RFC4427";
      }
      leaf aps-signal-id {
        type uint8 {
          range "1..255";
        }
        default "1";
        description
          "The APS signal number used to reference the traffic of
           this tunnel. The default value for normal traffic is 1.
           The default value for extra-traffic is 255. If not
           specified, non-default values can be assigned by the
           server, if and only if, the server controls both
            endpoints.";
        reference
          "ITU_G.808.1";
      }
    }
    container restoration {
      description
        "Restoration parameters.";
      leaf restoration-type {
        type identityref {
          base te-types:lsp-restoration-type;
        }
        description
          "LSP restoration type.";
      }
      leaf restoration-scheme {
        type identityref {
          base te-types:restoration-scheme-type;
        }
        description
          "LSP restoration scheme.";
      }
      leaf restoration-reversion-disable {
        type boolean;
        default "false";
        description
          "Disable restoration reversion to working path.";
      }
      leaf hold-off-time {
        type uint32;
        units "milli-seconds";
        description
          "The time between the declaration of an SF or SD condition
           and the initialization of the protection switching
           algorithm.";
        reference
          "RFC4427";
      }
      leaf wait-to-restore {
        type uint16;
        units "seconds";
        description
          "Time to wait before attempting LSP restoration.";
        reference
          "RFC4427";
      }
      leaf wait-to-revert {
        type uint16;
        units "seconds";
        description
          "Time to wait before attempting LSP reversion.";
        reference
          "RFC4427";
      }
    }
  }

  grouping tunnel-associations-properties {
    description
      "TE tunnel association grouping.";
    container association-objects {
      description
        "TE tunnel associations.";
      list association-object {
        key "association-key";
        unique "type id source/id source/type";
        description
          "List of association base objects.";
        reference
          "RFC4872";
        leaf association-key {
          type string;
          description
            "Association key used to identify a specific
             association in the list";
        }
        leaf type {
          type identityref {
            base te-types:association-type;
          }
          description
            "Association type.";
          reference
            "RFC4872";
        }
        leaf id {
          type uint16;
          description
            "Association identifier.";
          reference
            "RFC4872";
        }
        container source {
          uses te-types:te-generic-node-id;
          description
            "Association source.";
          reference
            "RFC4872";
        }
      }
      list association-object-extended {
        key "association-key";
        unique
          "type id source/id source/type global-source extended-id";
        description
          "List of extended association objects.";
        reference
          "RFC6780";
        leaf association-key {
          type string;
          description
            "Association key used to identify a specific
             association in the list";
        }
        leaf type {
          type identityref {
            base te-types:association-type;
          }
          description
            "Association type.";
          reference
            "RFC4872, RFC6780";
        }
        leaf id {
          type uint16;
          description
            "Association identifier.";
          reference
            "RFC4872, RFC6780";
        }
        container source {
          uses te-types:te-generic-node-id;
          description
            "Association source.";
          reference
            "RFC4872, RFC6780";
        }
        leaf global-source {
          type uint32;
          description
            "Association global source.";
          reference
            "RFC6780";
        }
        leaf extended-id {
          type yang:hex-string;
          description
            "Association extended identifier.";
          reference
            "RFC6780";
        }
      }
    }
  }

  grouping tunnel-end-point {
    description
      "Common grouping used to specify the tunnel source and 
      destination end-points.";
    leaf node-id {
      type nw:node-id;
      description
        "The TE tunnel end-point node identifier";
    }
    leaf te-node-id {
      type te-types:te-node-id;
      description
        "The TE tunnel end-point TE node identifier";
    }
    leaf tunnel-tp-id {
      when "../node-id or ../te-node-id" {
        description
          "The TE tunnel termination point identifier is local to 
          a node";
      }
      type binary;
      description
        "The TE tunnel end-point TE tunnel termination point 
        identifier";
    }
  }

  /* This grouping is re-used in path-computation rpc */
  grouping tunnel-common-attributes {
    description
      "Common grouping to define the TE tunnel parameters";
    container source {
      description
        "TE tunnel source end-point.";
      uses tunnel-end-point;
    }
    container destination {
      description
        "TE tunnel destination end-point.";
      uses tunnel-end-point;
    }
    leaf bidirectional {
      type boolean;
      default "false";
      description
        "Indicates a bidirectional tunnel";
    }
  }

  /* This grouping is re-used in path-computation rpc */
  grouping tunnel-hierarchy-properties {
    description
      "A grouping for TE tunnel hierarchy information.";
    container hierarchy {
      description
        "Container for TE hierarchy related information.";
      container dependency-tunnels {
        description
          "List of tunnels that this tunnel can be potentially
           dependent on.";
        list dependency-tunnel {
          key "name";
          description
            "A tunnel entry that this tunnel can potentially depend
             on.";
          leaf name {
            type tunnel-ref;
            description
              "Dependency tunnel name. The tunnel may not have been
               instantiated yet.";
          }
          uses te-types:encoding-and-switching-type;
        }
      }
      container hierarchical-link {
        description
          "Identifies a hierarchical link (in client layer)
           that this tunnel is associated with. By default, the
           topology of the hierarchical link is the same topology of
           the tunnel;";
        reference
          "RFC4206";
        leaf enable {
          type boolean;
          default "false";
          description
            "Enables the hierarchical link properties supported by
             this tunnel";
        }
        leaf local-node-id {
          type nw:node-id;
          description
            "The local node identifier.";
        }
        leaf local-te-node-id {
          type te-types:te-node-id;
          description
            "The local TE node identifier.";
        }
        leaf local-link-tp-id {
          type nt:tp-id;
          description
            "The local link termination point identifier.";
          reference
            "RFC8345";
        }
        leaf local-te-link-tp-id {
          type te-types:te-tp-id;
          description
            "The local TE link termination point identifier.";
        }
        leaf remote-node-id {
          type nw:node-id;
          description
            "The remote node identifier.";
        }
        leaf remote-link-tp-id {
          type nt:tp-id;
          description
            "The remote link termination point identifier.";
          reference
            "RFC8345";
        }
        leaf remote-te-link-tp-id {
          type te-types:te-tp-id;
          description
            "The remote TE link termination point identifier.";
        }
        leaf remote-te-node-id {
          type te-types:te-node-id;
          description
            "Remote TE node identifier.";
        }
        leaf link-id {
          type nt:link-id;
          config false;
          description
            "A network topology assigned identifier to the link";
          reference
            "RFC8345";
        }
        leaf network-id {
          type nw:network-id;
          description
            "The network topology identifier where the hierarchical 
            link supported by this TE tunnel is instantiated.";
        }
        uses te-types:te-topology-identifier {
          description
            "The TE topology identifier where the hierarchical link
             supported by this TE tunnel is instantiated.";
        }
      }
    }
  }

  grouping path-constraints-common {
    description
      "Global named path constraints configuration
       grouping.";
    uses te-types:common-path-constraints-attributes;
    uses te-types:generic-path-disjointness;
    uses te-types:path-constraints-route-objects;
    container path-in-segment {
      presence "The end-to-end tunnel starts in a previous domain;
                this tunnel is a segment in the current domain.";
      description
        "If an end-to-end tunnel crosses multiple domains using
         the same technology, some additional constraints have to be
         taken in consideration in each domain.
         This TE tunnel segment is stitched to the upstream TE tunnel
         segment.";
      uses te-types:label-set-info;
    }
    container path-out-segment {
      presence
        "The end-to-end tunnel is not terminated in this domain;
         this tunnel is a segment in the current domain.";
      description
        "If an end-to-end tunnel crosses multiple domains using
         the same technology, some additional constraints have to be
         taken in consideration in each domain.
         This TE tunnel segment is stitched to the downstream TE
         tunnel segment.";
      uses te-types:label-set-info;
    }
  }

  /**
   * TE container
   */

  container te {
    description
      "TE global container.";
    leaf enable {
      type boolean;
      description
        "Enables the TE component features.";
    }

    /* TE Global Data */
    container globals {
      description
        "Globals TE system-wide configuration data container.";
      container named-admin-groups {
        description
          "TE named admin groups container.";
        list named-admin-group {
          if-feature "te-types:extended-admin-groups";
          if-feature "te-types:named-extended-admin-groups";
          key "name";
          description
            "List of named TE admin-groups.";
          leaf name {
            type string;
            description
              "A string name that uniquely identifies a TE
               interface named admin-group.";
          }
          leaf bit-position {
            type uint32;
            description
              "Bit position representing the administrative group.";
            reference
              "RFC3209 and RFC7308";
          }


        }
      }
      container named-srlgs {
        description
          "TE named SRLGs container.";
        list named-srlg {
          if-feature "te-types:named-srlg-groups";
          key "name";
          description
            "A list of named SRLG groups.";
          leaf name {
            type string;
            description
              "A string name that uniquely identifies a TE
               interface named SRLG.";
          }
          leaf value {
            type te-types:srlg;
            description
              "An SRLG value.";
          }
          leaf cost {
            type uint32;
            description
              "SRLG associated cost. Used during path to append
               the path cost when traversing a link with this SRLG.";
          }
        }
      }
      container named-path-constraints {
        description
          "TE named path constraints container.";
        list named-path-constraint {
          if-feature "te-types:named-path-constraints";
          key "name";
          leaf name {
            type string;
            description
              "A string name that uniquely identifies a
               path constraint set.";
          }
          uses path-constraints-common;
          description
            "A list of named path constraints.";
        }
      }
    }

    /* TE Tunnel Data */
    container tunnels {
      description
        "Tunnels TE configuration data container.";
      list tunnel {
        key "name";
        description
          "The list of TE tunnels.";
        leaf name {
          type string;
          description
            "TE tunnel name.";
        }
        leaf alias {
          type string;
          description
            "An alternate name of the TE tunnel that can be modified
             anytime during its lifetime.";
        }
        leaf identifier {
          type uint32;
          description
            "TE tunnel Identifier.";
          reference
            "RFC3209";
        }
        leaf color {
          type uint32;
          description "The color associated with the TE tunnel.";
          reference "RFC9012";
        }
        leaf description {
          type string;
          default "None";
          description
            "Textual description for this TE tunnel.";
        }
        leaf admin-state {
          type identityref {
            base te-types:tunnel-admin-state-type;
          }
          default "te-types:tunnel-admin-state-up";
          description
            "TE tunnel administrative state.";
        }
        leaf operational-state {
          type identityref {
            base te-types:tunnel-state-type;
          }
          config false;
          description
            "TE tunnel operational state.";
        }
        uses te-types:encoding-and-switching-type;
        uses tunnel-common-attributes;
        container controller {
          description
            "Contains tunnel data relevant to external controller(s).
             This target node may be augmented by external module(s),
             for example, to add data for PCEP initiated and/or
             delegated tunnels.";
          leaf protocol-origin {
            type identityref {
              base te-types:protocol-origin-type;
            }
            description
              "The protocol origin for instantiating the tunnel."; 
          }
          leaf controller-entity-id {
            type string;
            description
              "An identifier unique within the scope of visibility
               that associated with the entity that controls the
               tunnel.";
            reference "RFC8232";
          }
        }
        leaf reoptimize-timer {
          type uint16;
          units "seconds";
          description
            "Frequency of reoptimization of a traffic engineered
             LSP.";
        }
        uses tunnel-associations-properties;
        uses protection-restoration-properties;
        uses te-types:tunnel-constraints;
        uses tunnel-hierarchy-properties;
        container primary-paths {
          description
            "The set of primary paths.";
          reference "RFC4872";
          list primary-path {
            key "name";
            description
              "List of primary paths for this tunnel.";
            leaf active {
              type boolean;
              config false;
              description
                "Indicates an active path that
                 has been selected from the primary paths list.";
            }
            uses path-common-properties;
            uses path-forward-properties;
            uses k-requested-paths;
            uses path-compute-info;
            uses path-state;
            container primary-reverse-path {
              when "../../../te:bidirectional = 'true'";
              description
                "The reverse primary path properties.";
              uses path-common-properties;
              uses path-compute-info;
              uses path-state;
              container candidate-secondary-reverse-paths {
                description
                  "The set of referenced candidate reverse secondary
                   paths from the full set of secondary reverse paths
                   which may be used for this primary path.";
                list candidate-secondary-reverse-path {
                  key "secondary-reverse-path";
                  ordered-by user;
                  description
                    "List of candidate secondary reverse path(s)";
                  leaf secondary-reverse-path {
                    type leafref {
                      path "../../../../../../"
                         + "te:secondary-reverse-paths/"
                         + "te:secondary-reverse-path/te:name";
                    }
                    description
                      "A reference to the secondary reverse path that
                       may be utilized when the containing primary
                       reverse path is in use.";
                  }
                  leaf active {
                    type boolean;
                    config false;
                    description
                      "Indicates an active path that has been
                       selected from the secondary reverse paths
                       list.";
                  }
                }
              }
            }
            container candidate-secondary-paths {
              description
                "The set of candidate secondary paths which may be
                 used for this primary path. When secondary paths are
                 specified in the list the path of the secondary LSP
                 in use must be restricted to those paths
                 referenced.
                 The priority of the secondary paths is specified
                 within the list. Higher priority values are less
                 preferred - that is to say that a path with priority
                 0 is the most preferred path. In the case that the
                 list is empty, any secondary path may be
                 utilised when the current primary path is in use.";
              list candidate-secondary-path {
                key "secondary-path";
                ordered-by user;
                description
                  "List of candidate secondary paths for this
                   tunnel.";
                leaf secondary-path {
                  type leafref {
                    path "../../../../../te:secondary-paths/"
                       + "te:secondary-path/te:name";
                  }
                  description
                    "A reference to the secondary path that may be
                     utilised when the containing primary path is
                     in use.";
                }
                leaf active {
                  type boolean;
                  config false;
                  description
                    "Indicates an active path that has been selected
                     from the candidate secondary paths.";
                }
              }
            }
          }
        }
        container secondary-paths {
          description
            "The set of secondary paths.";
          reference "RFC4872";
          list secondary-path {
            key "name";
            description
              "List of secondary paths for this tunnel.";
            uses path-common-properties;
            leaf preference {
              type uint8 {
                range "1..255";
              }
              default "1";
              description
                "Specifies a preference for this path. The lower the
                 number higher the preference.";
            }
            leaf secondary-reverse-path {
              type leafref {
                path "../../../"
                   + "te:secondary-reverse-paths/"
                   + "te:secondary-reverse-path/te:name";
              }
              description
                "A reference to the reverse secondary path when
                 co-routed with the secondary path.";
            }
            uses path-compute-info;
            uses protection-restoration-properties;
            uses path-state;
          }
        }
        container secondary-reverse-paths {
          description
            "The set of secondary reverse paths.";
          list secondary-reverse-path {
            key "name";
            description
              "List of secondary paths for this tunnel.";
            uses path-common-properties;
            leaf preference {
              type uint8 {
                range "1..255";
              }
              default "1";
              description
                "Specifies a preference for this path. The lower the
                 number higher the preference. Paths that have the
                 same preference will be activated together.";
            }
            uses path-compute-info;
            uses protection-restoration-properties;
            uses path-state;
          }
        }
        action tunnel-action {
          description
            "Action commands to manipulate the TE tunnel state.";
          reference
            "RFC 3209: RSVP-TE: Extensions to RSVP for LSP Tunnels,
             Section 2.5";
          input {
            leaf action-type {
              type identityref {
                base te-types:tunnel-action-type;
              }
              description
                "The action to be invoked on the TE tunnel.";
            }
          }
          output {
            leaf action-result {
              type identityref {
                base te-types:te-action-result;
              }
              description
                "The result of the tunnel action operation.";
            }
          }
        }
        action protection-external-commands {
          description
            "Actions to manipulate the protection external
             commands of the TE tunnel.";
          reference
            "RFC 4427: Recovery (Protection and Restoration)
             Terminology for Generalized Multi-Protocol Label
             Switching (GMPLS)";
          input {
            leaf protection-external-command {
              type identityref {
                base te-types:protection-external-commands;
              }
              description
                "Protection external command.";
            }
            leaf protection-group-ingress-node {
              type boolean;
              default "true";
              description
                "When 'true', indicates that the action is
                 applied on ingress node.
                 By default, the action applies to the ingress node
                 only.";
            }
            leaf protection-group-egress-node {
              type boolean;
              default "false";
              description
                "When set to 'true', indicates that the action is
                 applied on egress node.
                 By default, the action applies to the ingress node
                 only.";
            }
            leaf path-name {
              type string;
              description
                "The name of the path that the external command
                applies to.";
            }
            leaf path-type {
              type te-types:path-type;
              description
                "The type of the path that the external command
                applies to.";
            }
            leaf traffic-type {
              type enumeration {
                enum normal-traffic {
                  description
                    "The manual-switch or forced-switch command
                     applies to the normal traffic (this Tunnel).";
                }
                enum null-traffic {
                  description
                    "The manual-switch or forced-switch command
                     applies to the null traffic.";
                }
                enum extra-traffic {
                  description
                    "The manual-switch or forced-switch command
                     applies to the extra traffic (the extra-traffic
                     Tunnel sharing protection bandwidth with this
                     Tunnel).";
                }
              }
              description
                "Indicates whether the manual-switch or forced-switch
                 commands applies to the normal traffic, the null
                 traffic or the extra-traffic.";
              reference
                "RFC4427";
            }
            leaf extra-traffic-tunnel-ref {
              type tunnel-ref;
              description
                "In case there are multiple extra-traffic tunnels
                 sharing protection bandwidth with this Tunnel
                 (m:n protection), represents which extra-traffic
                 Tunnel the manual-switch or forced-switch to
                 extra-traffic command applies to.";
            }
          }
        }
      }
    }

    /* TE LSPs Data */
    container lsps {
      config false;
      description
        "TE LSPs state container.";
      list lsp {
        key "tunnel-name lsp-id node";
        unique "source destination tunnel-id lsp-id "
          + "extended-tunnel-id";
        description
          "List of LSPs associated with the tunnel.";
        leaf tunnel-name {
          type string;
          description "The TE tunnel name.";
        }
        leaf lsp-id {
          type uint16;
          description
            "Identifier used in the SENDER_TEMPLATE and the
             FILTER_SPEC that can be changed to allow a sender to
             share resources with itself.";
          reference
            "RFC3209";
        }
        leaf node {
          type te-types:te-node-id;
          description
            "The node where the TE LSP state resides on.";
        }
        leaf source {
          type te-types:te-node-id;
          description
            "Tunnel sender address extracted from
             SENDER_TEMPLATE  object.";
          reference
            "RFC3209";
        }
        leaf destination {
          type te-types:te-node-id;
          description
            "The tunnel endpoint address.";
          reference
            "RFC3209";
        }
        leaf tunnel-id {
          type uint16;
          description
            "The tunnel identifier that remains
             constant over the life of the tunnel.";
          reference
            "RFC3209";
        }
        leaf extended-tunnel-id {
          type yang:dotted-quad;
          description
            "The LSP Extended Tunnel ID.";
          reference
            "RFC3209";
        }
        leaf operational-state {
          type identityref {
            base te-types:lsp-state-type;
          }
          description
            "The LSP operational state.";
        }
        leaf signaling-type {
          type identityref {
            base te-types:path-signaling-type;
          }
          description
            "The signaling protocol used to set up this LSP.";
        }
        leaf origin-type {
          type enumeration {
            enum ingress {
              description
                "Origin ingress.";
            }
            enum egress {
              description
                "Origin egress.";
            }
            enum transit {
              description
                "Origin transit.";
            }
          }
          description
            "The origin of the LSP relative to the location of the
             local switch in the path.";
        }
        leaf lsp-resource-status {
          type enumeration {
            enum primary {
              description
                "A primary LSP is a fully established LSP for which
                 the resource allocation has been committed at the
                 data plane.";
            }
            enum secondary {
              description
                "A secondary LSP is an LSP that has been provisioned
                 in the control plane only; e.g. resource allocation
                 has not been committed at the data plane.";
            }
          }
          description
            "LSP resource allocation state.";
          reference
            "RFC4872, section 4.2.1";
        }
        leaf lockout-of-normal {
          type boolean;
          description
            "When set to 'true', it represents a lockout of normal
             traffic external command. When set to 'false', it
             represents a clear lockout of normal traffic external
             command. The lockout of normal traffic command applies
             to this Tunnel.";
          reference
            "RFC4427";
        }
        leaf freeze {
          type boolean;
          description
            "When set to 'true', it represents a freeze external
             command.  When set to 'false', it represents a clear
             freeze external command. The freeze command applies to
             all the Tunnels which are sharing the protection
             resources with this Tunnel.";
          reference
            "RFC4427";
        }
        leaf lsp-protection-role {
          type enumeration {
            enum working {
              description
                "A working LSP must be a primary LSP whilst a
                 protecting LSP can be either a primary or a
                 secondary LSP. Also, known as protected LSPs when
                 working LSPs are associated with protecting LSPs.";
            }
            enum protecting {
              description
                "A secondary LSP is an LSP that has been provisioned
                 in the control plane only; e.g. resource allocation
                 has not been committed at the data plane.";
            }
          }
          description
            "LSP role type.";
          reference
            "RFC4872, section 4.2.1";
        }
        leaf lsp-protection-state {
          type identityref {
            base te-types:lsp-protection-state;
          }
          config false;
          description
            "The reported protection state controlling which
             tunnel is using the resources of the protecting LSP.";
        }
        leaf protection-group-ingress-node-id {
          type te-types:te-node-id;
          description
            "Indicates the te-node-id of the protection group
             ingress node when the APS state represents an external
             command (LoP, SF, MS) applied to it or a WTR timer
             running on it. If the external command is not applied to
             the ingress node or the WTR timer is not running on it,
             this attribute is not specified. A value 0.0.0.0 is used
             when the te-node-id of the protection group ingress node
             is unknown (e.g., because the ingress node is outside
             the scope of control of the server)";
        }
        leaf protection-group-egress-node-id {
          type te-types:te-node-id;
          description
            "Indicates the te-node-id of the protection group egress
             node when the APS state represents an external command
             (LoP, SF, MS) applied to it or a WTR timer running on
             it. If the external command is not applied to the
             ingress node or the WTR timer is not running on it, this
             attribute is not specified. A value 0.0.0.0 is used when
             the te-node-id of the protection group ingress node is
             unknown (e.g., because the ingress node is outside the
             scope of control of the server)";
        }
        container lsp-actual-route-information {
          description
            "RSVP recorded route object information.";
          list lsp-actual-route-information {
            when "../../origin-type = 'ingress'" {
              description
                "Applicable on ingress LSPs only.";
            }
            key "index";
            description
              "Record route list entry.";
            uses te-types:record-route-state;
          }
        }
      }
    }
  }

  /* TE Tunnel RPCs/execution Data */

  rpc tunnels-path-compute {
    description
      "This RPC is a generic API whose
       input and output parameters are expected to be provided by
       augments to this module.";
    reference
      "RFC 4655: A Path Computation Element (PCE)-Based
       Architecture.";
    input {
      container path-compute-info {
        /* 
         * An external path compute module may augment this
         * target.
         */
        description
          "RPC input information.";
      }
    }
    output {
      container path-compute-result {
        /* 
         * An external path compute module may augment this
         * target.
         */
        description
          "RPC output information.";
      }
    }
  }

  rpc tunnels-actions {
    description
      "RPC that manipulates the state of a TE tunnel.";
    reference
      "RFC 3209: RSVP-TE: Extensions to RSVP for LSP Tunnels,
       Section 2.5";
    input {
      container tunnel-info {
        description
          "TE tunnel information.";
        choice filter-type {
          mandatory true;
          description
            "Filter choice.";
          case all-tunnels {
            leaf all {
              type empty;
              mandatory true;
              description
                "When present, applies the action on all TE
                 tunnels.";
            }
          }
          case one-tunnel {
            leaf tunnel {
              type tunnel-ref;
              description
                "Apply action on the specific TE tunnel.";
            }
          }
        }
      }
      container action-info {
        description
          "TE tunnel action information.";
        leaf action {
          type identityref {
            base te-types:tunnel-action-type;
          }
          description
            "The action type.";
        }
        leaf disruptive {
          when "derived-from-or-self(../action, "
             + "'te-types:tunnel-action-reoptimize')";
          type empty;
          description
            "When present, specifies whether or not the
             reoptimization
             action is allowed to be disruptive.";
        }
      }
    }
    output {
      leaf action-result {
        type identityref {
          base te-types:te-action-result;
        }
        description
          "The result of the tunnel action operation.";
      }
    }
  }
}
<CODE ENDS>
]]></artwork></figure>

</section>
</section>
<section anchor="te-device-yang-model"><name>TE Device YANG Model</name>

<t>The device TE YANG module ('ietf-te-device') models data that is specific to
managing a TE device.  This module augments the generic TE YANG module.</t>

<section anchor="module-structure-1"><name>Module Structure</name>

<section anchor="te-interfaces"><name>TE Interfaces</name>

<t>This branch of the model manages TE interfaces that are present on a device. 
Examples of TE interface properties are:</t>

<t><list style="symbols">
  <t>Maximum reservable bandwidth, bandwidth constraints (BC)</t>
  <t>Flooding parameters
  <list style="symbols">
      <t>Flooding intervals and threshold values</t>
    </list></t>
  <t>Interface attributes
  <list style="symbols">
      <t>(Extended) administrative groups</t>
      <t>SRLG values</t>
      <t>TE metric value</t>
    </list></t>
  <t>Fast reroute backup tunnel properties (such as static, auto-tunnel)</t>
</list></t>

<t>The derived state associated with interfaces is grouped under the interface
"state" sub-container as shown in <xref target="fig-if-te-state"/>.  This covers state data
such as:</t>

<t><list style="symbols">
  <t>Bandwidth information: maximum bandwidth, available bandwidth at different
priorities and for each class-type (CT)</t>
  <t>List of admitted LSPs
  <list style="symbols">
      <t>Name, bandwidth value and pool, time, priority</t>
    </list></t>
  <t>Statistics: state counters, flooding counters, admission counters
(accepted/rejected), preemption counters</t>
  <t>Adjacency information
  <list style="symbols">
      <t>Neighbor address</t>
      <t>Metric value</t>
    </list></t>
</list></t>

<figure title="TE interface state YANG subtree" anchor="fig-if-te-state"><artwork><![CDATA[
module: ietf-te-device
  augment /te:te:
      +--rw interfaces
         .
         +-- rw te-dev:te-attributes
                <<intended configuration>>
             .
             +-- ro state
                <<derived state associated with the TE interface>>
]]></artwork></figure>

</section>
</section>
<section anchor="tree-diagram-1"><name>Tree Diagram</name>

<t><xref target="fig-te-dev-tree"/> shows the tree diagram of the device TE YANG model defined in
modules 'ietf-te-device.yang'.</t>

<figure title="TE Tunnel device model YANG tree diagram" anchor="fig-te-dev-tree"><artwork><![CDATA[
module: ietf-te-device

  augment /te:te:
    +--rw interfaces
       +--rw threshold-type?            enumeration
       +--rw delta-percentage?          rt-types:percentage
       +--rw threshold-specification?   enumeration
       +--rw up-thresholds*             rt-types:percentage
       +--rw down-thresholds*           rt-types:percentage
       +--rw up-down-thresholds*        rt-types:percentage
       +--rw interface* [name]
          +--rw name                                if:interface-ref
          +--rw te-metric?
          |       te-types:te-metric
          +--rw (admin-group-type)?
          |  +--:(value-admin-groups)
          |  |  +--rw (value-admin-group-type)?
          |  |     +--:(admin-groups)
          |  |     |  +--rw admin-group?
          |  |     |          te-types:admin-group
          |  |     +--:(extended-admin-groups)
          |  |              {te-types:extended-admin-groups}?
          |  |        +--rw extended-admin-group?
          |  |                te-types:extended-admin-group
          |  +--:(named-admin-groups)
          |     +--rw named-admin-groups* [named-admin-group]
          |             {te-types:extended-admin-groups,
          |              te-types:named-extended-admin-groups}?
          |        +--rw named-admin-group    leafref
          +--rw (srlg-type)?
          |  +--:(value-srlgs)
          |  |  +--rw values* [value]
          |  |     +--rw value    uint32
          |  +--:(named-srlgs)
          |     +--rw named-srlgs* [named-srlg]
          |             {te-types:named-srlg-groups}?
          |        +--rw named-srlg    leafref
          +--rw threshold-type?                     enumeration
          +--rw delta-percentage?
          |       rt-types:percentage
          +--rw threshold-specification?            enumeration
          +--rw up-thresholds*
          |       rt-types:percentage
          +--rw down-thresholds*
          |       rt-types:percentage
          +--rw up-down-thresholds*
          |       rt-types:percentage
          +--rw switching-capabilities* [switching-capability]
          |  +--rw switching-capability    identityref
          |  +--rw encoding?               identityref
          +--ro te-advertisements-state
             +--ro flood-interval?           uint32
             +--ro last-flooded-time?        uint32
             +--ro next-flooded-time?        uint32
             +--ro last-flooded-trigger?     enumeration
             +--ro advertised-level-areas* [level-area]
                +--ro level-area    uint32
  augment /te:te/te:globals:
    +--rw lsp-install-interval?        uint32
    +--rw lsp-cleanup-interval?        uint32
    +--rw lsp-invalidation-interval?   uint32
  augment /te:te/te:tunnels/te:tunnel:
    +--rw path-invalidation-action?    identityref
    +--rw lsp-install-interval?        uint32
    +--rw lsp-cleanup-interval?        uint32
    +--rw lsp-invalidation-interval?   uint32
  augment /te:te/te:lsps/te:lsp:
    +--ro lsp-timers
    |  +--ro uptime?            uint32
    |  +--ro time-to-install?   uint32
    |  +--ro time-to-destroy?   uint32
    +--ro downstream-info
    |  +--ro nhop?                 te-types:te-tp-id
    |  +--ro outgoing-interface?   if:interface-ref
    |  +--ro neighbor
    |  |  +--ro id?     te-gen-node-id
    |  |  +--ro type?   enumeration
    |  +--ro label?                rt-types:generalized-label
    +--ro upstream-info
       +--ro phop?       te-types:te-tp-id
       +--ro neighbor
       |  +--ro id?     te-gen-node-id
       |  +--ro type?   enumeration
       +--ro label?      rt-types:generalized-label

  rpcs:
    +---x link-state-update
       +---w input
          +---w (filter-type)
             +--:(match-all)
             |  +---w all          empty
             +--:(match-one-interface)
                +---w interface?   if:interface-ref

]]></artwork></figure>

</section>
<section anchor="yang-module-1"><name>YANG Module</name>

<t>The device TE YANG module 'ietf-te-device' imports the following module(s):</t>

<t><list style="symbols">
  <t>ietf-interfaces defined in <xref target="RFC8343"/></t>
  <t>ietf-routing-types defined in <xref target="RFC8294"/></t>
  <t>ietf-te-types defined in <xref target="I-D.draft-ietf-teas-rfc8776-update"/></t>
  <t>ietf-te defined in this document</t>
</list></t>

<figure title="TE device data model YANG module" anchor="fig-te-device-types"><artwork><![CDATA[
<CODE BEGINS> file "ietf-te-device@2024-01-10.yang"
module ietf-te-device {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-te-device";

  /* Replace with IANA when assigned */

  prefix te-dev;

  /* Import TE module */

  import ietf-te {
    prefix te;
    reference
      "RFCXXXX: A YANG Data Model for Traffic Engineering
       Tunnels and Interfaces";
  }

  /* Import TE types */

  import ietf-te-types {
    prefix te-types;
    reference
      "draft-ietf-teas-rfc8776-update: Common YANG Data Types
           for Traffic Engineering.";
  }
  import ietf-interfaces {
    prefix if;
    reference
      "RFC8343: A YANG Data Model for Interface Management";
  }
  import ietf-routing-types {
    prefix rt-types;
    reference
      "RFC8294: Common YANG Data Types for the Routing Area";
  }

  organization
    "IETF Traffic Engineering Architecture and Signaling (TEAS)
     Working Group";
  contact
    "WG Web:   <https://tools.ietf.org/wg/teas/>
     WG List:  <mailto:teas@ietf.org>

     Editor:   Tarek Saad
               <mailto:tsaad.net@gmail.com>

     Editor:   Rakesh Gandhi
               <mailto:rgandhi@cisco.com>

     Editor:   Vishnu Pavan Beeram
               <mailto:vbeeram@juniper.net>

     Editor:   Himanshu Shah
               <mailto:hshah@ciena.com>

     Editor:   Xufeng Liu
               <mailto: xufeng.liu.ietf@gmail.com>

     Editor:   Igor Bryskin
               <mailto:i_bryskin@yahoo.com>

     Editor:   Oscar Gonzalez de Dios
               <mailto: oscar.gonzalezdedios@telefonica.com>";

  description
    "This module defines a data model for TE device configurations,
     state, and RPCs. The model fully conforms to the
     Network Management Datastore Architecture (NMDA).

     Copyright (c) 2023 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
     for full legal notices.";

  // RFC Ed.: replace XXXX with actual RFC number and remove this
  // note.
  // RFC Ed.: update the date below with the date of RFC publication
  // and remove this note.

  revision 2024-02-02 {
    description
      "Initial revision for the TE device YANG module.";
    reference
      "RFCXXXX: A YANG Data Model for Traffic Engineering Tunnels
       and Interfaces";
  }

  grouping lsp-device-timers {
    description
      "Device TE LSP timers configs.";
    leaf lsp-install-interval {
      type uint32;
      units "seconds";
      description
        "TE LSP installation delay time.";
    }
    leaf lsp-cleanup-interval {
      type uint32;
      units "seconds";
      description
        "TE LSP cleanup delay time.";
    }
    leaf lsp-invalidation-interval {
      type uint32;
      units "seconds";
      description
        "TE LSP path invalidation before taking action delay time.";
    }
  }

  grouping te-igp-flooding-bandwidth-config {
    description
      "Configurable items for igp flooding bandwidth
       threshold configuration.";
    leaf threshold-type {
      type enumeration {
        enum delta {
          description
            "'delta' indicates that the local
             system should flood IGP updates when a
             change in reserved bandwidth >= the specified
             delta occurs on the interface.";
        }
        enum threshold-crossed {
          description
            "THRESHOLD-CROSSED indicates that
             the local system should trigger an update (and
             hence flood) the reserved bandwidth when the
             reserved bandwidth changes such that it crosses,
             or becomes equal to one of the threshold values.";
        }
      }
      description
        "The type of threshold that should be used to specify the
         values at which bandwidth is flooded. 'delta' indicates that
         the local system should flood IGP updates when a change in
         reserved bandwidth >= the specified delta occurs on the
         interface. Where 'threshold-crossed' is specified, the local
         system should trigger an update (and hence flood) the
         reserved bandwidth when the reserved bandwidth changes such
         that it crosses, or becomes equal to one of the threshold
         values.";
    }
    leaf delta-percentage {
      when "../threshold-type = 'delta'" {
        description
          "The percentage delta can only be specified when the
           threshold type is specified to be a percentage delta of
           the reserved bandwidth.";
      }
      type rt-types:percentage;
      description
        "The percentage of the maximum-reservable-bandwidth
         considered as the delta that results in an IGP update
         being flooded.";
    }
    leaf threshold-specification {
      when "../threshold-type = 'threshold-crossed'" {
        description
          "The selection of whether mirrored or separate threshold
           values are to be used requires user specified thresholds
           to be set.";
      }
      type enumeration {
        enum mirrored-up-down {
          description
            "mirrored-up-down indicates that a single set of
             threshold values should be used for both increasing
             and decreasing bandwidth when determining whether
             to trigger updated bandwidth values to be flooded
             in the IGP TE extensions.";
        }
        enum separate-up-down {
          description
            "separate-up-down indicates that a separate
             threshold values should be used for the increasing
             and decreasing bandwidth when determining whether
             to trigger updated bandwidth values to be flooded
             in the IGP TE extensions.";
        }
      }
      description
        "This value specifies whether a single set of threshold
         values should be used for both increasing and decreasing
         bandwidth when determining whether to trigger updated
         bandwidth values to be flooded in the IGP TE extensions.
         'mirrored-up-down' indicates that a single value (or set of
         values) should be used for both increasing and decreasing
         values, where 'separate-up-down' specifies that the
         increasing and decreasing values will be separately
         specified.";
    }
    leaf-list up-thresholds {
      when "../threshold-type = 'threshold-crossed'"
         + "and ../threshold-specification = 'separate-up-down'" {
        description
          "A list of up-thresholds can only be specified when the
           bandwidth update is triggered based on crossing a
           threshold and separate up and down thresholds are
           required.";
      }
      type rt-types:percentage;
      description
        "The thresholds (expressed as a percentage of the maximum
         reservable bandwidth) at which bandwidth updates are to be
         triggered when the bandwidth is increasing.";
    }
    leaf-list down-thresholds {
      when "../threshold-type = 'threshold-crossed'"
         + "and ../threshold-specification = 'separate-up-down'" {
        description
          "A list of down-thresholds can only be specified when the
           bandwidth update is triggered based on crossing a
           threshold and separate up and down thresholds are
           required.";
      }
      type rt-types:percentage;
      description
        "The thresholds (expressed as a percentage of the maximum
         reservable bandwidth) at which bandwidth updates are to be
         triggered when the bandwidth is decreasing.";
    }
    leaf-list up-down-thresholds {
      when "../threshold-type = 'threshold-crossed'"
         + "and ../threshold-specification = 'mirrored-up-down'" {
        description
          "A list of thresholds corresponding to both increasing
           and decreasing bandwidths can be specified only when an
           update is triggered based on crossing a threshold, and
           the same up and down thresholds are required.";
      }
      type rt-types:percentage;
      description
        "The thresholds (expressed as a percentage of the maximum
         reservable bandwidth of the interface) at which bandwidth
         updates are flooded - used both when the bandwidth is
         increasing and decreasing.";
    }
  }

  /**
   * TE device augmentations
   */
  augment "/te:te" {
    description
      "TE global container.";
    /* TE Interface Configuration Data */
    container interfaces {
      description
        "Configuration data model for TE interfaces.";
      uses te-igp-flooding-bandwidth-config;
      list interface {
        key "name";
        description
          "The list of interfaces enabled for TE.";
        leaf name {
          type if:interface-ref;
          description
            "The reference to interface enabled for TE.";
        }
        /* TE interface parameters */
        leaf te-metric {
          type te-types:te-metric;
          description
            "TE interface metric.";
        }
        choice admin-group-type {
          description
            "TE interface administrative groups
             representation type.";
          case value-admin-groups {
            choice value-admin-group-type {
              description
                "choice of admin-groups.";
              case admin-groups {
                description
                  "Administrative group/Resource
                   class/Color.";
                leaf admin-group {
                  type te-types:admin-group;
                  description
                    "TE interface administrative group.";
                }
              }
              case extended-admin-groups {
                if-feature "te-types:extended-admin-groups";
                description
                  "Extended administrative group/Resource
                   class/Color.";
                leaf extended-admin-group {
                  type te-types:extended-admin-group;
                  description
                    "TE interface extended administrative group.";
                }
              }
            }
          }
          case named-admin-groups {
            list named-admin-groups {
              if-feature "te-types:extended-admin-groups";
              if-feature "te-types:named-extended-admin-groups";
              key "named-admin-group";
              description
                "A list of named admin-group entries.";
              leaf named-admin-group {
                type leafref {
                  path "../../../../te:globals/"
                     + "te:named-admin-groups/te:named-admin-group/"
                     + "te:name";
                }
                description
                  "A named admin-group entry.";
              }
            }
          }
        }
        choice srlg-type {
          description
            "Choice of SRLG configuration.";
          case value-srlgs {
            list values {
              key "value";
              description
                "List of SRLG values that
                 this link is part of.";
              leaf value {
                type uint32 {
                  range "0..4294967295";
                }
                description
                  "Value of the SRLG";
              }
            }
          }
          case named-srlgs {
            list named-srlgs {
              if-feature "te-types:named-srlg-groups";
              key "named-srlg";
              description
                "A list of named SRLG entries.";
              leaf named-srlg {
                type leafref {
                  path "../../../../te:globals/"
                     + "te:named-srlgs/te:named-srlg/te:name";
                }
                description
                  "A named SRLG entry.";
              }
            }
          }
        }
        uses te-igp-flooding-bandwidth-config;
        list switching-capabilities {
          key "switching-capability";
          description
            "List of interface capabilities for this interface.";
          leaf switching-capability {
            type identityref {
              base te-types:switching-capabilities;
            }
            description
              "Switching Capability for this interface.";
          }
          leaf encoding {
            type identityref {
              base te-types:lsp-encoding-types;
            }
            description
              "Encoding supported by this interface.";
          }
        }
        container te-advertisements-state {
          config false;
          description
            "TE interface advertisements state container.";
          leaf flood-interval {
            type uint32;
            description
              "The periodic flooding interval.";
          }
          leaf last-flooded-time {
            type uint32;
            units "seconds";
            description
              "Time elapsed since last flooding in seconds.";
          }
          leaf next-flooded-time {
            type uint32;
            units "seconds";
            description
              "Time remained for next flooding in seconds.";
          }
          leaf last-flooded-trigger {
            type enumeration {
              enum link-up {
                description
                  "Link-up flooding trigger.";
              }
              enum link-down {
                description
                  "Link-down flooding trigger.";
              }
              enum threshold-up {
                description
                  "Bandwidth reservation up threshold.";
              }
              enum threshold-down {
                description
                  "Bandwidth reservation down threshold.";
              }
              enum bandwidth-change {
                description
                  "Bandwidth capacity change.";
              }
              enum user-initiated {
                description
                  "Initiated by user.";
              }
              enum srlg-change {
                description
                  "SRLG property change.";
              }
              enum periodic-timer {
                description
                  "Periodic timer expired.";
              }
            }
            default "periodic-timer";
            description
              "Trigger for the last flood.";
          }
          list advertised-level-areas {
            key "level-area";
            description
              "List of level-areas that the TE interface is
               advertised in.";
            leaf level-area {
              type uint32;
              description
                "The IGP area or level where the TE interface link
                 state is advertised in.";
            }
          }
        }
      }
    }
  }

  /* TE globals device augmentation */

  augment "/te:te/te:globals" {
    description
      "Global TE device specific configuration parameters.";
    uses lsp-device-timers;
  }

  /* TE tunnels device configuration augmentation */

  augment "/te:te/te:tunnels/te:tunnel" {
    description
      "Tunnel device dependent augmentation.";
    leaf path-invalidation-action {
      type identityref {
        base te-types:path-invalidation-action-type;
      }
      description
        "Tunnel path invalidation action.";
    }
    uses lsp-device-timers;
  }

  /* TE LSPs device state augmentation */

  augment "/te:te/te:lsps/te:lsp" {
    description
      "TE LSP device dependent augmentation.";
    container lsp-timers {
      when "../te:origin-type = 'ingress'" {
        description
          "Applicable to ingress LSPs only.";
      }
      description
        "Ingress LSP timers.";
      leaf uptime {
        type uint32;
        units "seconds";
        description
          "The LSP uptime.";
      }
      leaf time-to-install {
        type uint32;
        units "seconds";
        description
          "The time remaining for a new LSP to be instantiated
           in forwarding to carry traffic.";
      }
      leaf time-to-destroy {
        type uint32;
        units "seconds";
        description
          "The time remaining for a existing LSP to be deleted
           from forwarding.";
      }
    }
    container downstream-info {
      when "../te:origin-type != 'egress'" {
        description
          "Downstream information of the LSP.";
      }
      description
        "downstream information.";
      leaf nhop {
        type te-types:te-tp-id;
        description
          "downstream next-hop address.";
      }
      leaf outgoing-interface {
        type if:interface-ref;
        description
          "downstream interface.";
      }
      container neighbor {
        uses te-types:te-generic-node-id;
        description
          "downstream neighbor address.";
      }
      leaf label {
        type rt-types:generalized-label;
        description
          "downstream label.";
      }
    }
    container upstream-info {
      when "../te:origin-type != 'ingress'" {
        description
          "Upstream information of the LSP.";
      }
      description
        "upstream information.";
      leaf phop {
        type te-types:te-tp-id;
        description
          "upstream next-hop or previous-hop address.";
      }
      container neighbor {
        uses te-types:te-generic-node-id;
        description
          "upstream neighbor address.";
      }
      leaf label {
        type rt-types:generalized-label;
        description
          "upstream label.";
      }
    }
  }

  /* TE interfaces RPCs/execution Data */

  rpc link-state-update {
    description
      "Triggers a link state update for the specific interface.";
    input {
      choice filter-type {
        mandatory true;
        description
          "Filter choice.";
        case match-all {
          leaf all {
            type empty;
            mandatory true;
            description
              "Match all TE interfaces.";
          }
        }
        case match-one-interface {
          leaf interface {
            type if:interface-ref;
            description
              "Match a specific TE interface.";
          }
        }
      }
    }
  }
}
<CODE ENDS>
]]></artwork></figure>

</section>
</section>
<section anchor="notifications"><name>Notifications</name>

<t>Notifications are a key component of any topology data model.</t>

<t><xref target="RFC8639"/> and <xref target="RFC8641"/> define a subscription mechanism and a push
mechanism for YANG datastores.  These mechanisms currently allow the
user to:</t>

<t><list style="symbols">
  <t>Subscribe to notifications on a per-client basis.</t>
  <t>Specify subtree filters or XML Path Language (XPath) filters so
that only contents of interest will be sent.</t>
  <t>Specify either periodic or on-demand notifications.</t>
</list></t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document registers the following URIs in the IETF XML registry
<xref target="RFC3688"/>.
Following the format in <xref target="RFC3688"/>, the following registrations are
requested to be made.</t>

<figure><artwork><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-te
   Registrant Contact:  The IESG.
   XML: N/A, the requested URI is an XML namespace.

   URI: urn:ietf:params:xml:ns:yang:ietf-te-device
   Registrant Contact:  The IESG.
   XML: N/A, the requested URI is an XML namespace.
]]></artwork></figure>

<t>This document registers two YANG modules in the YANG Module Names
registry <xref target="RFC6020"/>.</t>

<figure><artwork><![CDATA[
   Name:       ietf-te
   Namespace:  urn:ietf:params:xml:ns:yang:ietf-te
   Prefix:     te
   Reference:  RFCXXXX

   Name:       ietf-te-device
   Namespace:  urn:ietf:params:xml:ns:yang:ietf-te-device
   Prefix:     te-device
   Reference:  RFCXXXX
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The YANG module specified in this document defines a schema for data that is
designed to be accessed via network management protocols such as NETCONF
<xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure
transport layer, and the mandatory-to-implement secure transport is Secure
Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the
mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>

<t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/> provides the
means to restrict access for particular NETCONF or RESTCONF users to a
preconfigured subset of all available NETCONF or RESTCONF protocol operations
and content.</t>

<t>There are a number of data nodes defined in this YANG module that are
writable/creatable/deletable (i.e., config true, which is the default). These
data nodes may be considered sensitive or vulnerable in some network
environments. Write operations (e.g., edit-config) to these data nodes without
proper protection can have a negative effect on network operations. These are
the subtrees and data nodes and their sensitivity/vulnerability:</t>

<t>"/te/globals":  This module specifies the global TE configurations on a device.
Unauthorized access to this container could cause the device to ignore packets
it should receive and process.</t>

<t>"/te/tunnels":  This list specifies the configuration and state of TE Tunnels
present on the device or controller.  Unauthorized access to this list could
cause the device to ignore packets it should receive and process. An attacker
may also use state to derive information about the network topology,
and subsequently orchestrate further attacks.</t>

<t>"/te/interfaces":  This list specifies the configuration and state TE interfaces
on a device. Unauthorized access to this list could cause the device to ignore packets it
should receive and process.</t>

<t>Some of the readable data nodes in this YANG module may be considered sensitive
or vulnerable in some network environments. It is thus important to control
read access (e.g., via get, get-config, or notification) to these data nodes.
These are the subtrees and data nodes and their sensitivity/vulnerability:</t>

<t>"/te/lsps": this list contains information state about established LSPs in the network.
An attacker can use this information to derive information about the network topology,
and subsequently orchestrate further attacks.</t>

<t>Some of the RPC operations in this YANG module may be considered sensitive or
vulnerable in some network environments. It is thus important to control access
to these operations. These are the operations and their
sensitivity/vulnerability:</t>

<t>"/te/tunnels-actions": using this RPC, an attacker can modify existing paths that
may be carrying live traffic, and hence result to interruption to services
carried over the network.</t>

<t>"/te/tunnels-path-compute": using this RPC, an attacker can retrieve secured
information about the network provider which can be used to orchestrate further
attacks.</t>

<t>The security considerations spelled out in the YANG 1.1 specification
<xref target="RFC7950"/> apply for this document as well.</t>

</section>
<section anchor="acknowledgement"><name>Acknowledgement</name>

<t>The authors would like to thank the  members of the multi-vendor YANG design
team who are involved in the definition of this model.</t>

<t>The authors would like to thank Tom Petch and Adrian Farrel for reviewing and
providing useful feedback about the document. The authors would also like to
thank Loa Andersson, Lou Berger, Sergio Belotti, Italo Busi, Carlo Perocchio,
Francesco Lazzeri, Aihua Guo, Dhruv Dhody, and Raqib Jones for providing
feedback on this document.</t>

</section>
<section anchor="contributors"><name>Contributors</name>

<figure><artwork><![CDATA[
   Oscar Gonzalez de Dios
   Telefonica

   Email: oscar.gonzalezdedios@telefonica.com

   Himanshu Shah
   Ciena

   Email: hshah@ciena.com


   Xia Chen
   Huawei Technologies

   Email: jescia.chenxia@huawei.com


   Bin Wen
   Comcast

   Email: Bin_Wen@cable.comcast.com

]]></artwork></figure>

</section>
<section anchor="AppendixA"><name>Appendix A: Data Tree Examples</name>

<t>This section contains examples of use of the model with RESTCONF <xref target="RFC8040"/> and JSON encoding.</t>

<t>For the example we will use a 4 node MPLS network were RSVP-TE MPLS Tunnels can be setup. The
loopbacks of each router are shown. The network in <xref target="AppFig-Topo"/> will be used in the examples
described in the following sections.</t>

<figure title="TE network used in data tree examples" anchor="AppFig-Topo"><artwork><![CDATA[
 192.0.2.1        192.0.2.2      192.0.2.4
 +-------+        +-------+      +-------+
 |       |        |       |      |       |
 |   A   +--------+   B   +------+   D   |
 +---+---+        +-------+      +---+---+
     |                               |
     |            +-------+          |
     |            |       |          |
     +------------+   C   +----------+
                  |       |
                  +-------+
                  192.0.2.3
]]></artwork></figure>

<section anchor="TeTunnel"><name>Basic Tunnel Setup</name>

<t>This example uses the TE Tunnel YANG data model defined in this document to create an
RSVP-TE signaled Tunnel of packet LSP encoding type. First, the TE Tunnel is created with no specific restrictions or constraints (e.g., protection or restoration).
The TE Tunnel ingresses on router A and egresses on router D.</t>

<t>In this case, the TE Tunnel is created without specifying additional information about the primary paths.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/tunnels HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_2",
      "encoding": "te-types:lsp-encoding-packet",
      "admin-state": "te-types:tunnel-state-up",
      "source": "192.0.2.1",
      "destination": "192.0.2.4",
      "bidirectional": "false",
      "signaling-type": "te-types:path-setup-rsvp"
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="global-named-path-constraints"><name>Global Named Path Constraints</name>

<t>This example uses the YANG data model to create a 'named path constraint' that can be reference by TE Tunnels.
The path constraint, in this case, limits the TE Tunnel hops for the computed path.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/globals/named-path-constraints
     HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json


  "ietf-te:named-path-constraint": {
          "name": "max-hop-3",
          "path-metric-bounds": {
            "path-metric-bound": {
              "metric-type": "te-types:path-metric-hop",
              "upper-bound": "3"
    }
   }
  }
}
]]></artwork></figure>

</section>
<section anchor="tunnel-with-global-path-constraint"><name>Tunnel with Global Path Constraint</name>

<t>In this example, the previously created 'named path constraint' is applied to the TE Tunnel created in <xref target="TeTunnel"/>.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/tunnels HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:ietf-tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_4_1",
      "encoding": "te-types:lsp-encoding-packet",
      "description": "Simple_LSP_with_named_path",
      "admin-state": "te-types:tunnel-state-up",
      "source": "192.0.2.1",
      "destination": "192.0.2.4",
      "signaling-type": "path-setup-rsvp",
      "primary-paths": [
        {
          "primary-path": {
            "name": "Simple_LSP_1",
            "use-path-computation": "true",
            "named-path-constraint": "max-hop-3"
          }
        }
      ]
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="tunnel-with-per-tunnel-path-constraint"><name>Tunnel with Per-tunnel Path Constraint</name>

<t>In this example, the a per tunnel path constraint is explicitly indicated under the TE Tunnel created in <xref target="TeTunnel"/> to constrain the computed path for the tunnel.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/tunnels HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_4_2",
      "encoding": "te-types:lsp-encoding-packet",
      "admin-state": "te-types:tunnel-state-up",
      "source": "192.0.2.1",
      "destination": "192.0.2.4",
      "signaling-type": "te-types:path-setup-rsvp",
      "primary-paths": {
        "primary-path": [
          {
            "name": "path1",
            "path-metric-bounds": {
              "path-metric-bound": [
                {
                  "metric-type": "te-types:path-metric-hop",
                  "upper-bound": "3"
                }
              ]
            }
          }
        ]
      }
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="tunnel-state"><name>Tunnel State</name>

<t>In this example, the 'GET' query is sent to return the state stored about the tunnel.</t>

<figure><artwork><![CDATA[
GET  /restconf/data/ietf-te:te/tunnels +
     /tunnel="Example_LSP_Tunnel_A_4_1"
     /primary-paths/ HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
]]></artwork></figure>

<t>The request, with status code 200 would include, for example, the following json:</t>

<figure><artwork><![CDATA[
{
  "ietf-te:primary-paths": {
    "primary-path": [
      {
        "name": "path1",
        "path-computation-method": "te-types:path-locally-computed",
        "computed-paths-properties": {
          "computed-path-properties": [
            {
              "k-index": "1",
              "path-properties": {
                "path-route-objects": {
                  "path-route-object": [
                    {
                      "index": "1",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": "2",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.4"
                      }
                    }
                  ]
                }
              }
            }
          ]
        },
        "lsps": {
          "lsp": [
            {
              "tunnel-name": "Example_LSP_Tunnel_A_4_1",
              "node": "192.0.2.1 ",
              "lsp-id": "25356"
            }
          ]
        }
      }
    ]
  }
}
]]></artwork></figure>

</section>
<section anchor="example-te-tunnel-with-primary-and-secondary-paths"><name>Example TE Tunnel with Primary and Secondary Paths</name>

<figure title="TE network used in data tree examples" anchor="AppFig-Topo2"><artwork><![CDATA[
                       +----------+          +----------+
                     +-|192.0.2.9 |---+      |192.0.2.10|
                     | +----------+   |      +----------+
                     |                |          |   |
+----------+    +----------+     +----------+    |   |
|192.0.2.8 |----|192.0.2.3 |-----|192.0.2.4 |----+   |
+----------+    +----------+     +----------+        |
  |                  |                |              |
+----------+         |                |              |
|192.0.2.1 |---------+                |           +----------+
+----------+                          +-----------|192.0.2.5 |
      |  |                                        +----------+
      |  |              +----------+                     | |
      |  +--------------|192.0.2.2 |---------------------+ |
      |                 +----------+                       |
      |                       | |                          |
  +----------+                | |                   +----------+
  |192.0.2.6 |----------------+ +-------------------|192.0.2.7 |
  +----------+                                      +----------+

]]></artwork></figure>

<t>Below is the state retrieved for a TE tunnel from source 192.0.2.1 to 192.0.2.5
with primary, secondary, reverse, and secondary reverse paths as shown in <xref target="AppFig-Topo2"/>.</t>

<figure><artwork><![CDATA[
{
  "ietf-te:te": {
    "tunnels": {
      "tunnel": [
        {
          "name": "example-1",
          "description": "Example in slide 1",
          "source": "192.0.2.1",
          "destination": "192.0.2.5",
          "bidirectional": false,
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-1 (fwd)",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage" : "route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "name": "primary-2 (rev)",
                  "explicit-route-objects": {
                    "route-object-include-exclude": [
                      {
                        "index": 1,
                        "explicit-route-usage" : "route-include-object",
                        "numbered-node-hop": {
                          "node-id": "192.0.2.3",
                          "hop-type": "loose"
                        }
                      }
                    ]
                  },
                  "candidate-secondary-reverse-paths": {
                    "candidate-secondary-reverse-path": [
                      "secondary-3 (rev)",
                      "secondary-4 (rev)",
                      "secondary-5 (rev)"
                    ]
                  }
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    "secondary-1 (fwd)",
                    "secondary-2 (fwd)"
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-1 (fwd)",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage" : "route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-2 (fwd)",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage" : "route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          },
          "secondary-reverse-paths": {
            "secondary-reverse-path": [
              {
                "name": "secondary-3 (rev)",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage" : "route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.4",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-4 (rev)",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage" : "route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.4"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.3",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-5 (rev)",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage" : "route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.3"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1",
                        "hop-type":"loose"
                      }
                    }
                  ]
                }
              }
            ]
          }
        },
        {
          "name": "example-3",
          "description": "Example in slide 3",
          "source": "192.0.2.1",
          "destination": "192.0.2.5",
          "bidirectional": true,
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-1 (bidir)",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage" : "route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    "secondary-1 (bidir)",
                    "secondary-2 (bidir)"
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-1 (bidir)",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage" : "route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-2 (bidir)",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage" : "route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          }
        },
        {
          "name": "example-4",
          "description": "Example in slide 4",
          "source": "192.0.2.1",
          "destination": "192.0.2.5",
          "bidirectional": false,
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-1 (fwd)",
                "co-routed": [null],
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage" : "route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "name": "primary-2 (rev)",
                  "candidate-secondary-reverse-paths": {
                    "candidate-secondary-reverse-path": [
                      "secondary-3 (rev)",
                      "secondary-4 (rev)"
                    ]
                  }
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    "secondary-1 (fwd)",
                    "secondary-2 (fwd)"
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-1 (fwd)",
                "co-routed": [null],
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage" : "route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-2 (fwd)",
                "co-routed": [null],
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage" : "route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          },
          "secondary-reverse-paths": {
            "secondary-reverse-path": [
              {
                "name": "secondary-3 (rev)"
              },
              {
                "name": "secondary-4 (rev)"
              }
            ]
          }
        }
      ]
    }
  }
}
]]></artwork></figure>

</section>
</section>
<section anchor="AppendixB"><name>Appendix B: Full Model Tree Diagram</name>

<t><xref target="fig-te-tree-full"/> shows the full tree diagram of the TE YANG model defined in
module 'ietf-te.yang'.</t>

<figure title="Full tree diagram of TE Tunnel YANG data model" anchor="fig-te-tree-full"><artwork><![CDATA[
module: ietf-te
  +--rw te
     +--rw enable?    boolean
     +--rw globals
     |  +--rw named-admin-groups
     |  |  +--rw named-admin-group* [name]
     |  |          {te-types:extended-admin-groups,te-types:named-extended-admin-groups}?
     |  |     +--rw name            string
     |  |     +--rw bit-position?   uint32
     |  +--rw named-srlgs
     |  |  +--rw named-srlg* [name] {te-types:named-srlg-groups}?
     |  |     +--rw name     string
     |  |     +--rw value?   te-types:srlg
     |  |     +--rw cost?    uint32
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
     |             {te-types:named-path-constraints}?
     |        +--rw name                       string
     |        +---u path-constraints-common
     +--rw tunnels
     |  +--rw tunnel* [name]
     |     +--rw name                                    string
     |     +--rw alias?                                  string
     |     +--rw identifier?                             uint32
     |     +--rw color?                                  uint32
     |     +--rw description?                            string
     |     +--rw admin-state?                            identityref
     |     +--ro operational-state?                      identityref
     |     +---u te-types:encoding-and-switching-type
     |     +---u tunnel-common-attributes
     |     +--rw controller
     |     |  +--rw protocol-origin?        identityref
     |     |  +--rw controller-entity-id?   string
     |     +--rw reoptimize-timer?                       uint16
     |     +---u tunnel-associations-properties
     |     +---u protection-restoration-properties
     |     +---u te-types:tunnel-constraints
     |     +---u tunnel-hierarchy-properties
     |     +--rw primary-paths
     |     |  +--rw primary-path* [name]
     |     |     +--ro active?                      boolean
     |     |     +---u path-common-properties
     |     |     +---u path-forward-properties
     |     |     +---u k-requested-paths
     |     |     +---u path-compute-info
     |     |     +---u path-state
     |     |     +--rw primary-reverse-path
     |     |     |  +---u path-common-properties
     |     |     |  +---u path-compute-info
     |     |     |  +---u path-state
     |     |     |  +--rw candidate-secondary-reverse-paths
     |     |     |     +--rw candidate-secondary-reverse-path*
     |     |     |             [secondary-reverse-path]
     |     |     |        +--rw secondary-reverse-path    leafref
     |     |     |        +--ro active?                   boolean
     |     |     +--rw candidate-secondary-paths
     |     |        +--rw candidate-secondary-path* [secondary-path]
     |     |           +--rw secondary-path    leafref
     |     |           +--ro active?           boolean
     |     +--rw secondary-paths
     |     |  +--rw secondary-path* [name]
     |     |     +---u path-common-properties
     |     |     +--rw preference?                          uint8
     |     |     +--rw secondary-reverse-path?              leafref
     |     |     +---u path-compute-info
     |     |     +---u protection-restoration-properties
     |     |     +---u path-state
     |     +--rw secondary-reverse-paths
     |     |  +--rw secondary-reverse-path* [name]
     |     |     +---u path-common-properties
     |     |     +--rw preference?                          uint8
     |     |     +---u path-compute-info
     |     |     +---u protection-restoration-properties
     |     |     +---u path-state
     |     +---x tunnel-action
     |     |  +---w input
     |     |  |  +---w action-type?   identityref
     |     |  +--ro output
     |     |     +--ro action-result?   identityref
     |     +---x protection-external-commands
     |        +---w input
     |           +---w protection-external-command?     identityref
     |           +---w protection-group-ingress-node?   boolean
     |           +---w protection-group-egress-node?    boolean
     |           +---w path-name?                       string
     |           +---w path-type?
     |           |       te-types:path-type
     |           +---w traffic-type?                    enumeration
     |           +---w extra-traffic-tunnel-ref?        tunnel-ref
     +--ro lsps
        +--ro lsp* [tunnel-name lsp-id node]
           +--ro tunnel-name                         string
           +--ro lsp-id                              uint16
           +--ro node
           |       te-types:te-node-id
           +--ro source?
           |       te-types:te-node-id
           +--ro destination?
           |       te-types:te-node-id
           +--ro tunnel-id?                          uint16
           +--ro extended-tunnel-id?                 yang:dotted-quad
           +--ro operational-state?                  identityref
           +--ro signaling-type?                     identityref
           +--ro origin-type?                        enumeration
           +--ro lsp-resource-status?                enumeration
           +--ro lockout-of-normal?                  boolean
           +--ro freeze?                             boolean
           +--ro lsp-protection-role?                enumeration
           +--ro lsp-protection-state?               identityref
           +--ro protection-group-ingress-node-id?
           |       te-types:te-node-id
           +--ro protection-group-egress-node-id?
           |       te-types:te-node-id
           +--ro lsp-actual-route-information
              +--ro lsp-actual-route-information* [index]
                 +---u te-types:record-route-state

  rpcs:
    +---x tunnels-path-compute
    |  +---w input
    |  |  +---w path-compute-info
    |  +--ro output
    |     +--ro path-compute-result
    +---x tunnels-actions
       +---w input
       |  +---w tunnel-info
       |  |  +---w (filter-type)
       |  |     +--:(all-tunnels)
       |  |     |  +---w all       empty
       |  |     +--:(one-tunnel)
       |  |        +---w tunnel?   tunnel-ref
       |  +---w action-info
       |     +---w action?       identityref
       |     +---w disruptive?   empty
       +--ro output
          +--ro action-result?   identityref

  grouping path-common-properties:
    +-- name?                      string
    +-- path-computation-method?   identityref
    +-- path-computation-server
    |  +---u te-types:te-generic-node-id
    +-- compute-only?              empty
    +-- use-path-computation?      boolean
    +-- lockdown?                  empty
    +--ro path-scope?                identityref
  grouping path-compute-info:
    +---u tunnel-associations-properties
    +---u te-types:generic-path-optimization
    +-- named-path-constraint?                leafref
    |       {te-types:named-path-constraints}?
    +---u path-constraints-common
  grouping path-forward-properties:
    +-- preference?   uint8
    +-- co-routed?    boolean
  grouping k-requested-paths:
    +-- k-requested-paths?   uint8
  grouping path-state:
    +---u path-computation-response
    +--ro lsp-provisioning-error-infos
    |  +--ro lsp-provisioning-error-info* []
    |     +--ro error-reason?        identityref
    |     +--ro error-description?   string
    |     +--ro error-timestamp?     yang:date-and-time
    |     +--ro error-node-id?       te-types:te-node-id
    |     +--ro error-link-id?       te-types:te-tp-id
    |     +--ro lsp-id?              uint16
    +--ro lsps
       +--ro lsp* [node lsp-id]
          +--ro tunnel-name?   -> /te/lsps/lsp/tunnel-name
          +--ro node?          leafref
          +--ro lsp-id?        leafref
  grouping path-computation-response:
    +--ro computed-paths-properties
    |  +--ro computed-path-properties* [k-index]
    |     +--ro k-index?                            uint8
    |     +---u te-types:generic-path-properties
    +--ro computed-path-error-infos
       +--ro computed-path-error-info* []
          +--ro error-description?   string
          +--ro error-timestamp?     yang:date-and-time
          +--ro error-reason?        identityref
  grouping protection-restoration-properties:
    +-- protection
    |  +-- protection-type?                identityref
    |  +-- protection-reversion-disable?   boolean
    |  +-- hold-off-time?                  uint32
    |  +-- wait-to-revert?                 uint16
    |  +-- aps-signal-id?                  uint8
    +-- restoration
       +-- restoration-type?                identityref
       +-- restoration-scheme?              identityref
       +-- restoration-reversion-disable?   boolean
       +-- hold-off-time?                   uint32
       +-- wait-to-restore?                 uint16
       +-- wait-to-revert?                  uint16
  grouping tunnel-associations-properties:
    +-- association-objects
       +-- association-object* [association-key]
       |  +-- association-key?   string
       |  +-- type?              identityref
       |  +-- id?                uint16
       |  +-- source
       |     +---u te-types:te-generic-node-id
       +-- association-object-extended* [association-key]
          +-- association-key?   string
          +-- type?              identityref
          +-- id?                uint16
          +-- source
          |  +---u te-types:te-generic-node-id
          +-- global-source?     uint32
          +-- extended-id?       yang:hex-string
  grouping tunnel-end-point:
    +-- node-id?        nw:node-id
    +-- te-node-id?     te-types:te-node-id
    +-- tunnel-tp-id?   binary
  grouping tunnel-common-attributes:
    +-- source
    |  +---u tunnel-end-point
    +-- destination
    |  +---u tunnel-end-point
    +-- bidirectional?   boolean
  grouping tunnel-hierarchy-properties:
    +-- hierarchy
       +-- dependency-tunnels
       |  +-- dependency-tunnel* [name]
       |     +-- name?                                   tunnel-ref
       |     +---u te-types:encoding-and-switching-type
       +-- hierarchical-link
          +-- enable?                            boolean
          +-- local-node-id?                     nw:node-id
          +-- local-te-node-id?                  te-types:te-node-id
          +-- local-link-tp-id?                  nt:tp-id
          +-- local-te-link-tp-id?               te-types:te-tp-id
          +-- remote-node-id?                    nw:node-id
          +-- remote-link-tp-id?                 nt:tp-id
          +-- remote-te-link-tp-id?              te-types:te-tp-id
          +-- remote-te-node-id?                 te-types:te-node-id
          +--ro link-id?                           nt:link-id
          +-- network-id?                        nw:network-id
          +---u te-types:te-topology-identifier
  grouping path-constraints-common:
    +---u te-types:common-path-constraints-attributes
    +---u te-types:generic-path-disjointness
    +---u te-types:path-constraints-route-objects
    +-- path-in-segment!
    |  +---u te-types:label-set-info
    +-- path-out-segment!
       +---u te-types:label-set-info
]]></artwork></figure>

</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor='RFC3209' target='https://www.rfc-editor.org/info/rfc3209'>
  <front>
    <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
    <author fullname='D. Awduche' initials='D.' surname='Awduche'/>
    <author fullname='L. Berger' initials='L.' surname='Berger'/>
    <author fullname='D. Gan' initials='D.' surname='Gan'/>
    <author fullname='T. Li' initials='T.' surname='Li'/>
    <author fullname='V. Srinivasan' initials='V.' surname='Srinivasan'/>
    <author fullname='G. Swallow' initials='G.' surname='Swallow'/>
    <date month='December' year='2001'/>
    <abstract>
      <t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching). Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels. A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='3209'/>
  <seriesInfo name='DOI' value='10.17487/RFC3209'/>
</reference>

<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname='S. Bradner' initials='S.' surname='Bradner'/>
    <date month='March' year='1997'/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='2119'/>
  <seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>

<reference anchor='RFC6020' target='https://www.rfc-editor.org/info/rfc6020'>
  <front>
    <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
    <author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'/>
    <date month='October' year='2010'/>
    <abstract>
      <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6020'/>
  <seriesInfo name='DOI' value='10.17487/RFC6020'/>
</reference>

<reference anchor='RFC6241' target='https://www.rfc-editor.org/info/rfc6241'>
  <front>
    <title>Network Configuration Protocol (NETCONF)</title>
    <author fullname='R. Enns' initials='R.' role='editor' surname='Enns'/>
    <author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'/>
    <author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'/>
    <author fullname='A. Bierman' initials='A.' role='editor' surname='Bierman'/>
    <date month='June' year='2011'/>
    <abstract>
      <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6241'/>
  <seriesInfo name='DOI' value='10.17487/RFC6241'/>
</reference>

<reference anchor='RFC6991' target='https://www.rfc-editor.org/info/rfc6991'>
  <front>
    <title>Common YANG Data Types</title>
    <author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'/>
    <date month='July' year='2013'/>
    <abstract>
      <t>This document introduces a collection of common data types to be used with the YANG data modeling language. This document obsoletes RFC 6021.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6991'/>
  <seriesInfo name='DOI' value='10.17487/RFC6991'/>
</reference>

<reference anchor='RFC6107' target='https://www.rfc-editor.org/info/rfc6107'>
  <front>
    <title>Procedures for Dynamically Signaled Hierarchical Label Switched Paths</title>
    <author fullname='K. Shiomoto' initials='K.' role='editor' surname='Shiomoto'/>
    <author fullname='A. Farrel' initials='A.' role='editor' surname='Farrel'/>
    <date month='February' year='2011'/>
    <abstract>
      <t>Label Switched Paths (LSPs) set up in Multiprotocol Label Switching (MPLS) or Generalized MPLS (GMPLS) networks can be used to form links to carry traffic in those networks or in other (client) networks.</t>
      <t>Protocol mechanisms already exist to facilitate the establishment of such LSPs and to bundle traffic engineering (TE) links to reduce the load on routing protocols. This document defines extensions to those mechanisms to support identifying the use to which such LSPs are to be put and to enable the TE link endpoints to be assigned addresses or unnumbered identifiers during the signaling process. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6107'/>
  <seriesInfo name='DOI' value='10.17487/RFC6107'/>
</reference>

<reference anchor='RFC8040' target='https://www.rfc-editor.org/info/rfc8040'>
  <front>
    <title>RESTCONF Protocol</title>
    <author fullname='A. Bierman' initials='A.' surname='Bierman'/>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <author fullname='K. Watsen' initials='K.' surname='Watsen'/>
    <date month='January' year='2017'/>
    <abstract>
      <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8040'/>
  <seriesInfo name='DOI' value='10.17487/RFC8040'/>
</reference>


<reference anchor="ITU_G.808.1" >
  <front>
    <title>Generic protection switching - Linear trail and subnetwork protection</title>
    <author >
      <organization>ITU-T Recommendation G.808.1</organization>
    </author>
    <date year="2014" month="May"/>
  </front>
  <seriesInfo name="ITU-T G.808.1" value=""/>
</reference>


<reference anchor='RFC7950' target='https://www.rfc-editor.org/info/rfc7950'>
  <front>
    <title>The YANG 1.1 Data Modeling Language</title>
    <author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'/>
    <date month='August' year='2016'/>
    <abstract>
      <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7950'/>
  <seriesInfo name='DOI' value='10.17487/RFC7950'/>
</reference>

<reference anchor='RFC3473' target='https://www.rfc-editor.org/info/rfc3473'>
  <front>
    <title>Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) Extensions</title>
    <author fullname='L. Berger' initials='L.' role='editor' surname='Berger'/>
    <date month='January' year='2003'/>
    <abstract>
      <t>This document describes extensions to Multi-Protocol Label Switching (MPLS) Resource ReserVation Protocol - Traffic Engineering (RSVP-TE) signaling required to support Generalized MPLS. Generalized MPLS extends the MPLS control plane to encompass time-division (e.g., Synchronous Optical Network and Synchronous Digital Hierarchy, SONET/SDH), wavelength (optical lambdas) and spatial switching (e.g., incoming port or fiber to outgoing port or fiber). This document presents a RSVP-TE specific description of the extensions. A generic functional description can be found in separate documents. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='3473'/>
  <seriesInfo name='DOI' value='10.17487/RFC3473'/>
</reference>

<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='8174'/>
  <seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>

<reference anchor='RFC8294' target='https://www.rfc-editor.org/info/rfc8294'>
  <front>
    <title>Common YANG Data Types for the Routing Area</title>
    <author fullname='X. Liu' initials='X.' surname='Liu'/>
    <author fullname='Y. Qu' initials='Y.' surname='Qu'/>
    <author fullname='A. Lindem' initials='A.' surname='Lindem'/>
    <author fullname='C. Hopps' initials='C.' surname='Hopps'/>
    <author fullname='L. Berger' initials='L.' surname='Berger'/>
    <date month='December' year='2017'/>
    <abstract>
      <t>This document defines a collection of common data types using the YANG data modeling language. These derived common types are designed to be imported by other modules defined in the routing area.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8294'/>
  <seriesInfo name='DOI' value='10.17487/RFC8294'/>
</reference>


<reference anchor='I-D.draft-ietf-teas-rfc8776-update' target='https://datatracker.ietf.org/doc/html/draft-ietf-teas-rfc8776-update-13'>
   <front>
      <title>Common YANG Data Types for Traffic Engineering</title>
      <author fullname='Italo Busi' initials='I.' surname='Busi'>
         <organization>Huawei</organization>
      </author>
      <author fullname='Aihua Guo' initials='A.' surname='Guo'>
         <organization>Futurewei Technologies</organization>
      </author>
      <author fullname='Xufeng Liu' initials='X.' surname='Liu'>
         <organization>Alef Edge</organization>
      </author>
      <author fullname='Tarek Saad' initials='T.' surname='Saad'>
         <organization>Cisco Systems Inc.</organization>
      </author>
      <author fullname='Igor Bryskin' initials='I.' surname='Bryskin'>
         <organization>Individual</organization>
      </author>
      <date day='27' month='September' year='2024'/>
      <abstract>
	 <t>   This document defines a collection of common data types, identities,
   and groupings in YANG data modeling language.  These derived common
   data types, identities and groupings are intended to be imported by
   other modules, e.g., those which model the Traffic Engineering (TE)
   configuration and state capabilities.

   This document obsoletes RFC 8776.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-teas-rfc8776-update-13'/>
   
</reference>

<reference anchor='RFC8340' target='https://www.rfc-editor.org/info/rfc8340'>
  <front>
    <title>YANG Tree Diagrams</title>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <author fullname='L. Berger' initials='L.' role='editor' surname='Berger'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='215'/>
  <seriesInfo name='RFC' value='8340'/>
  <seriesInfo name='DOI' value='10.17487/RFC8340'/>
</reference>

<reference anchor='RFC8342' target='https://www.rfc-editor.org/info/rfc8342'>
  <front>
    <title>Network Management Datastore Architecture (NMDA)</title>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <author fullname='J. Schoenwaelder' initials='J.' surname='Schoenwaelder'/>
    <author fullname='P. Shafer' initials='P.' surname='Shafer'/>
    <author fullname='K. Watsen' initials='K.' surname='Watsen'/>
    <author fullname='R. Wilton' initials='R.' surname='Wilton'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8342'/>
  <seriesInfo name='DOI' value='10.17487/RFC8342'/>
</reference>

<reference anchor='RFC9012' target='https://www.rfc-editor.org/info/rfc9012'>
  <front>
    <title>The BGP Tunnel Encapsulation Attribute</title>
    <author fullname='K. Patel' initials='K.' surname='Patel'/>
    <author fullname='G. Van de Velde' initials='G.' surname='Van de Velde'/>
    <author fullname='S. Sangli' initials='S.' surname='Sangli'/>
    <author fullname='J. Scudder' initials='J.' surname='Scudder'/>
    <date month='April' year='2021'/>
    <abstract>
      <t>This document defines a BGP path attribute known as the "Tunnel Encapsulation attribute", which can be used with BGP UPDATEs of various Subsequent Address Family Identifiers (SAFIs) to provide information needed to create tunnels and their corresponding encapsulation headers. It provides encodings for a number of tunnel types, along with procedures for choosing between alternate tunnels and routing packets into tunnels.</t>
      <t>This document obsoletes RFC 5512, which provided an earlier definition of the Tunnel Encapsulation attribute. RFC 5512 was never deployed in production. Since RFC 5566 relies on RFC 5512, it is likewise obsoleted. This document updates RFC 5640 by indicating that the Load-Balancing Block sub-TLV may be included in any Tunnel Encapsulation attribute where load balancing is desired.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9012'/>
  <seriesInfo name='DOI' value='10.17487/RFC9012'/>
</reference>

<reference anchor='RFC8345' target='https://www.rfc-editor.org/info/rfc8345'>
  <front>
    <title>A YANG Data Model for Network Topologies</title>
    <author fullname='A. Clemm' initials='A.' surname='Clemm'/>
    <author fullname='J. Medved' initials='J.' surname='Medved'/>
    <author fullname='R. Varga' initials='R.' surname='Varga'/>
    <author fullname='N. Bahadur' initials='N.' surname='Bahadur'/>
    <author fullname='H. Ananthakrishnan' initials='H.' surname='Ananthakrishnan'/>
    <author fullname='X. Liu' initials='X.' surname='Liu'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8345'/>
  <seriesInfo name='DOI' value='10.17487/RFC8345'/>
</reference>

<reference anchor='RFC8795' target='https://www.rfc-editor.org/info/rfc8795'>
  <front>
    <title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
    <author fullname='X. Liu' initials='X.' surname='Liu'/>
    <author fullname='I. Bryskin' initials='I.' surname='Bryskin'/>
    <author fullname='V. Beeram' initials='V.' surname='Beeram'/>
    <author fullname='T. Saad' initials='T.' surname='Saad'/>
    <author fullname='H. Shah' initials='H.' surname='Shah'/>
    <author fullname='O. Gonzalez de Dios' initials='O.' surname='Gonzalez de Dios'/>
    <date month='August' year='2020'/>
    <abstract>
      <t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8795'/>
  <seriesInfo name='DOI' value='10.17487/RFC8795'/>
</reference>

<reference anchor='RFC4206' target='https://www.rfc-editor.org/info/rfc4206'>
  <front>
    <title>Label Switched Paths (LSP) Hierarchy with Generalized Multi-Protocol Label Switching (GMPLS) Traffic Engineering (TE)</title>
    <author fullname='K. Kompella' initials='K.' surname='Kompella'/>
    <author fullname='Y. Rekhter' initials='Y.' surname='Rekhter'/>
    <date month='October' year='2005'/>
    <abstract>
      <t>To improve scalability of Generalized Multi-Protocol Label Switching (GMPLS) it may be useful to aggregate Label Switched Paths (LSPs) by creating a hierarchy of such LSPs. A way to create such a hierarchy is by (a) a Label Switching Router (LSR) creating a Traffic Engineering Label Switched Path (TE LSP), (b) the LSR forming a forwarding adjacency (FA) out of that LSP (by advertising this LSP as a Traffic Engineering (TE) link into the same instance of ISIS/OSPF as the one that was used to create the LSP), (c) allowing other LSRs to use FAs for their path computation, and (d) nesting of LSPs originated by other LSRs into that LSP (by using the label stack construct).</t>
      <t>This document describes the mechanisms to accomplish this. [PROPOSED STANDARD]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4206'/>
  <seriesInfo name='DOI' value='10.17487/RFC4206'/>
</reference>

<reference anchor='RFC4427' target='https://www.rfc-editor.org/info/rfc4427'>
  <front>
    <title>Recovery (Protection and Restoration) Terminology for Generalized Multi-Protocol Label Switching (GMPLS)</title>
    <author fullname='E. Mannie' initials='E.' role='editor' surname='Mannie'/>
    <author fullname='D. Papadimitriou' initials='D.' role='editor' surname='Papadimitriou'/>
    <date month='March' year='2006'/>
    <abstract>
      <t>This document defines a common terminology for Generalized Multi-Protocol Label Switching (GMPLS)-based recovery mechanisms (i.e., protection and restoration). The terminology is independent of the underlying transport technologies covered by GMPLS. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4427'/>
  <seriesInfo name='DOI' value='10.17487/RFC4427'/>
</reference>

<reference anchor='RFC4872' target='https://www.rfc-editor.org/info/rfc4872'>
  <front>
    <title>RSVP-TE Extensions in Support of End-to-End Generalized Multi-Protocol Label Switching (GMPLS) Recovery</title>
    <author fullname='J.P. Lang' initials='J.P.' role='editor' surname='Lang'/>
    <author fullname='Y. Rekhter' initials='Y.' role='editor' surname='Rekhter'/>
    <author fullname='D. Papadimitriou' initials='D.' role='editor' surname='Papadimitriou'/>
    <date month='May' year='2007'/>
    <abstract>
      <t>This document describes protocol-specific procedures and extensions for Generalized Multi-Protocol Label Switching (GMPLS) Resource ReSerVation Protocol - Traffic Engineering (RSVP-TE) signaling to support end-to-end Label Switched Path (LSP) recovery that denotes protection and restoration. A generic functional description of GMPLS recovery can be found in a companion document, RFC 4426. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4872'/>
  <seriesInfo name='DOI' value='10.17487/RFC4872'/>
</reference>

<reference anchor='RFC6780' target='https://www.rfc-editor.org/info/rfc6780'>
  <front>
    <title>RSVP ASSOCIATION Object Extensions</title>
    <author fullname='L. Berger' initials='L.' surname='Berger'/>
    <author fullname='F. Le Faucheur' initials='F.' surname='Le Faucheur'/>
    <author fullname='A. Narayanan' initials='A.' surname='Narayanan'/>
    <date month='October' year='2012'/>
    <abstract>
      <t>The RSVP ASSOCIATION object was defined in the context of GMPLS-controlled Label Switched Paths (LSPs). In this context, the object is used to associate recovery LSPs with the LSP they are protecting. This object also has broader applicability as a mechanism to associate RSVP state. This document defines how the ASSOCIATION object can be more generally applied. This document also defines Extended ASSOCIATION objects that, in particular, can be used in the context of the MPLS Transport Profile (MPLS-TP). This document updates RFC 2205, RFC 3209, and RFC 3473. It also generalizes the definition of the Association ID field defined in RFC 4872. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6780'/>
  <seriesInfo name='DOI' value='10.17487/RFC6780'/>
</reference>

<reference anchor='RFC7471' target='https://www.rfc-editor.org/info/rfc7471'>
  <front>
    <title>OSPF Traffic Engineering (TE) Metric Extensions</title>
    <author fullname='S. Giacalone' initials='S.' surname='Giacalone'/>
    <author fullname='D. Ward' initials='D.' surname='Ward'/>
    <author fullname='J. Drake' initials='J.' surname='Drake'/>
    <author fullname='A. Atlas' initials='A.' surname='Atlas'/>
    <author fullname='S. Previdi' initials='S.' surname='Previdi'/>
    <date month='March' year='2015'/>
    <abstract>
      <t>In certain networks, such as, but not limited to, financial information networks (e.g., stock market data providers), network performance information (e.g., link propagation delay) is becoming critical to data path selection.</t>
      <t>This document describes common extensions to RFC 3630 "Traffic Engineering (TE) Extensions to OSPF Version 2" and RFC 5329 "Traffic Engineering Extensions to OSPF Version 3" to enable network performance information to be distributed in a scalable fashion. The information distributed using OSPF TE Metric Extensions can then be used to make path selection decisions based on network performance.</t>
      <t>Note that this document only covers the mechanisms by which network performance information is distributed. The mechanisms for measuring network performance information or using that information, once distributed, are outside the scope of this document.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7471'/>
  <seriesInfo name='DOI' value='10.17487/RFC7471'/>
</reference>

<reference anchor='RFC8570' target='https://www.rfc-editor.org/info/rfc8570'>
  <front>
    <title>IS-IS Traffic Engineering (TE) Metric Extensions</title>
    <author fullname='L. Ginsberg' initials='L.' role='editor' surname='Ginsberg'/>
    <author fullname='S. Previdi' initials='S.' role='editor' surname='Previdi'/>
    <author fullname='S. Giacalone' initials='S.' surname='Giacalone'/>
    <author fullname='D. Ward' initials='D.' surname='Ward'/>
    <author fullname='J. Drake' initials='J.' surname='Drake'/>
    <author fullname='Q. Wu' initials='Q.' surname='Wu'/>
    <date month='March' year='2019'/>
    <abstract>
      <t>In certain networks, such as, but not limited to, financial information networks (e.g., stock market data providers), network-performance criteria (e.g., latency) are becoming as critical to data-path selection as other metrics.</t>
      <t>This document describes extensions to IS-IS Traffic Engineering Extensions (RFC 5305). These extensions provide a way to distribute and collect network-performance information in a scalable fashion. The information distributed using IS-IS TE Metric Extensions can then be used to make path-selection decisions based on network performance.</t>
      <t>Note that this document only covers the mechanisms with which network-performance information is distributed. The mechanisms for measuring network performance or acting on that information, once distributed, are outside the scope of this document.</t>
      <t>This document obsoletes RFC 7810.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8570'/>
  <seriesInfo name='DOI' value='10.17487/RFC8570'/>
</reference>

<reference anchor='RFC8232' target='https://www.rfc-editor.org/info/rfc8232'>
  <front>
    <title>Optimizations of Label Switched Path State Synchronization Procedures for a Stateful PCE</title>
    <author fullname='E. Crabbe' initials='E.' surname='Crabbe'/>
    <author fullname='I. Minei' initials='I.' surname='Minei'/>
    <author fullname='J. Medved' initials='J.' surname='Medved'/>
    <author fullname='R. Varga' initials='R.' surname='Varga'/>
    <author fullname='X. Zhang' initials='X.' surname='Zhang'/>
    <author fullname='D. Dhody' initials='D.' surname='Dhody'/>
    <date month='September' year='2017'/>
    <abstract>
      <t>A stateful Path Computation Element (PCE) has access to not only the information disseminated by the network's Interior Gateway Protocol (IGP) but also the set of active paths and their reserved resources for its computation. The additional Label Switched Path (LSP) state information allows the PCE to compute constrained paths while considering individual LSPs and their interactions. This requires a State Synchronization mechanism between the PCE and the network, the PCE and Path Computation Clients (PCCs), and cooperating PCEs. The basic mechanism for State Synchronization is part of the stateful PCE specification. This document presents motivations for optimizations to the base State Synchronization procedure and specifies the required Path Computation Element Communication Protocol (PCEP) extensions.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8232'/>
  <seriesInfo name='DOI' value='10.17487/RFC8232'/>
</reference>

<reference anchor='RFC7271' target='https://www.rfc-editor.org/info/rfc7271'>
  <front>
    <title>MPLS Transport Profile (MPLS-TP) Linear Protection to Match the Operational Expectations of Synchronous Digital Hierarchy, Optical Transport Network, and Ethernet Transport Network Operators</title>
    <author fullname='J. Ryoo' initials='J.' role='editor' surname='Ryoo'/>
    <author fullname='E. Gray' initials='E.' role='editor' surname='Gray'/>
    <author fullname='H. van Helvoort' initials='H.' surname='van Helvoort'/>
    <author fullname='A. D&apos;Alessandro' initials='A.' surname='D&apos;Alessandro'/>
    <author fullname='T. Cheung' initials='T.' surname='Cheung'/>
    <author fullname='E. Osborne' initials='E.' surname='Osborne'/>
    <date month='June' year='2014'/>
    <abstract>
      <t>This document describes alternate mechanisms to perform some of the functions of MPLS Transport Profile (MPLS-TP) linear protection defined in RFC 6378, and also defines additional mechanisms. The purpose of these alternate and additional mechanisms is to provide operator control and experience that more closely models the behavior of linear protection seen in other transport networks.</t>
      <t>This document also introduces capabilities and modes for linear protection. A capability is an individual behavior, and a mode is a particular combination of capabilities. Two modes are defined in this document: Protection State Coordination (PSC) mode and Automatic Protection Switching (APS) mode.</t>
      <t>This document describes the behavior of the PSC protocol including priority logic and state machine when all the capabilities associated with the APS mode are enabled.</t>
      <t>This document updates RFC 6378 in that the capability advertisement method defined here is an addition to that document.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7271'/>
  <seriesInfo name='DOI' value='10.17487/RFC7271'/>
</reference>

<reference anchor='RFC8234' target='https://www.rfc-editor.org/info/rfc8234'>
  <front>
    <title>Updates to MPLS Transport Profile (MPLS-TP) Linear Protection in Automatic Protection Switching (APS) Mode</title>
    <author fullname='J. Ryoo' initials='J.' surname='Ryoo'/>
    <author fullname='T. Cheung' initials='T.' surname='Cheung'/>
    <author fullname='H. van Helvoort' initials='H.' surname='van Helvoort'/>
    <author fullname='I. Busi' initials='I.' surname='Busi'/>
    <author fullname='G. Wen' initials='G.' surname='Wen'/>
    <date month='August' year='2017'/>
    <abstract>
      <t>This document contains updates to MPLS Transport Profile (MPLS-TP) linear protection in Automatic Protection Switching (APS) mode defined in RFC 7271. The updates provide rules related to the initialization of the Protection State Coordination (PSC) Control Logic (in which the state machine resides) when operating in APS mode and clarify the operation related to state transition table lookup.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8234'/>
  <seriesInfo name='DOI' value='10.17487/RFC8234'/>
</reference>

<reference anchor='RFC7308' target='https://www.rfc-editor.org/info/rfc7308'>
  <front>
    <title>Extended Administrative Groups in MPLS Traffic Engineering (MPLS-TE)</title>
    <author fullname='E. Osborne' initials='E.' surname='Osborne'/>
    <date month='July' year='2014'/>
    <abstract>
      <t>MPLS Traffic Engineering (MPLS-TE) advertises 32 administrative groups (commonly referred to as "colors" or "link colors") using the Administrative Group sub-TLV. This is defined for OSPFv2 (RFC 3630), OSPFv3 (RFC 5329) and IS-IS (RFC 5305).</t>
      <t>This document adds a sub-TLV to the IGP TE extensions, "Extended Administrative Group". This sub-TLV provides for additional administrative groups (link colors) beyond the current limit of 32.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7308'/>
  <seriesInfo name='DOI' value='10.17487/RFC7308'/>
</reference>

<reference anchor='RFC8343' target='https://www.rfc-editor.org/info/rfc8343'>
  <front>
    <title>A YANG Data Model for Interface Management</title>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>This document defines a YANG data model for the management of network interfaces. It is expected that interface-type-specific data models augment the generic interfaces data model defined in this document. The data model includes definitions for configuration and system state (status information and counters for the collection of statistics).</t>
      <t>The YANG data model in this document conforms to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
      <t>This document obsoletes RFC 7223.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8343'/>
  <seriesInfo name='DOI' value='10.17487/RFC8343'/>
</reference>

<reference anchor='RFC8639' target='https://www.rfc-editor.org/info/rfc8639'>
  <front>
    <title>Subscription to YANG Notifications</title>
    <author fullname='E. Voit' initials='E.' surname='Voit'/>
    <author fullname='A. Clemm' initials='A.' surname='Clemm'/>
    <author fullname='A. Gonzalez Prieto' initials='A.' surname='Gonzalez Prieto'/>
    <author fullname='E. Nilsen-Nygaard' initials='E.' surname='Nilsen-Nygaard'/>
    <author fullname='A. Tripathy' initials='A.' surname='Tripathy'/>
    <date month='September' year='2019'/>
    <abstract>
      <t>This document defines a YANG data model and associated mechanisms enabling subscriber-specific subscriptions to a publisher's event streams. Applying these elements allows a subscriber to request and receive a continuous, customized feed of publisher-generated information.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8639'/>
  <seriesInfo name='DOI' value='10.17487/RFC8639'/>
</reference>

<reference anchor='RFC8641' target='https://www.rfc-editor.org/info/rfc8641'>
  <front>
    <title>Subscription to YANG Notifications for Datastore Updates</title>
    <author fullname='A. Clemm' initials='A.' surname='Clemm'/>
    <author fullname='E. Voit' initials='E.' surname='Voit'/>
    <date month='September' year='2019'/>
    <abstract>
      <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8641'/>
  <seriesInfo name='DOI' value='10.17487/RFC8641'/>
</reference>

<reference anchor='RFC3688' target='https://www.rfc-editor.org/info/rfc3688'>
  <front>
    <title>The IETF XML Registry</title>
    <author fullname='M. Mealling' initials='M.' surname='Mealling'/>
    <date month='January' year='2004'/>
    <abstract>
      <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='81'/>
  <seriesInfo name='RFC' value='3688'/>
  <seriesInfo name='DOI' value='10.17487/RFC3688'/>
</reference>

<reference anchor='RFC6242' target='https://www.rfc-editor.org/info/rfc6242'>
  <front>
    <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
    <author fullname='M. Wasserman' initials='M.' surname='Wasserman'/>
    <date month='June' year='2011'/>
    <abstract>
      <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6242'/>
  <seriesInfo name='DOI' value='10.17487/RFC6242'/>
</reference>

<reference anchor='RFC8446' target='https://www.rfc-editor.org/info/rfc8446'>
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname='E. Rescorla' initials='E.' surname='Rescorla'/>
    <date month='August' year='2018'/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8446'/>
  <seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>

<reference anchor='RFC8341' target='https://www.rfc-editor.org/info/rfc8341'>
  <front>
    <title>Network Configuration Access Control Model</title>
    <author fullname='A. Bierman' initials='A.' surname='Bierman'/>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
      <t>This document obsoletes RFC 6536.</t>
    </abstract>
  </front>
  <seriesInfo name='STD' value='91'/>
  <seriesInfo name='RFC' value='8341'/>
  <seriesInfo name='DOI' value='10.17487/RFC8341'/>
</reference>




    </references>

    <references title='Informative References'>



<reference anchor='RFC9256' target='https://www.rfc-editor.org/info/rfc9256'>
  <front>
    <title>Segment Routing Policy Architecture</title>
    <author fullname='C. Filsfils' initials='C.' surname='Filsfils'/>
    <author fullname='K. Talaulikar' initials='K.' role='editor' surname='Talaulikar'/>
    <author fullname='D. Voyer' initials='D.' surname='Voyer'/>
    <author fullname='A. Bogdanov' initials='A.' surname='Bogdanov'/>
    <author fullname='P. Mattes' initials='P.' surname='Mattes'/>
    <date month='July' year='2022'/>
    <abstract>
      <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
      <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9256'/>
  <seriesInfo name='DOI' value='10.17487/RFC9256'/>
</reference>

<reference anchor='RFC3945' target='https://www.rfc-editor.org/info/rfc3945'>
  <front>
    <title>Generalized Multi-Protocol Label Switching (GMPLS) Architecture</title>
    <author fullname='E. Mannie' initials='E.' role='editor' surname='Mannie'/>
    <date month='October' year='2004'/>
    <abstract>
      <t>Future data and transmission networks will consist of elements such as routers, switches, Dense Wavelength Division Multiplexing (DWDM) systems, Add-Drop Multiplexors (ADMs), photonic cross-connects (PXCs), optical cross-connects (OXCs), etc. that will use Generalized Multi-Protocol Label Switching (GMPLS) to dynamically provision resources and to provide network survivability using protection and restoration techniques.</t>
      <t>This document describes the architecture of GMPLS. GMPLS extends MPLS to encompass time-division (e.g., SONET/SDH, PDH, G.709), wavelength (lambdas), and spatial switching (e.g., incoming port or fiber to outgoing port or fiber). The focus of GMPLS is on the control plane of these various layers since each of them can use physically diverse data or forwarding planes. The intention is to cover both the signaling and the routing part of that control plane. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='3945'/>
  <seriesInfo name='DOI' value='10.17487/RFC3945'/>
</reference>

<reference anchor='rfc3473' target='https://www.rfc-editor.org/info/rfc3473'>
  <front>
    <title>Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) Extensions</title>
    <author fullname='L. Berger' initials='L.' role='editor' surname='Berger'/>
    <date month='January' year='2003'/>
    <abstract>
      <t>This document describes extensions to Multi-Protocol Label Switching (MPLS) Resource ReserVation Protocol - Traffic Engineering (RSVP-TE) signaling required to support Generalized MPLS. Generalized MPLS extends the MPLS control plane to encompass time-division (e.g., Synchronous Optical Network and Synchronous Digital Hierarchy, SONET/SDH), wavelength (optical lambdas) and spatial switching (e.g., incoming port or fiber to outgoing port or fiber). This document presents a RSVP-TE specific description of the extensions. A generic functional description can be found in separate documents. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='3473'/>
  <seriesInfo name='DOI' value='10.17487/RFC3473'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

