YANG Data Model for Bidirectional Forwarding Detection (BFD) Hardware Offloaded Session
draft-rvelucha-bfd-offload-yang-06
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Author | RAJAGURU VELUCHAMY | ||
Last updated | 2023-10-05 (Latest revision 2023-04-03) | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Yang Validation | 0 errors, 1 warnings | ||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document defines a extension YANG data model that can be used to manage Hardware Offloaded Bidirectional Forwarding Detection (BFD). This document specially talks about BFD sessions that are offloaded to hardware. The YANG modules in this document conform to the Network Management Datastore Architecture (NMDA).
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)