Network Working Group L. Zheng, Ed.
Internet-Draft Huawei Technologies
Intended status: Standards Track R. Rahman, Ed.
Expires: September 7, 2015 Cisco Systems
S. Pallagatti
Juniper Networks
M. Jethanandani
Ciena Corporation
March 6, 2015
Yang Data Model for Bidirectional Forwarding Detection (BFD)
draft-zheng-bfd-yang-00.txt
Abstract
This document defines a YANG data model that can be used to configure
and manage Bidirectional Forwarding Detection (BFD).
Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on September 7, 2015.
Copyright Notice
Copyright (c) 2015 IETF Trust and the persons identified as the
document authors. All rights reserved.
Zheng, et al. Expires September 7, 2015 [Page 1]
Internet-Draft BFD Yang March 2015
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Contributors . . . . . . . . . . . . . . . . . . . . . . 3
2. Design of the Data Model . . . . . . . . . . . . . . . . . . 3
2.1. Design of configuration model . . . . . . . . . . . . . . 3
2.1.1. Centralized BFD configuration . . . . . . . . . . . . 4
2.1.1.1. Common BFD configuration . . . . . . . . . . . . 4
2.1.1.2. Single-hop IP . . . . . . . . . . . . . . . . . . 4
2.1.1.3. Multi-hop IP . . . . . . . . . . . . . . . . . . 5
2.1.1.4. MPLS LSP . . . . . . . . . . . . . . . . . . . . 5
2.1.1.5. Link Aggregation Group . . . . . . . . . . . . . 5
2.1.1.6. Per-interface configuration . . . . . . . . . . . 6
2.1.2. Configuration in BFD clients . . . . . . . . . . . . 6
2.2. Design of operational model . . . . . . . . . . . . . . . 7
2.3. Notifications . . . . . . . . . . . . . . . . . . . . . . 7
2.4. RPC Operations . . . . . . . . . . . . . . . . . . . . . 7
2.5. BFD Configuration Data Hierarchy . . . . . . . . . . . . 8
2.5.1. Centralized BFD configuration . . . . . . . . . . . . 8
2.5.2. Configuration in BFD clients . . . . . . . . . . . . 10
2.6. Operational Data Hierarchy . . . . . . . . . . . . . . . 10
2.7. Notifications . . . . . . . . . . . . . . . . . . . . . . 12
2.8. Examples . . . . . . . . . . . . . . . . . . . . . . . . 13
2.9. Interaction with other YANG modules . . . . . . . . . . . 13
2.10. BFD Yang Module . . . . . . . . . . . . . . . . . . . . . 13
2.11. BFD Client Example Configuration Yang Module . . . . . . 26
2.12. Security Considerations . . . . . . . . . . . . . . . . . 27
2.13. IANA Considerations . . . . . . . . . . . . . . . . . . . 27
2.14. Acknowledgements . . . . . . . . . . . . . . . . . . . . 28
3. References . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.1. Normative References . . . . . . . . . . . . . . . . . . 28
3.2. Informative References . . . . . . . . . . . . . . . . . 29
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 29
Zheng, et al. Expires September 7, 2015 [Page 2]
Internet-Draft BFD Yang March 2015
1. Introduction
YANG [RFC6020] is a data definition language that was introduced to
define the contents of a conceptual data store that allows networked
devices to be managed using NETCONF [RFC6241]. YANG is proving
relevant beyond its initial confines, as bindings to other interfaces
(e.g RESTCONF [I-D.ietf-netconf-restconf]) and encodings other than
XML (e.g JSON) are being defined. Furthermore, YANG data models can
be used as the basis of implementation for other interfaces, such as
CLI and programmatic APIs.
This document defines a YANG data model that can be used to configure
and manage Bidirectional Forwarding Detection (BFD)[RFC5880]. BFD is
a network protocol which is used for liveness detection of arbitrary
paths between systems. Some examples of different types of paths
over which we have BFD:
1) Two systems directly connected via IP. This is known as BFD over
single-hop IP [RFC5881]
2) Two systems connected via multiple hops [RFC5883]
3) Two systems connected via MPLS Label Switched Paths (LSPs)
[RFC5884]
4) Two systems connected via a Link Aggregation Group (LAG) interface
[RFC7130]
BFD typically does not operate on its own. Various control
protocols, aka BFD clients, use the services provided by BFD for
their own operation [RFC5882]. The obvious candidates which use BFD
are those which do not have Hellos to detect failures (e.g. static
routes) and routing protocols whose Hellos do not suport sub-second
failure detection, e.g OSPF and IS-IS.
1.1. Contributors
2. Design of the Data Model
2.1. Design of configuration model
The configuration model consists mainly of the parameters specified
in [RFC5880]. Some examples are desired minimum transmit interval,
required minimum receive interval, detection multiplier etc
Some implementations have BFD configuration under the BFD client,
e.g. BFD configuration is under routing applications such as OSPF,
IS-IS, BGP etc. Other implementations have BFD configuration
Zheng, et al. Expires September 7, 2015 [Page 3]
Internet-Draft BFD Yang March 2015
centralized, i.e outside the multiple BFD clients. In the sections
below we address both approaches.
2.1.1. Centralized BFD configuration
The BFD data model consists of configuring BFD sessions of different
types (e.g. single-hop IP, multi-hop IP etc). Since the different
session types have different keys we have a list per session type,
but we use a grouping to share the common configuration data between
the different session types.
2.1.1.1. Common BFD configuration
The common BFD session configuration items are put in a grouping to
be used in multiple places, these items are:
local-multiplier
This is the detection time multiplier as defined in
[RFC5880].
desired-min-tx-interval
This is the Desired Min TX Interval as defined in [RFC5880].
required-min-rx-interval
This is the Required Min RX Interval as defined in [RFC5880].
demand-enabled
Set to True to enable demand mode as defined in [RFC5880].
enable-authentication
Set to True to enable BFD authentication.
authentication-algorithm
Authentication algorithm to use (if enabled).
key-chain-name
Key-chain to be used for authentication (if enabled).
2.1.1.2. Single-hop IP
We have a list for BFD sessions over single-hop IP. The key consists
of:
interface
This is the interface on which the BFD packets for this
session are transmitted and received. Examples of an
interface are physical media, virtual circuit, tunnel etc.
Zheng, et al. Expires September 7, 2015 [Page 4]
Internet-Draft BFD Yang March 2015
destination address
Address belonging to the peer system as per [RFC5881]
The common configuration data in Section 2.1.1.1 is used for single-
hop IP. On top of that common data, we also need configuration data
for echo:
desired-min-echo-tx-interval
This is the minimum interval that the local system would like
to use when transmitting BFD echo packets. If 0 the echo
function as defined in [RFC5880] is disabled.
required-min-echo-rx-interval
The is the Required Min Echo RX Interval as defined in
[RFC5880].
2.1.1.3. Multi-hop IP
We have a list for BFD sessions over multi-hop IP. The key consists
of:
source address
Address belonging to the local system as per [RFC5883]
destination address
Address belonging to the remote system as per [RFC5883]
VRF name
VRF in which the BFD multi-hop session is running
The common configuration data in Section 2.1.1.1 is used for multi-
hop IP.On top of that common data, we also need TTL:
ttl
TTL of outgoing BFD control packets.
2.1.1.4. MPLS LSP
TBD
2.1.1.5. Link Aggregation Group
TBD
Zheng, et al. Expires September 7, 2015 [Page 5]
Internet-Draft BFD Yang March 2015
2.1.1.6. Per-interface configuration
For implementations which have multiplier and intervals configured
under the BFD clients we still need a central location to configure
authentication, demand mode etc. This can be done by configuring the
following parameters per interface:
Common parameters
The common BFD parameters listed in Section 2.1.1.1
Echo parameters
The echo parameters listed in Section 2.1.1.2
2.1.2. Configuration in BFD clients
When BFD is configured in BFD clients, it is highly desirable to have
BFD configuration consistency between those clients. In this
approach we have a grouping for BFD configuration which applications
can import in their YANG module:
- This provides consistency since the same grouping is being used in
all applications making use of BFD
- Since not all implementations of those BFD clients have support for
BFD, we must use if-feature in the respective YANG modules
An application importing the BFD configuration grouping could do so
in a hierarchical manner if it has multiple levels at which BFD
configuration can be applied. In a subsequent section we provide an
example of how a BFD client would use the grouping in such a way.
The configuration items are:
enabled
Set to True to enable BFD.
local-multiplier
This the detection time multiplier as defined in [RFC5880].
desired-min-tx-interval
This the Desired Min TX Interval as defined in [RFC5880].
required-min-rx-interval
This the Required Min RX Interval as defined in [RFC5880].
Zheng, et al. Expires September 7, 2015 [Page 6]
Internet-Draft BFD Yang March 2015
2.2. Design of operational model
The operational model contains both the overall statistics of BFD
sessions running on the device and the per session operational
statistics. Since BFD is used for liveness detection of arbitrary
paths, there is no uniform key to identify a BFD session. e.g. a BFD
single-hop IP session is uniquely identified by the combination of
destination IP address and interface whereas a multihop IP session is
uniquely identified by the combination of source IP address,
destination IP address and VRF. For this reason, for per session
operational statistics, we do not have a single list with different
type BFD sessions. Instead we have a container in which we have
multiple lists, where each list corresponds to one specific path type
for BFD. For example we have one operational list for BFD single-hop
IP, another list for BFD multi-hop IP etc. In each list, mainly
three categories of operational items are shown. The fundamental
information of a BFD session such as the local discriminator, remote
discriminator and the capability of supporting demand detect mode are
shown in the first category. A second category includes a BFD
session running information, e.g. the FSM the device in and
diagnostic code received. Another example is the actual transmit
interval between the control packets, which may be different from the
desired minimum transmit interval configured, is shown in this
category. Similar examples are actual received interval between the
control packets and the actual transmit interval between the echo
packets. The third category contains the detailed statistics of this
session, e.g. when the session went to up/down, how long it has been
since the session is up/down.
2.3. Notifications
This YANG model defines a list of notifications to inform clients of
BFD with important events detected during the protocol operation.
Pair of local and remote discriminator identifies a BFD session on
local system. Notification also give more important details about
BFD sessions e.g. new state, time in previous state, VRF and reason
for BFD session state changed.
2.4. RPC Operations
TBD
Zheng, et al. Expires September 7, 2015 [Page 7]
Internet-Draft BFD Yang March 2015
2.5. BFD Configuration Data Hierarchy
2.5.1. Centralized BFD configuration
The following is the centralized configuration data hierarchy:
We have a container which contains a list for each session type
We have per-interface configuration
Zheng, et al. Expires September 7, 2015 [Page 8]
Internet-Draft BFD Yang March 2015
module: bfd
+--rw bfd-cfg
| +--rw bfd-session-cfg {bfd-centralized-session-config}?
| | +--rw session-ip-sh* [interface dest-addr]
| | | +--rw interface if:interface-ref
| | | +--rw dest-addr inet:ip-address
| | | +--rw admin-down? boolean
| | | +--rw local-multiplier? multiplier
| | | +--rw desired-min-tx-interval uint32
| | | +--rw required-min-rx-interval uint32
| | | +--rw demand-enabled? boolean
| | | +--rw enable-authentication? boolean
| | | +--rw authentication-parms {bfd-authentication}?
| | | | +--rw key-chain-name? string
| | | | +--rw algorithm? bfd-auth-algorithm
| | | +--rw desired-min-echo-tx-interval? uint32
| | | +--rw required-min-echo-rx-interval? uint32
| | +--rw session-ip-mh* [vrf-name source-addr dest-addr]
| | +--rw vrf-name vrfName
| | +--rw source-addr inet:ip-address
| | +--rw dest-addr inet:ip-address
| | +--rw admin-down? boolean
| | +--rw local-multiplier? multiplier
| | +--rw desired-min-tx-interval uint32
| | +--rw required-min-rx-interval uint32
| | +--rw demand-enabled? boolean
| | +--rw enable-authentication? boolean
| | +--rw authentication-parms {bfd-authentication}?
| | | +--rw key-chain-name? string
| | | +--rw algorithm? bfd-auth-algorithm
| | +--rw tx-ttl? TTL
| | +--rw rx-ttl TTL
| +--rw bfd-interface-cfg* [interface] {bfd-interface-config}?
| +--rw interface if:interface-ref
| +--rw local-multiplier? multiplier
| +--rw desired-min-tx-interval uint32
| +--rw required-min-rx-interval uint32
| +--rw demand-enabled? boolean
| +--rw enable-authentication? boolean
| +--rw authentication-parms {bfd-authentication}?
| | +--rw key-chain-name? string
| | +--rw algorithm? bfd-auth-algorithm
| +--rw desired-min-echo-tx-interval? uint32
| +--rw required-min-echo-rx-interval? uint32
Zheng, et al. Expires September 7, 2015 [Page 9]
Internet-Draft BFD Yang March 2015
2.5.2. Configuration in BFD clients
The following is the configuration data hierarchy for a hypothetical
BFD client called bfd-routing-app, the BFD configuration is supported
conditionally via use of if-feature.
We have a list of areas and in each area we have a list of
interfaces. The BFD configuration grouping is used in a hierarchical
fashion, it can be applied in "area" and "interface":
- If BFD configuration is applied under an interface, that
configuration takes precedence over any BFD configuration (if any) at
the area level
- If BFD configuration is applied under an "area" and none of the
interfaces in that area has BFD configuration, then all interfaces
belong to the "area" in question inherit the BFD configuration for
the area in question.
- If the BFD client implementation supports "interface all", then all
the interfaces belonging to that area will inherit the BFD
configuration under "interface all". Along with this if there are
specific interface configuration then specific interface will
override the "interface all" parameters.
module: bfd-routing-app
+--rw area* [area-id]
+--rw area-id uint32
+--rw bfd-cfg
| +--rw enabled? boolean
| +--rw local-multiplier? multiplier
| +--rw desired-min-tx-interval uint32
| +--rw required-min-rx-interval uint32
+--rw interface* [interface]
+--rw interface if:interface-ref
+--rw bfd-cfg
+--rw enabled? boolean
+--rw local-multiplier? multiplier
+--rw desired-min-tx-interval uint32
+--rw required-min-rx-interval uint32
2.6. Operational Data Hierarchy
The complete data hierarchy of BFD YANG operational model is
presented below.
Zheng, et al. Expires September 7, 2015 [Page 10]
Internet-Draft BFD Yang March 2015
module: bfd
+--rw bfd-oper
+--ro bfd-session-statistics
| +--ro ip-sh-session-num? uint32
| +--ro ip-mh-session-num? uint32
| +--ro total-session-num? uint32
| +--ro session-up-num? uint32
| +--ro sess-down-num? uint32
+--ro bfd-session-lists
+--ro session-ip-sh* [interface dest-addr]
| +--ro interface if:interface-ref
| +--ro dest-addr inet:ip-address
| +--ro sesssion-type? enumeration
| +--ro local-discriminator? discriminator
| +--ro remote-discriminator? discriminator
| +--ro remote-multiplier? multiplier
| +--ro out-interface? if:interface-ref
| +--ro demand-capability? boolean
| +--ro session-running*
| | +--ro local-state? state
| | +--ro remote-state? state
| | +--ro local-diagnostic? diagnostic
| | +--ro remote-diagnostic? diagnostic
| | +--ro detect-Mode? enumeration
| | +--ro actual-tx-interval? uint32
| | +--ro actual-rx-interval? uint32
| | +--ro actual-echo-tx-interval? uint32
| | +--ro detect-time? uint32
| +--ro sesssion-statistics*
| +--ro create-time? yang:date-and-time
| +--ro last-down-time? yang:date-and-time
| +--ro last-up-time? yang:date-and-time
| +--ro receive-pkt? uint64
| +--ro send-pkt? uint64
| +--ro down-count? uint32
| +--ro receive-bad-pkt? uint64
| +--ro send-failed-pkt? uint64
| +--ro short-break-count? uint32
+--ro session-ip-mh* [vrfName source-addr dest-addr]
+--ro vrfName vrfName
+--ro source-addr inet:ip-address
+--ro dest-addr inet:ip-address
+--ro ttl? TTL
+--ro sesssion-type? enumeration
+--ro local-discriminator? discriminator
+--ro remote-discriminator? discriminator
+--ro remote-multiplier? multiplier
+--ro out-interface? if:interface-ref
Zheng, et al. Expires September 7, 2015 [Page 11]
Internet-Draft BFD Yang March 2015
+--ro demand-capability? boolean
+--ro session-running*
| +--ro local-state? state
| +--ro remote-state? state
| +--ro local-diagnostic? diagnostic
| +--ro remote-diagnostic? diagnostic
| +--ro detect-Mode? enumeration
| +--ro actual-tx-interval? uint32
| +--ro actual-rx-interval? uint32
| +--ro actual-echo-tx-interval? uint32
| +--ro detect-time? uint32
+--ro sesssion-statistics*
+--ro create-time? yang:date-and-time
+--ro last-down-time? yang:date-and-time
+--ro last-up-time? yang:date-and-time
+--ro receive-pkt? uint64
+--ro send-pkt? uint64
+--ro down-count? uint32
+--ro receive-bad-pkt? uint64
+--ro send-failed-pkt? uint64
+--ro short-break-count? uint32
2.7. Notifications
The BFD YANG data model defines notifications for BFD session state
changes.
module: bfd
notifications:
+---n bfd-singlehop-notification
| +--ro local-discr? discriminator
| +--ro remote-discr? discriminator
| +--ro new-state? state
| +--ro state-change-reason? string
| +--ro time-in-previous-state? string
| +--ro dest-addr? inet:ip-address
| +--ro interface? if:interface-ref
| +--ro echo-enabled? boolean
+---n bfd-multihop-notification
+--ro local-discr? discriminator
+--ro remote-discr? discriminator
+--ro new-state? state
+--ro state-change-reason? string
+--ro time-in-previous-state? string
+--ro dest-addr? inet:ip-address
+--ro vrf-name? vrfName
+--ro source-addr? inet:ip-address
Zheng, et al. Expires September 7, 2015 [Page 12]
Internet-Draft BFD Yang March 2015
2.8. Examples
2.9. Interaction with other YANG modules
TBD.
2.10. BFD Yang Module
<CODE BEGINS>
module bfd {
namespace "urn:ietf:params:xml:ns:yang:bfd";
// replace with IANA namespace when assigned
prefix "bfd";
import ietf-interfaces {
prefix "if";
}
import ietf-inet-types {
prefix "inet";
}
import ietf-yang-types {
prefix yang;
}
organization "IETF BFD Working Group";
contact
"WG Web: <http://tools.ietf.org/wg/bfd>
WG List: <rtg-bfd@ietf.org>
WG Chair: Jeff Haas
WG Chair: Nobo Akiya
Editor: Lianshu Zheng and Reshad Rahman";
description
"This module contains the YANG definition for BFD parameters as
per RFC5880, RFC5881 and RFC5883";
revision 2015-03-05 {
description "Initial revision.";
}
typedef discriminator {
type uint32 {
range 1..4294967295;
}
}
Zheng, et al. Expires September 7, 2015 [Page 13]
Internet-Draft BFD Yang March 2015
typedef diagnostic {
type enumeration {
enum none {
value 0;
}
enum controlExpiry {
value 1;
}
enum echoFailed {
value 2;
}
enum nborDown {
value 3;
}
enum fwdingReset {
value 4;
}
enum pathDown {
value 5;
}
enum concPathDown {
value 6;
}
enum adminDown {
value 7;
}
enum reverseConcPathDown {
value 8;
}
}
}
typedef state {
type enumeration {
enum adminDown {
value 0;
}
enum down {
value 1;
}
enum init {
value 2;
}
enum up {
value 3;
}
}
}
Zheng, et al. Expires September 7, 2015 [Page 14]
Internet-Draft BFD Yang March 2015
typedef multiplier {
type uint8 {
range 1..255;
}
}
typedef TTL {
type uint8 {
range 1..255;
}
}
typedef bfd-auth-algorithm {
description "Authentication algorithm";
type enumeration {
enum simple-password {
description
"Simple password";
}
enum keyed-md5 {
description
"Keyed message Digest 5";
}
enum meticulous-keyed-md5 {
description
"Meticulous keyed message Digest 5";
}
enum keyed-sha-1 {
description
"Keyed secure hash algorithm (SHA1) ";
}
enum meticulous-keyed-sha-1 {
description
"Meticulous keyed secure hash algorithm (SHA1) ";
}
}
}
typedef vrfName {
description "VRF Name";
type string;
}
feature bfd-centralized-session-config {
Zheng, et al. Expires September 7, 2015 [Page 15]
Internet-Draft BFD Yang March 2015
description "BFD session centralized config supported";
}
feature bfd-interface-config {
description "BFD per-interface config supported";
}
feature bfd-authentication {
description "BFD authentication supported";
}
grouping bfd-grouping-common-cfg-parms {
description "BFD grouping for common config parameters";
leaf local-multiplier {
description "Local multiplier";
type multiplier;
default 3;
}
leaf desired-min-tx-interval {
description
"Desired minimum transmit interval of control packets";
type uint32;
units microseconds;
mandatory true;
}
leaf required-min-rx-interval {
description
"Required minimum receive interval of control packets";
type uint32;
units microseconds;
mandatory true;
}
leaf demand-enabled {
description "To enbale demand mode";
type boolean;
default false;
}
leaf enable-authentication {
description
"If set, the Authentication Section is present and the session
is to be authenticated (see RFC5880 section 6.7 for details).";
type boolean;
default false;
}
Zheng, et al. Expires September 7, 2015 [Page 16]
Internet-Draft BFD Yang March 2015
container authentication-parms {
if-feature bfd-authentication;
leaf key-chain-name {
description
"Key chain name";
must "../algorithm" {
error-message
"May not be configured without algorithm";
}
type string;
}
leaf algorithm {
description "Authentication algorithm to be used";
must "../key-chain" {
error-message
"May not be configured without key-chain";
}
type bfd-auth-algorithm;
}
}
}
grouping bfd-grouping-echo-cfg-parms {
description "BFD grouping for echo config parameters";
leaf desired-min-echo-tx-interval {
description "Desired minumum transmit interval for echo";
type uint32;
units microseconds;
default 0;
}
leaf required-min-echo-rx-interval {
description "Required minimum receive interval for echo";
type uint32;
units microseconds;
default 0;
}
}
grouping bfd-client-base-cfg-parms {
description
"BFD grouping for base config parameters which could be used
by a protocol which is a client of BFD";
container bfd-cfg {
leaf enabled {
type boolean;
description "True if BFD is enabled";
Zheng, et al. Expires September 7, 2015 [Page 17]
Internet-Draft BFD Yang March 2015
default false;
}
leaf local-multiplier {
type multiplier;
default 3;
}
leaf desired-min-tx-interval {
description
"Desired minimum transmit interval of control packets";
type uint32;
units microseconds;
mandatory true;
}
leaf required-min-rx-interval {
description
"Required minimum receive interval of control packets";
type uint32;
units microseconds;
mandatory true;
}
}
}
grouping bfd-client-full-cfg-parms {
description
"BFD grouping for complete config parameters which could be used
by a protocol which is a client of BFD.";
container bfd-cfg {
leaf enabled {
type boolean;
description "True if BFD is enabled";
default false;
}
uses bfd-grouping-common-cfg-parms;
uses bfd-grouping-echo-cfg-parms;
}
}
grouping bfd-all-session {
description "BFD session operational information";
leaf sesssion-type {
description
Zheng, et al. Expires September 7, 2015 [Page 18]
Internet-Draft BFD Yang March 2015
"BFD session type, this indicates the path type that BFD is
running on";
type enumeration {
enum ip-single-hop {
value "0";
description "IP single hop";
}
enum ip-multi-hop {
value "1";
description "IP multi hop";
}
}
}
leaf local-discriminator {
description "Local discriminator";
type discriminator;
}
leaf remote-discriminator {
description "Remote discriminator";
type discriminator;
}
leaf remote-multiplier {
description "Remote multiplier";
type multiplier;
}
leaf out-interface {
description "Outgoing physical interface name";
type if:interface-ref;
}
leaf demand-capability{
description "Local demand mode capability";
type boolean;
}
list session-running {
description "BFD session running information";
leaf local-state {
type state;
}
leaf remote-state {
type state;
}
leaf local-diagnostic {
type diagnostic;
}
leaf remote-diagnostic {
type diagnostic;
}
Zheng, et al. Expires September 7, 2015 [Page 19]
Internet-Draft BFD Yang March 2015
leaf detect-Mode {
description "Detect mode";
type enumeration {
enum async-with-echo {
value "0";
description "Async with echo";
}
enum async-without-echo {
value "1";
description "Async without echo";
}
enum demand-with-echo {
value "2";
description "Demand with echo";
}
enum demand-without-echo {
value "3";
description "Demand without echo";
}
}
}
leaf actual-tx-interval {
description "Actual transmit interval";
type uint32;
units microseconds;
}
leaf actual-rx-interval {
description "Actual receive interval";
type uint32;
units microseconds;
}
leaf actual-echo-tx-interval {
description "Actual echo transmit interval";
type uint32;
units microseconds;
}
leaf detect-time {
description "Detect time";
type uint32;
units microseconds;
}
}
list sesssion-statistics {
description "BFD session statistics";
leaf create-time {
description
Zheng, et al. Expires September 7, 2015 [Page 20]
Internet-Draft BFD Yang March 2015
"Time and date when session was created";
type yang:date-and-time;
}
leaf last-down-time {
description
"Time and date of last time the session went down";
type yang:date-and-time;
}
leaf last-up-time {
description
"Time and date of last time the session went up";
type yang:date-and-time;
}
leaf receive-pkt {
description "Received Packet Count";
type uint64;
}
leaf send-pkt {
description "Sent Packet Count";
type uint64;
}
leaf down-count {
description "Session Down Count";
type uint32;
}
leaf receive-bad-pkt {
description "Received bad packet count";
type uint64;
}
leaf send-failed-pkt {
description "Packet Failed to Send Count";
type uint64;
}
leaf short-break-count {
description "Shortbreak count";
default "0";
type uint32;
}
}
}
container bfd-cfg {
container bfd-session-cfg {
if-feature bfd-centralized-session-config;
list session-ip-sh {
key "interface dest-addr";
leaf interface {
description
Zheng, et al. Expires September 7, 2015 [Page 21]
Internet-Draft BFD Yang March 2015
"Interface on which the IP single-hop session is running.";
type if:interface-ref;
}
leaf dest-addr {
description
"IP address of the peer";
type inet:ip-address;
}
leaf admin-down {
description
"Is the BFD session administratively down";
type boolean;
default false;
}
uses bfd-grouping-common-cfg-parms;
uses bfd-grouping-echo-cfg-parms;
}
list session-ip-mh {
key "vrf-name source-addr dest-addr";
leaf vrf-name {
description "Routing instance";
type vrfName;
}
leaf source-addr {
description
"Local IP address";
type inet:ip-address;
}
leaf dest-addr {
description
"IP address of the peer";
type inet:ip-address;
}
leaf admin-down {
description
"Is the BFD session administratively down";
type boolean;
default false;
}
uses bfd-grouping-common-cfg-parms;
leaf tx-ttl {
type TTL;
default 255;
description "TTL of outgoing BFD control packets";
Zheng, et al. Expires September 7, 2015 [Page 22]
Internet-Draft BFD Yang March 2015
}
leaf rx-ttl {
type TTL;
description
"Minimum allowed TTL value for incoming BFD control
packets";
mandatory true;
}
}
}
list bfd-interface-cfg {
if-feature bfd-interface-config;
description "Per-interface BFD configuration";
key interface;
leaf interface {
type if:interface-ref;
}
uses bfd-grouping-common-cfg-parms;
uses bfd-grouping-echo-cfg-parms;
}
}
container bfd-oper {
container bfd-session-statistics {
config "false";
description "BFD session number";
leaf ip-sh-session-num {
description "IP single hop session number";
config "false";
type uint32;
}
leaf ip-mh-session-num {
description "IP multi hop session Number";
config "false";
type uint32;
}
leaf total-session-num {
description "Total session number";
config "false";
type uint32;
}
leaf session-up-num {
description "Session up number";
config "false";
Zheng, et al. Expires September 7, 2015 [Page 23]
Internet-Draft BFD Yang March 2015
type uint32;
}
leaf sess-down-num {
description "Session down number";
config "false";
type uint32;
}
}
container bfd-session-lists {
config false;
list session-ip-sh {
key "interface dest-addr";
leaf interface {
type if:interface-ref;
}
leaf dest-addr {
type inet:ip-address;
}
uses bfd-all-session;
}
list session-ip-mh {
key "vrfName source-addr dest-addr";
leaf vrfName {
type vrfName;
}
leaf source-addr {
type inet:ip-address;
}
leaf dest-addr {
type inet:ip-address;
}
leaf ttl {
description "TTL of session";
config "false";
type TTL;
}
uses bfd-all-session;
}
}
}
grouping bfd-notification-params {
description
"This group describes common params that will be send
as part of BFD notification";
Zheng, et al. Expires September 7, 2015 [Page 24]
Internet-Draft BFD Yang March 2015
leaf local-discr {
description "BFD local discriminator";
type discriminator;
}
leaf remote-discr {
description "BFD remote discriminator";
type discriminator;
}
leaf new-state {
description "Current BFD state";
type state;
}
leaf state-change-reason {
description "BFD state change reason";
type string;
}
leaf time-in-previous-state {
description "How long the BFD session was in the previous state";
type string;
}
leaf dest-addr {
description "BFD peer address";
type inet:ip-address;
}
}
notification bfd-singlehop-notification {
uses bfd-notification-params;
leaf interface {
description "Interface to which this BFD session belongs to";
type if:interface-ref;
}
leaf echo-enabled {
description "Was echo enabled for BFD";
type boolean;
}
}
notification bfd-multihop-notification {
Zheng, et al. Expires September 7, 2015 [Page 25]
Internet-Draft BFD Yang March 2015
uses bfd-notification-params;
leaf vrf-name {
description "Routing instance";
type vrfName;
}
leaf source-addr {
description "BFD local address";
type inet:ip-address;
}
}
}
2.11. BFD Client Example Configuration Yang Module
module bfd-routing-app {
namespace "urn:cisco:params:xml:ns:yang:bfdroutingapp";
prefix bfd-routing-app;
import bfd {
prefix "bfd";
}
import ietf-interfaces {
prefix "if";
}
organization
"ACME";
contact
"acme@acme.com";
description
"Testing BFD grouping (simulating a routing application)";
revision 2015-02-14 {
description
"Initial revision.";
}
feature routing-app-bfd {
description "BFD configuration under routing-app";
}
list area {
Zheng, et al. Expires September 7, 2015 [Page 26]
Internet-Draft BFD Yang March 2015
description
"Specify a routing area.";
key "area-id";
leaf area-id {
type uint32;
}
uses bfd:bfd-client-base-cfg-parms {
if-feature routing-app-bfd;
}
list interface {
key "interface";
leaf interface {
type if:interface-ref;
}
uses bfd:bfd-client-base-cfg-parms {
if-feature routing-app-bfd;
}
}
}
}
2.12. Security Considerations
The YANG module defined in this memo is designed to be accessed via
the NETCONF protocol [RFC6241]. The lowest NETCONF layer is the
secure transport layer and the mandatory to implement secure
transport is SSH [RFC6242]. The NETCONF access control model
[RFC6536] provides the means to restrict access for particular
NETCONF users to a pre-configured subset of all available NETCONF
protocol operations and content.
The YANG module has writeable data nodes which can be used for
creation of BFD sessions and modification of BFD session parameters.
The system should "police" creation of BFD sessions to prevent new
sessions from causing existing BFD sessions to fail. For BFD session
modification, the BFD protocol has mechanisms in place which allow
for in service modification.
2.13. IANA Considerations
The IANA is requested to as assign a new new namespace URI from the
IETF XML registry.
Zheng, et al. Expires September 7, 2015 [Page 27]
Internet-Draft BFD Yang March 2015
URI:TBD
2.14. Acknowledgements
We would also like to thank Nobo Akiya and Jeff Haas for their
encouragement on this work.
3. References
3.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC5880] Katz, D. and D. Ward, "Bidirectional Forwarding Detection
(BFD)", RFC 5880, June 2010.
[RFC5881] Katz, D. and D. Ward, "Bidirectional Forwarding Detection
(BFD) for IPv4 and IPv6 (Single Hop)", RFC 5881, June
2010.
[RFC5882] Katz, D. and D. Ward, "Generic Application of
Bidirectional Forwarding Detection (BFD)", RFC 5882, June
2010.
[RFC5883] Katz, D. and D. Ward, "Bidirectional Forwarding Detection
(BFD) for Multihop Paths", RFC 5883, June 2010.
[RFC5884] Aggarwal, R., Kompella, K., Nadeau, T., and G. Swallow,
"Bidirectional Forwarding Detection (BFD) for MPLS Label
Switched Paths (LSPs)", RFC 5884, June 2010.
[RFC6020] Bjorklund, M., "YANG - A Data Modeling Language for the
Network Configuration Protocol (NETCONF)", RFC 6020,
October 2010.
[RFC6241] Enns, R., Bjorklund, M., Schoenwaelder, J., and A.
Bierman, "Network Configuration Protocol (NETCONF)", RFC
6241, June 2011.
[RFC7130] Bhatia, M., Chen, M., Boutros, S., Binderberger, M., and
J. Haas, "Bidirectional Forwarding Detection (BFD) on Link
Aggregation Group (LAG) Interfaces", RFC 7130, February
2014.
Zheng, et al. Expires September 7, 2015 [Page 28]
Internet-Draft BFD Yang March 2015
3.2. Informative References
[I-D.ietf-netconf-restconf]
Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF
Protocol", draft-ietf-netconf-restconf-04 (work in
progress), January 2015.
Authors' Addresses
Lianshu Zheng (editor)
Huawei Technologies
China
Email: vero.zheng@huawei.com
Reshad Rahman (editor)
Cisco Systems
USA
Email: rrahman@cisco.com
Santosh Pallagatti
Juniper Networks
India
Email: santoshpk@juniper.net
Mahesh Jethanandani
Ciena Corporation
Email: mjethanandani@gmail.com
Zheng, et al. Expires September 7, 2015 [Page 29]