<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc comments="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-teas-yang-te-32" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="TE YANG Data Model">A YANG Data Model for Traffic Engineering Tunnels, Label Switched Paths and Interfaces</title>

    <author initials="T." surname="Saad" fullname="Tarek Saad">
      <organization>Cisco Systems Inc</organization>
      <address>
        <email>tsaad.net@gmail.com</email>
      </address>
    </author>
    <author initials="R." surname="Gandhi" fullname="Rakesh Gandhi">
      <organization>Cisco Systems Inc</organization>
      <address>
        <email>rgandhi@cisco.com</email>
      </address>
    </author>
    <author initials="X." surname="Liu" fullname="Xufeng Liu">
      <organization>IBM Corporation</organization>
      <address>
        <email>xufeng.liu.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="V. P." surname="Beeram" fullname="Vishnu Pavan Beeram">
      <organization>Juniper Networks</organization>
      <address>
        <email>vbeeram@juniper.net</email>
      </address>
    </author>
    <author initials="I." surname="Bryskin" fullname="Igor Bryskin">
      <organization>Individual</organization>
      <address>
        <email>i_bryskin@yahoo.com</email>
      </address>
    </author>
    <author initials="O." surname="Gonzalez de Dios" fullname="Oscar Gonzalez de Dios">
      <organization>Telefonica</organization>
      <address>
        <email>oscar.gonzalezdedios@telefonica.com</email>
      </address>
    </author>

    <date year="2023" month="March" day="12"/>

    
    <workgroup>TEAS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document defines a YANG data model for the provisioning and management of
Traffic Engineering (TE) tunnels, Label Switched Paths (LSPs), and interfaces.
The model covers data that is independent of any technology or dataplane encapsulation
and is divided into two YANG modules that cover device-specific, and device independent
data.</t>

<t>This model covers data for configuration, operational state, remote procedural
calls, and event notifications.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>YANG <xref target="RFC6020"/> and <xref target="RFC7950"/> is a data modeling language that was
introduced to define the contents of a conceptual data store that allows
networked devices to be managed using NETCONF <xref target="RFC6241"/>. YANG has proved
relevant beyond its initial confines, as bindings to other interfaces (e.g.
RESTCONF <xref target="RFC8040"/>) and encoding other than XML (e.g. JSON) are being defined.
Furthermore, YANG data models can be used as the basis of implementation for
other interfaces, such as CLI and programmatic APIs.</t>

<t>This document describes a YANG data model for Traffic Engineering (TE) tunnels,
Label Switched Paths (LSPs), and interfaces. The data model is divided into two
YANG modules. The module 'ietf-te.yang' includes data that is generic and
device-independent, while the module 'ietf-te-device.yang' includes data that is
device-specific.</t>

<t>The document describes a high-level relationship between the modules defined in
this document, as well as other external protocol YANG modules.  The TE generic
YANG data model does not include any data specific to a signaling protocol.  It
is expected other data plane technology model(s) will augment the TE generic
YANG data model.</t>

<t>Also, it is expected other YANG modules that model TE signaling protocols,
such as RSVP-TE (<xref target="RFC3209"/>, <xref target="RFC3473"/>), or Segment-Routing TE (SR-TE) 
<xref target="RFC9256"/> will augment the generic TE YANG  module.</t>

</section>
<section anchor="terms-and-conventions"><name>Terms and Conventions</name>

<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The following terms are defined in <xref target="RFC6241"/> and are used in this specification:</t>

<t><list style="symbols">
  <t>client</t>
  <t>configuration data</t>
  <t>state data</t>
</list></t>

<t>This document also makes use of the following terminology introduced in the
YANG Data Modeling Language <xref target="RFC7950"/>:</t>

<t><list style="symbols">
  <t>augment</t>
  <t>data model</t>
  <t>data node</t>
</list></t>

</section>
<section anchor="prefixes-in-data-node-names"><name>Prefixes in Data Node Names</name>

<t>In this document, names of data nodes and other data model objects are prefixed
using the standard prefix associated with the corresponding YANG imported
modules, as shown in <xref target="tab1"/>.</t>

<texttable title="Prefixes and corresponding YANG modules" anchor="tab1">
      <ttcol align='left'>Prefix</ttcol>
      <ttcol align='left'>YANG module</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>yang</c>
      <c>ietf-yang-types</c>
      <c><xref target="RFC6991"/></c>
      <c>inet</c>
      <c>ietf-inet-types</c>
      <c><xref target="RFC6991"/></c>
      <c>rt-types</c>
      <c>ietf-routing-types</c>
      <c><xref target="RFC8294"/></c>
      <c>te-types</c>
      <c>ietf-te-types</c>
      <c><xref target="RFC8776"/></c>
      <c>te-packet-types</c>
      <c>ietf-te-packet-types</c>
      <c><xref target="RFC8776"/></c>
      <c>te</c>
      <c>ietf-te</c>
      <c>this document</c>
      <c>te-dev</c>
      <c>ietf-te-device</c>
      <c>this document</c>
</texttable>

</section>
<section anchor="model-tree-diagrams"><name>Model Tree Diagrams</name>

<t>The tree diagrams extracted from the module(s) defined in this document are given in
subsequent sections as per the syntax defined in <xref target="RFC8340"/>.</t>

</section>
</section>
<section anchor="design-considerations"><name>Design Considerations</name>

<t>This document describes a generic TE YANG data model that is independent of
any dataplane technology.  One of the design objectives is to allow specific
data plane technology models to reuse the TE generic data model and possibly
augment it with technology specific data.</t>

<t>The elements of the generic TE YANG data model, including TE Tunnels, LSPs, and
interfaces have leaf(s) that identify the technology layer where they reside.
For example, the LSP encoding type can identify the technology associated with a
TE Tunnel or LSP.</t>

<t>Also, the generic TE YANG data model does not cover signaling protocol data.
The signaling protocol used to instantiate TE LSPs are outside the scope of this
document and expected to be covered by augmentations defined in other document(s).</t>

<t>The following other design considerations are taken into account with respect to data
organization:</t>

<t><list style="symbols">
  <t>The generic TE YANG data model 'ietf-te' contains device independent data and
can be used to model data off a device (e.g. on a TE controller). When the
model is used to manage a specific device, the model contains the TE Tunnels
originating from the specific device.  When the model is used to manage a TE
controller, the 'tunnels' list contains all TE Tunnels and TE tunnel segments
originating from device(s) that the TE controller manages.</t>
  <t>The device-specific TE data is defined in module 'ietf-te-device' as
shown in <xref target="figctrl"/>.</t>
  <t>In general, minimal elements in the model are designated as "mandatory" to
allow freedom to vendors to adapt the data model to their specific product
implementation.</t>
  <t>Suitable defaults are specified for all configurable elements.</t>
  <t>The model declares a number of TE functions as features that can be
optionally supported.</t>
</list></t>

<section anchor="state-data-organization"><name>State Data Organization</name>

<t>The Network Management Datastore Architecture (NMDA) <xref target="RFC8342"/> addresses
modeling state data for ephemeral objects.  This document adopts the NMDA model
for configuration and state data representation as per IETF guidelines for new
IETF YANG models.</t>

</section>
</section>
<section anchor="model-overview"><name>Model Overview</name>

<t>The data models defined in this document cover the core TE features that are
commonly supported by different vendor implementations. The support of extended
or vendor specific TE feature(s) is expected to either be in augmentations, or
deviations to this model that are defined in separate documents.</t>

<section anchor="module-relationship"><name>Module Relationship</name>

<t>The generic TE YANG data model that is defined in "ietf-te.yang" covers the
building blocks that are device independent and agnostic of any specific
technology or control plane instances. The TE device model defined in
"ietf-te-device.yang" augments the generic TE YANG data model and covers data
that is specific to a device --  for example, attributes of TE interfaces, or
TE timers that are local to a TE node.</t>

<t>The TE data models for specific instances of data plane technology exist in
separate YANG modules that augment the generic TE YANG data model.  The TE
data models for specific instances of signaling protocols are outside the scope
of this document and are defined in other documents. For example, the RSVP-TE
YANG model augmentation of the TE model is covered in a separate document.</t>

<figure title="Relationship of TE module(s) with signaling protocol modules" anchor="figctrl"><artwork><![CDATA[
  TE generic     +---------+         o: augment
  module         | ietf-te |o-------------+
                 +---------+               \
                        o                   \
                        |\                   \
                        | \ TE device module  \
                        |  +----------------+  \
                        |  | ietf-te-device |   \
                        |  +----------------+    \
                        |       o                 \
                        |     /                    \
                        |   /                       \
                 +---------------+           +---------------+
  RSVP-TE module | ietf-rsvp-te^ |o .       | ietf-te-mpls^ |
                 +---------------+  \       +---------------+
                    |                \
                    |                 \
                    |                  \
                    |                   \
                    |                    \
                    o                 +-------------------+
                 +------------+       | ietf-rsvp-otn-te^ |
  RSVP module    | ietf-rsvp^ |       +-------------------+
                 +------------+          RSVP-TE with OTN
                                         extensions

                X---oY indicates that module X augments module Y
                ^ indicates a module defined in other documents
]]></artwork></figure>

</section>
</section>
<section anchor="te-yang-model"><name>TE YANG Model</name>

<t>The generic TE YANG module ('ietf-te') is meant for the management and
operation of a TE network. This includes creating, modifying and retrieving
information about TE Tunnels, LSPs, and interfaces and their associated
attributes (e.g.  Administrative-Groups, SRLGs, etc.).</t>

<t>A full tree diagram of the TE model is shown in the Appendix in
<xref target="fig-te-tree-full"/>.</t>

<section anchor="module-structure"><name>Module Structure</name>

<t>The 'te' container is the top level container in the 'ietf-te' module. The
presence of the 'te' container enables TE function system wide.  Below provides
further descriptions of containers that exist under the 'te' top level
container.</t>

<t>There are three further containers grouped under the 'te'
container as shown in <xref target="fig-highlevel"/> and described below.</t>

<t>globals:</t>

<ul empty="true"><li>
  <t>The 'globals' container maintains the set of global TE attributes that can be
applicable to TE Tunnels and interfaces.</t>
</li></ul>

<t>tunnels:</t>

<ul empty="true"><li>
  <t>The 'tunnels' container includes the list of TE Tunnels that are instantiated. Refer to
<xref target="TE_TUNNELS"/> for further details on the properties of a TE Tunnel.</t>
</li></ul>

<t>lsps:</t>

<ul empty="true"><li>
  <t>The 'lsps' container includes the list of TE LSP(s) that are instantiated for
TE Tunnels. Refer to <xref target="TE_LSPS"/> for further details on the properties of a TE LSP.</t>
</li></ul>

<t>The model also contains two Remote Procedure Calls (RPCs) as shown
in <xref target="fig-te-tree-full"/> and described below.</t>

<t>tunnels-path-compute:</t>

<ul empty="true"><li>
  <t>A RPC to request path computation for a specific TE Tunnel.
The RPC allows requesting path computation using atomic and stateless operation.
A tunnel may also be configured in 'compute-only' mode to provide stateful path updates
- see <xref target="TE_TUNNELS"/> for further details.</t>
</li></ul>

<t>tunnels-action:</t>

<ul empty="true"><li>
  <t>An RPC to request a specific action (e.g. reoptimize, or tear-and-setup) to be taken
on a specific tunnel or all tunnels.</t>
</li></ul>

<t><xref target="fig-te-tree-full"/> shows the relationships of these containers and RPCs within
the 'ietf-te' module.</t>

<figure title="TE Tunnel model high-level YANG tree view" anchor="fig-highlevel"><artwork><![CDATA[
module: ietf-te
  +--rw te!
     +--rw globals
     |     ...
     +--rw tunnels
     |     ...
     +--ro lsps
           ...

  rpcs:
    +---x tunnels-path-compute
    |  +---w input
    |  |     ...
    |  +--ro output
    |        ...
    +---x tunnels-actions
       +---w input
       |     ...
       +--ro output
             ...

]]></artwork></figure>

<section anchor="TeGlobals"><name>TE Globals</name>

<t>The 'globals' container covers properties that control a TE feature's
behavior system-wide, and its respective state as shown in <xref target="fig-globals"/>
and described in the text that follows.</t>

<figure title="TE globals YANG subtree high-level structure" anchor="fig-globals"><artwork><![CDATA[
     +--rw globals
     |  +--rw named-admin-groups
     |  |  +--rw named-admin-group* [name]
     |  |        ...
     |  +--rw named-srlgs
     |  |  +--rw named-srlg* [name]
     |  |        ...
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
]]></artwork></figure>

<t>named-admin-groups:</t>

<ul empty="true"><li>
  <t>A YANG container for the list of named (extended) administrative groups that may be applied
to TE links.</t>
</li></ul>

<t>named-srlgs:</t>

<ul empty="true"><li>
  <t>A YANG container for the list of named Shared Risk Link Groups (SRLGs) that may be
applied to TE links.</t>
</li></ul>

<t>named-path-constraints:</t>

<ul empty="true"><li>
  <t>A YANG container for a list of named path constraints. Each named path constraint is
composed of a set of constraints that can be applied during path computation.
A named path constraint can be applied to multiple TE Tunnels. Path constraints may also
be specified directly under the TE Tunnel. The path constraints specified under
the TE Tunnel take precedence over the path constraints 
derived from the referenced named path constraint. A named path constraint entry can be
formed of the path constraints shown in <xref target="fig-named-constraints"/>:</t>
</li></ul>

<figure title="Named path constraints YANG subtree" anchor="fig-named-constraints"><artwork><![CDATA[
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
     |             {te-types:named-path-constraints}?
     |        +--rw name                             string
     |        +--rw te-bandwidth
     |        |     ...
     |        +--rw link-protection?                 identityref
     |        +--rw setup-priority?                  uint8
     |        +--rw hold-priority?                   uint8
     |        +--rw signaling-type?                  identityref
     |        +--rw path-metric-bounds
     |        |     ...
     |        +--rw path-affinities-values
     |        |     ...
     |        +--rw path-affinity-names
     |        |     ...
     |        +--rw path-srlgs-lists
     |        |     ...
     |        +--rw path-srlgs-names
     |        |     ...
     |        +--rw disjointness?
     |        |       te-path-disjointness
     |        +--rw explicit-route-objects-always
     |        |     ...
     |        +--rw path-in-segment!
     |        |     ...
     |        +--rw path-out-segment!
     |              ...

]]></artwork></figure>

<ul empty="true"><li>
  <ul empty="true"><li>

    <t><list style="symbols">
      <t>name: A YANG leaf that holds the named path constraint entry. This is unique in the list
and used as a key.</t>
      <t>te-bandwidth: A YANG container that holds the technology agnostic TE bandwidth constraint.</t>
      <t>link-protection: A YANG leaf that holds the link protection type constraint required for the links to be included in the computed path.</t>
      <t>setup/hold priority: YANG leafs that hold the LSP setup and hold admission priority as defined in <xref target="RFC3209"/>.</t>
      <t>signaling-type: A YANG leaf that holds the LSP setup type, such as RSVP-TE or SR.</t>
      <t>path-metric-bounds: A YANG container that holds the set of metric bounds applicable on the
computed TE tunnel path.</t>
      <t>path-affinities-values: A YANG container that holds the set of affinity values and
mask to be used during path computation.</t>
      <t>path-affinity-names: A YANG container that holds the set of named affinity constraints and
corresponding inclusion or exclusion instructions for each to be used during path computation.</t>
      <t>path-srlgs-lists: A YANG container that holds the set of SRLG values and
corresponding inclusion or exclusion instructions to be used during path computation.</t>
      <t>path-srlgs-names: A YANG container that holds the set of named SRLG constraints and
corresponding inclusion or exclusion instructions for each to be used during path computation.</t>
      <t>disjointness: The level of resource disjointness constraint that the secondary path
of a TE tunnel has to adhere to.</t>
      <t>explicit-route-objects-always: A YANG container that contains two route objects lists:      <list style="symbols">
          <t>'route-object-exclude-always': a list of route entries to always exclude from the path computation.</t>
          <t>'route-object-include-exclude': a list of route entries to include or exclude in the path computation.</t>
        </list></t>
    </list></t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>The 'route-object-include-exclude' is used to configure constraints on which route objects (e.g., nodes, links) are included or excluded in the path computation.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>The interpretation of an empty 'route-object-include-exclude' list depends on the TE Tunnel (end-to-end or Tunnel Segment) and on the specific path, according to the following rules:</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t><list style="numbers">
        <t>An empty 'route-object-include-exclude' list for the primary path of an end-to-end TE Tunnel indicates that there are no route objects to be included or excluded in the path computation.</t>
        <t>An empty 'route-object-include-exclude' list for the primary path of a TE Tunnel Segment indicates that no primary LSP is required for that TE Tunnel.</t>
        <t>An empty 'route-object-include-exclude' list for a reverse path means it always follows the forward path (i.e., the TE Tunnel is co-routed). When the 'route-object-include-exclude' list is not empty, the reverse path is routed independently of the forward path.</t>
        <t>An empty 'route-object-include-exclude' list for the secondary (forward) path indicates that the secondary path has the same endpoints as the primary path.</t>
      </list></t>
    </li></ul>

    <t><list style="symbols">
      <t>path-in-segment: A YANG container that contains a list of label restrictions
that have to be taken into considerations when crossing domains. This TE
tunnel segment in this case is being stitched to the upstream TE tunnel segment.</t>
      <t>path-out-segment: A YANG container that contains a list of label restrictions
that have to be taken into considerations when crossing domains. The TE
tunnel segment in this case is being stitched to the downstream TE tunnel segment.</t>
    </list></t>
  </li></ul>
</li></ul>

</section>
<section anchor="TE_TUNNELS"><name>TE Tunnels</name>

<t>The 'tunnels' container holds the list of TE Tunnels that are provisioned on
devices in the network as shown in <xref target="fig-te-tunnel"/>.</t>

<figure title="TE Tunnel list YANG subtree structure" anchor="fig-te-tunnel"><artwork><![CDATA[
     +--rw tunnels
     |  +--rw tunnel* [name]
     |     +--rw name                            string
     |     +--rw alias?                          string
     |     +--rw identifier?                     uint32
     |     +--rw color?                          uint32
     |     +--rw description?                    string
     |     +--rw admin-state?                    identityref
     |     +--ro operational-state?              identityref
     |     +--rw encoding?                       identityref
     |     +--rw switching-type?                 identityref
     |     +--rw source?                         te-types:te-node-id
     |     +--rw destination?                    te-types:te-node-id
     |     +--rw src-tunnel-tp-id?               binary
     |     +--rw dst-tunnel-tp-id?               binary
     |     +--rw bidirectional?                  boolean
     |     +--rw controller
     |     |  +--rw protocol-origin?        identityref
     |     |  +--rw controller-entity-id?   string
     |     +--rw reoptimize-timer?               uint16
     |     +--rw association-objects
     |     |  +--rw association-object* [association-key]
     |     |  |     ...
     |     |  +--rw association-object-extended* [association-key]
     |     |        ...
     |     +--rw protection
     |     |  +--rw enable?                         boolean
     |     |  +--rw protection-type?                identityref
     |     |  +--rw protection-reversion-disable?   boolean
     |     |  +--rw hold-off-time?                  uint32
     |     |  +--rw wait-to-revert?                 uint16
     |     |  +--rw aps-signal-id?                  uint8
     |     +--rw restoration
     |     |  +--rw enable?                          boolean
     |     |  +--rw restoration-type?                identityref
     |     |  +--rw restoration-scheme?              identityref
     |     |  +--rw restoration-reversion-disable?   boolean
     |     |  +--rw hold-off-time?                   uint32
     |     |  +--rw wait-to-restore?                 uint16
     |     |  +--rw wait-to-revert?                  uint16
     |     +--rw te-topology-identifier
     |     |  +--rw provider-id?   te-global-id
     |     |  +--rw client-id?     te-global-id
     |     |  +--rw topology-id?   te-topology-id
     |     +--rw te-bandwidth
     |     |  +--rw (technology)?
     |     |        ...
     |     +--rw link-protection?                identityref
     |     +--rw setup-priority?                 uint8
     |     +--rw hold-priority?                  uint8
     |     +--rw signaling-type?                 identityref
     |     +--rw hierarchy
     |     |  +--rw dependency-tunnels
     |     |  |     ...
     |     |  +--rw hierarchical-link
     |     |        ...
     |     +--rw primary-paths
     |     |  +--rw primary-path* [name]
     |     |        ...
     |     +--rw secondary-paths
     |     |  +--rw secondary-path* [name]
     |     |        ...
     |     +--rw secondary-reverse-paths
     |     |  +--rw secondary-reverse-path* [name]
     |     |        ...
     |     +---x tunnel-action
     |     |  +---w input
     |     |  |     ...
     |     |  +--ro output
     |     |        ...
     |     +---x protection-external-commands
     |        +---w input
     |              ...
]]></artwork></figure>

<t>When the model is used to manage a specific device, the 'tunnels' list contains
the TE Tunnels originating from the specific device. When the model is used to
manage a TE controller, the 'tunnels' list contains all TE Tunnels and TE
tunnel segments originating from device(s) that the TE controller manages.</t>

<t>The TE Tunnel model allows the configuration and management of the following TE
tunnel objects:</t>

<t>TE Tunnel:</t>

<ul empty="true"><li>
  <t>A YANG container of one or more TE LSPs established between the source and destination
TE Tunnel termination points.</t>
</li></ul>

<t>TE Path:</t>

<ul empty="true"><li>
  <t>An engineered path that once instantiated in the forwarding plane can be used
to forward traffic from the source to the destination TE Tunnel termination points.</t>
</li></ul>

<t>TE LSP:</t>

<ul empty="true"><li>
  <t>A TE LSP is a connection-oriented service established over a TE Path
and that allows the delivery of traffic between the TE Tunnel source and
destination termination points.</t>
</li></ul>

<t>TE Tunnel Segment:</t>

<ul empty="true"><li>
  <t>A part of a multi-domain TE Tunnel that is within a specific network domain.</t>
</li></ul>

<t>The TE Tunnel has a number of attributes that are set directly under the
tunnel (as shown in <xref target="fig-te-tunnel"/>). The main attributes of a TE Tunnel are described below:</t>

<t>operational-state:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the operational state of the tunnel.</t>
</li></ul>

<t>name:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the name of a TE Tunnel.  The name of the
TE Tunnel uniquely identifies the tunnel within the TE tunnel list.  The name
of the TE Tunnel can be formatted as a Uniform Resource Indicator (URI) by
including the namespace to ensure uniqueness of the name amongst all the TE
Tunnels present on devices and controllers. The configured TE Tunnels can
be reported with the name of the device embedded within the TE Tunnel name.
For initiated TE Tunnels from the controller, the controller is responsible
to ensures that TE Tunnel names are unique.</t>
</li></ul>

<t>alias:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds an alternate name to the TE tunnel. Unlike the TE tunnel
name, the alias can be modified at any time during the lifetime of the TE tunnel.</t>
</li></ul>

<t>identifier:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds an identifier of the tunnel. This identifier is unique amongst tunnels
originated from the same ingress device.</t>
</li></ul>

<t>color:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the color associated with the TE tunnel. The color is used
to map or steer services that carry matching color on to the TE tunnel as described in
<xref target="RFC9012"/>.</t>
</li></ul>

<t>admin-state:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the tunnel administrative state. The administrative
status in state datastore transitions to 'tunnel-admin-up' when the tunnel used
by the client layer, and to 'tunnel-admin-down' when it is not used by the
client layer.</t>
</li></ul>

<t>operational-state:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the tunnel operational state.</t>
</li></ul>

<t>encoding/switching:</t>

<ul empty="true"><li>
  <t>The 'encoding' and 'switching-type' are YANG leafs that define the specific
technology in which the tunnel operates in as described in <xref target="RFC3945"/>.</t>
</li></ul>

<t>source/destination:</t>

<ul empty="true"><li>
  <t>YANG leafs that define the tunnel source and destination node endpoints.</t>
</li></ul>

<t>src-tunnel-tp-id/dst-tunnel-tp-id:</t>

<ul empty="true"><li>
  <t>YANG leafs that hold the identifiers of source and destination TE Tunnel
 Termination Points (TTPs) <xref target="RFC8795"/> residing on the source and
 destination nodes. The TTP identifiers are optional on nodes that have a
 single TTP per node. For example, TTP identifiers are optional for packet
 (IP/MPLS) routers.</t>
</li></ul>

<t>bidirectional:</t>

<ul empty="true"><li>
  <t>A YANG leaf that when present indicates the LSP of a TE Tunnel is bidirectional
and co-routed as defined in <xref target="rfc3473"/>.</t>
</li></ul>

<t>controller:</t>

<ul empty="true"><li>
  <t>A YANG container that holds tunnel data relevant to an optional external TE controller that
may initiate or control a tunnel. This target node may be augmented by external module(s), for example, to add data for PCEP initiated and/or
delegated tunnels.</t>
</li></ul>

<t>reoptimize-timer:</t>

<ul empty="true"><li>
  <t>A YANG leaf to set the interval period for tunnel reoptimization.</t>
</li></ul>

<t>association-objects:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the set of associations of the TE Tunnel to other
TE Tunnels. Associations at the TE Tunnel level apply to all paths of the TE
Tunnel. The TE tunnel associations can be overridden by associations
configured directly under the TE Tunnel path.</t>
</li></ul>

<t>protection:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the TE Tunnel protection properties.</t>
</li></ul>

<t>restoration:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the TE Tunnel restoration properties.</t>
</li></ul>

<t>te-topology-identifier:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the topology identifier associated with the topology where paths for the TE tunnel are computed.</t>
</li></ul>

<t>hierarchy:</t>

<ul empty="true"><li>
  <t>A YANG container that holds hierarchy related properties of the TE Tunnel. A TE LSP
  can be set up in MPLS or Generalized MPLS (GMPLS) networks to be used as
  a TE link to carry traffic in other (client) networks <xref target="RFC6107"/>.  In this
  case, the model introduces the TE Tunnel hierarchical link endpoint parameters
  to identify the specific link in the client layer that the underlying TE Tunnel is
  associated with. The hierarchy container includes the following:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>

    <t><list style="symbols">
      <t>dependency-tunnels: A set of hierarchical TE Tunnels provisioned or to be
provisioned in the immediate lower layer that this TE tunnel depends on for
multi-layer path computation. A dependency TE Tunnel is provisioned if and
only if it is used (selected by path computation) at least by one client
layer TE Tunnel. The TE link in the client layer network topology supported
by a dependent TE Tunnel is dynamically created only when the dependency TE
Tunnel is actually provisioned.</t>
      <t>hierarchical-link: A YANG container that holds the identity of the
hierarchical link (in the client layer) that is supported by this TE Tunnel.
The endpoints of the hierarchical link are defined by TE tunnel source and
destination node endpoints. The hierarchical link can be identified by its source
and destination link termination point identifiers.</t>
    </list></t>
  </li></ul>
</li></ul>

<t>primary-paths:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the list of primary paths.
A primary path is identified by 'name'. A primary path is selected from the list
to instantiate a primary forwarding LSP for the tunnel.  The list of primary
paths is visited by order of preference. A primary path has the following
attributes:</t>
</li></ul>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>primary-reverse-path: A YANG container that holds properties of the
primary reverse path. The reverse path is applicable to
bidirectional TE Tunnels.</t>
  </list></t>
</li></ul>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>candidate-secondary-paths: A YANG container that holds a list of candidate
secondary paths which may be used for the primary path to support path
protection. The candidate secondary path(s) reference path(s)  from the
tunnel secondary paths list.  The preference of the secondary paths is
specified within the list and dictates the order of visiting the secondary
path from the list. The attributes of a secondary path can be defined
separately from the primary path. The attributes of a secondary path will be
inherited from the associated 'active' primary when not explicitly defined
for the secondary path.</t>
  </list></t>
</li></ul>

<ul empty="true"><li>

</li></ul>

<t>secondary-paths:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the set of secondary paths. A secondary path is
 identified by 'name'. A secondary path can be referenced from the TE Tunnel's
'candidate-secondary-path' list.</t>
</li></ul>

<t>secondary-reverse-paths:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the set of secondary reverse paths. A secondary reverse
path is identified by 'name'. A secondary reverse path can be referenced from the
TE Tunnel's 'candidate-secondary-reverse-paths' list. A secondary reverse path contains
attributes similar to a primary path.</t>
</li></ul>

<t>The following set of common path attributes are shared for primary (forward and reverse) and secondary paths:</t>

<t>path-computation-method:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the method used for computing the TE path.</t>
</li></ul>

<t>path-computation-server:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the path computation server properties when the path is
 externally queried.</t>
</li></ul>

<t>compute-only:</t>

<ul empty="true"><li>
  <t>A path of a TE Tunnel is, by default, provisioned so that it can be instantiated
  in the forwarding plane so that it can carry traffic as soon as a valid path
  is computed. In some cases, a TE path may be configured only for the
  purpose of computing a path and reporting it without the need to instantiate
  the LSP or commit any resources. In such a case, the path is configured in
  'compute-only' mode to distinguish it from the default behavior. A
  'compute-only' path is configured as a usual with the associated per path
  constraint(s) and properties on a device or TE controller. The device or TE
  controller computes the feasible path(s) subject to configured constraints.
  A client may query the 'compute-only' computed path properties 'on-demand',
  or alternatively, can subscribe to be notified of computed path(s) and
  whenever the path properties change.</t>
</li></ul>

<t>use-path-computation:</t>

<ul empty="true"><li>
  <t>A YANG leaf that indicates whether or not path computation is to
  be used for a specified path.</t>
</li></ul>

<t>lockdown:</t>

<ul empty="true"><li>
  <t>A YANG leaf that when set indicates the existing path should not be reoptimized
  after a failure on any of its traversed links.</t>
</li></ul>

<t>path-scope:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the path scope if segment or an end-to-end path.</t>
</li></ul>

<t>preference:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the preference for the path. The lower the number
 higher the preference.</t>
</li></ul>

<t>k-requested-paths:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the number of k-shortest-paths requested from the path
computation server and returned sorted by its optimization
objective.</t>
</li></ul>

<t>association-objects:</t>

<ul empty="true"><li>
  <t>A YANG container that holds a list of tunnel association properties.</t>
</li></ul>

<t>optimizations:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the optimization objectives
  that path computation will use to select a path.</t>
</li></ul>

<t>named-path-constraint:</t>

<ul empty="true"><li>
  <t>A YANG leafref that references an entry from the global list of named path constraints.</t>
</li></ul>

<t>te-bandwidth:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the path bandwidth (see <xref target="RFC8776"/>).</t>
</li></ul>

<t>link-protection:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the link protection type required for the links to
be included the computed path (see <xref target="RFC8776"/>).</t>
</li></ul>

<t>setup/hold-priority:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>signaling-type:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. This value overrides
the provided one in the referenced named-path-constraint.</t>
</li></ul>

<t>path-metric-bounds:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-affinities-values:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-affinity-names:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-srlgs-lists:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-srlgs-names:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>disjointness:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>explicit-route-objects-always:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-in-segment:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-out-segment:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>computed-paths-properties:</t>

<ul empty="true"><li>
  <t>A YANG container that holds properties for the list of computed paths.</t>
</li></ul>

<t>computed-path-error-infos:</t>

<ul empty="true"><li>
  <t>A YANG container that holds a list of errors related to the path.</t>
</li></ul>

<t>lsp-provisioning-error-infos:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the list of LSP provisioning error information.</t>
</li></ul>

<t>lsps:</t>

<ul empty="true"><li>
  <t>A YANG container that holds a list of LSPs that have been instantiated for this specific path.</t>
</li></ul>

<t>In addition to the path common attributes, the primary path has the following
attributes that are not present in the secondary path:</t>

<t><list style="symbols">
  <t>Only the primary path contains the list of 'candidate-secondary-paths' that
can protect the primary path.</t>
  <t>Only the primary path can contain a primary-reverse-path associated with the
primary path (and its associated list of
'candidate-secondary-reverse-path').</t>
</list></t>

</section>
<section anchor="TE_LSPS"><name>TE LSPs</name>

<t>The 'lsps' container includes the set of TE LSP(s) that have been instantiated.
A TE LSP is identified by a 3-tuple ('tunnel-name', 'lsp-id', 'node').</t>

<t>When the model is used to manage a specific device, the 'lsps' list contains all TE
LSP(s) that traverse the device (including ingressing, transiting and egressing the device).</t>

<t>When the model is used to manage a TE controller, the 'lsps' list contains all
TE LSP(s) that traverse all network devices (including ingressing, transiting and
egressing the device) that the TE controller manages.</t>

</section>
</section>
<section anchor="tree-diagram"><name>Tree Diagram</name>

<t><xref target="fig-te-tree"/> shows the tree diagram of depth=4 for the generic TE YANG model defined in
modules 'ietf-te.yang'. The full tree diagram is shown in <xref target="AppendixB"/>.</t>

<figure title="Tree diagram of depth-4 of TE Tunnel YANG data model" anchor="fig-te-tree"><artwork><![CDATA[
module: ietf-te
  +--rw te
     +--rw enable?    boolean
     +--rw globals
     |  +--rw named-admin-groups
     |  |  +--rw named-admin-group* [name]
     |  |          {te-types:extended-admin-groups,
     |  |           te-types:named-extended-admin-groups}?
     |  |        ...
     |  +--rw named-srlgs
     |  |  +--rw named-srlg* [name] {te-types:named-srlg-groups}?
     |  |        ...
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
     |             {te-types:named-path-constraints}?
     |           ...
     +--rw tunnels
     |  +--rw tunnel* [name]
     |     +--rw name                            string
     |     +--rw alias?                          string
     |     +--rw identifier?                     uint32
     |     +--rw color?                          uint32
     |     +--rw description?                    string
     |     +--rw admin-state?                    identityref
     |     +--ro operational-state?              identityref
     |     +--rw encoding?                       identityref
     |     +--rw switching-type?                 identityref
     |     +--rw source?                         te-types:te-node-id
     |     +--rw destination?                    te-types:te-node-id
     |     +--rw src-tunnel-tp-id?               binary
     |     +--rw dst-tunnel-tp-id?               binary
     |     +--rw bidirectional?                  boolean
     |     +--rw controller
     |     |     ...
     |     +--rw reoptimize-timer?               uint16
     |     +--rw association-objects
     |     |     ...
     |     +--rw protection
     |     |     ...
     |     +--rw restoration
     |     |     ...
     |     +--rw te-topology-identifier
     |     |     ...
     |     +--rw te-bandwidth
     |     |     ...
     |     +--rw link-protection?                identityref
     |     +--rw setup-priority?                 uint8
     |     +--rw hold-priority?                  uint8
     |     +--rw signaling-type?                 identityref
     |     +--rw hierarchy
     |     |     ...
     |     +--rw primary-paths
     |     |     ...
     |     +--rw secondary-paths
     |     |     ...
     |     +--rw secondary-reverse-paths
     |     |     ...
     |     +---x tunnel-action
     |     |     ...
     |     +---x protection-external-commands
     |           ...
     +--ro lsps
        +--ro lsp* [tunnel-name lsp-id node]
           +--ro tunnel-name                         string
           +--ro lsp-id                              uint16
           +--ro node
           |       te-types:te-node-id
           +--ro source?
           |       te-types:te-node-id
           +--ro destination?
           |       te-types:te-node-id
           +--ro tunnel-id?                          uint16
           +--ro extended-tunnel-id?
           |       yang:dotted-quad
           +--ro operational-state?                  identityref
           +--ro signaling-type?                     identityref
           +--ro origin-type?                        enumeration
           +--ro lsp-resource-status?                enumeration
           +--ro lockout-of-normal?                  boolean
           +--ro freeze?                             boolean
           +--ro lsp-protection-role?                enumeration
           +--ro lsp-protection-state?               identityref
           +--ro protection-group-ingress-node-id?
           |       te-types:te-node-id
           +--ro protection-group-egress-node-id?
           |       te-types:te-node-id
           +--ro lsp-actual-route-information
                 ...

  rpcs:
    +---x tunnels-path-compute
    |  +---w input
    |  |  +---w path-compute-info
    |  +--ro output
    |     +--ro path-compute-result
    +---x tunnels-actions
       +---w input
       |  +---w tunnel-info
       |  |  +---w (filter-type)
       |  |        ...
       |  +---w action-info
       |     +---w action?       identityref
       |     +---w disruptive?   empty
       +--ro output
          +--ro action-result?   identityref

]]></artwork></figure>

</section>
<section anchor="yang-module"><name>YANG Module</name>

<t>The generic TE YANG module 'ietf-te' imports the following modules:</t>

<t><list style="symbols">
  <t>ietf-yang-types and ietf-inet-types defined in <xref target="RFC6991"/></t>
  <t>ietf-te-types defined in <xref target="RFC8776"/></t>
</list></t>

<t>This module references the following documents:
<xref target="RFC4206"/>, <xref target="RFC4427"/>,
<xref target="RFC4872"/>, <xref target="RFC3209"/>, <xref target="RFC6780"/>,
<xref target="RFC7471"/>, <xref target="RFC9012"/>, <xref target="RFC8570"/>,
<xref target="RFC8232"/>, <xref target="RFC7271"/>, <xref target="RFC8234"/>, <xref target="RFC7308"/>, and <xref target="ITU_G.808.1"/>.</t>

<figure title="TE Tunnel data model YANG module" anchor="fig-basic-te"><artwork><![CDATA[
<CODE BEGINS> file "ietf-te@2023-03-11.yang"
module ietf-te {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-te";

  /* Replace with IANA when assigned */

  prefix te;

  /* Import TE generic types */

  import ietf-te-types {
    prefix te-types;
    reference
      "RFC8776: Common YANG Data Types for Traffic Engineering.";
  }
  import ietf-inet-types {
    prefix inet;
    reference
      "RFC6991: Common YANG Data Types.";
  }
  import ietf-yang-types {
    prefix yang;
    reference
      "RFC6991: Common YANG Data Types.";
  }

  organization
    "IETF Traffic Engineering Architecture and Signaling (TEAS)
     Working Group.";
  contact
    "WG Web:   <https://tools.ietf.org/wg/teas/>
     WG List:  <mailto:teas@ietf.org>

     Editor:   Tarek Saad
               <mailto:tsaad.net@gmail.com>

     Editor:   Rakesh Gandhi
               <mailto:rgandhi@cisco.com>

     Editor:   Vishnu Pavan Beeram
               <mailto:vbeeram@juniper.net>

     Editor:   Himanshu Shah
               <mailto:hshah@ciena.com>

     Editor:   Xufeng Liu
               <mailto: xufeng.liu.ietf@gmail.com>

     Editor:   Igor Bryskin
               <mailto:i_bryskin@yahoo.com>";
  description
    "YANG data module for TE configuration, state, and RPCs.
     The model fully conforms to the Network Management
     Datastore Architecture (NMDA).

     Copyright (c) 2023 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
     for full legal notices.";

  // RFC Ed.: replace XXXX with actual RFC number and remove this
  // note.
  // RFC Ed.: update the date below with the date of RFC publication
  // and remove this note.

  revision 2023-03-11 {
    description
      "Initial revision for the TE generic YANG module.";
    reference
      "RFCXXXX: A YANG Data Model for Traffic Engineering Tunnels
       and Interfaces.";
  }

  typedef tunnel-ref {
    type leafref {
      path "/te:te/te:tunnels/te:tunnel/te:name";
    }
    description
      "This type is used by data models that need to reference
       configured TE tunnel.";
  }

  typedef te-gen-node-id {
    type union {
      type te-types:te-node-id;
      type inet:ip-address;
    }
    description
      "Generic type that identifies a node in a TE topology.";
  }

  /**
   * TE tunnel generic groupings
   */

  grouping te-generic-node-id {
    description
      "A reusable grouping for a TE generic node identifier.";
    leaf id {
      type te-gen-node-id;
      description
        "The identifier of the node. Can be represented as IP
         address or dotted quad address.";
    }
    leaf type {
      type enumeration {
        enum ip {
          description
            "IP address representation of the node identifier.";
        }
        enum dotted-quad {
          description
            "Dotted quad address representation of the node
             identifier.";
        }
      }
      description
        "Type of node identifier representation.";
    }
  }

  grouping path-common-properties {
    description
      "Common path attributes.";
    leaf name {
      type string;
      description
        "TE path name.";
    }
    leaf path-computation-method {
      type identityref {
        base te-types:path-computation-method;
      }
      default "te-types:path-locally-computed";
      description
        "The method used for computing the path, either
         locally computed, queried from a server or not
         computed at all (explicitly configured).";
    }
    container path-computation-server {
      when "derived-from-or-self(../path-computation-method, "
         + "'te-types:path-externally-queried')" {
        description
          "The path-computation server when the path is
           externally queried.";
      }
      uses te-generic-node-id;
      description
        "Address of the external path computation
         server.";
    }
    leaf compute-only {
      type empty;
      description
        "When present, the path is computed and updated whenever
         the topology is updated. No resources are committed
         or reserved in the network.";
    }
    leaf use-path-computation {
      when "derived-from-or-self(../path-computation-method, "
         + "'te-types:path-locally-computed')";
      type boolean;
      default "true";
      description
        "When 'true' indicates the path is dynamically computed
         and/or validated against the Traffic-Engineering Database
         (TED), and when 'false' indicates no path expansion or
         validation against the TED is required.";
    }
    leaf lockdown {
      type empty;
      description
        "When present, indicates no reoptimization to be attempted
         for this path.";
    }
    leaf path-scope {
      type identityref {
        base te-types:path-scope-type;
      }
      default "te-types:path-scope-end-to-end";
      config false;
      description
        "Indicates whether the path is a segment or portion of
         of the full path., or is the an end-to-end path for
         the TE Tunnel.";
    }
  }

  /* This grouping is re-used in path-computation rpc */
  grouping path-compute-info {
    description
      "Attributes used for path computation request.";
    uses tunnel-associations-properties;
    uses te-types:generic-path-optimization;
    leaf named-path-constraint {
      if-feature "te-types:named-path-constraints";
      type leafref {
        path "/te:te/te:globals/te:named-path-constraints/"
           + "te:named-path-constraint/te:name";
      }
      description
        "Reference to a globally defined named path constraint set.";
    }
    uses path-constraints-common;
  }

  /* This grouping is re-used in path-computation rpc */
  grouping path-forward-properties {
    description
      "The path preference.";
    leaf preference {
      type uint8 {
        range "1..255";
      }
      default "1";
      description
        "Specifies a preference for this path. The lower the number
         higher the preference.";
    }
    leaf co-routed {
      when "/te:te/te:tunnels/te:tunnel/te:bidirectional = 'true'" {
        description
          "Applicable to bidirectional tunnels only.";
      }
      type boolean;
      default "false";
      description
        "Indicates whether the reverse path must to be co-routed
         with the primary.";
    }
  }

  /* This grouping is re-used in path-computation rpc */
  grouping k-requested-paths {
    description
      "The k-shortest paths requests.";
    leaf k-requested-paths {
      type uint8;
      default "1";
      description
        "The number of k-shortest-paths requested from the path
         computation server and returned sorted by its optimization
         objective.";
    }
  }

  grouping path-state {
    description
      "TE per path state parameters.";
    uses path-computation-response;
    container lsp-provisioning-error-infos {
      config false;
      description
        "LSP provisioning error information.";
      list lsp-provisioning-error-info {
        description
          "List of LSP provisioning error info entries.";
        leaf error-reason {
          type identityref {
            base te-types:lsp-provisioning-error-reason;
          }
          description
            "LSP provision error type.";
        }
        leaf error-description {
          type string;
          description
            "The textual representation of the error occurred during
             path computation.";
        }
        leaf error-timestamp {
          type yang:date-and-time;
          description
            "Timestamp of when the reported error occurred.";
        }
        leaf error-node-id {
          type te-types:te-node-id;
          description
            "Node identifier of node where error occurred.";
        }
        leaf error-link-id {
          type te-types:te-tp-id;
          description
            "Link ID where the error occurred.";
        }
        leaf lsp-id {
          type uint16;
          description
            "The LSP-ID for which path computation was performed.";
        }
      }
    }
    container lsps {
      config false;
      description
        "The TE LSPs container.";
      list lsp {
        key "node lsp-id";
        description
          "List of LSPs associated with the tunnel.";
        leaf tunnel-name {
          type leafref {
            path "/te:te/te:lsps/te:lsp/te:tunnel-name";
          }
          description "TE tunnel name.";
        }
        leaf node {
          type leafref {
            path "/te:te/te:lsps/te:lsp[tunnel-name="
               + "current()/../te:tunnel-name][lsp-id="
               + "current()/../te:lsp-id]/te:node";
          }
          description "The node where the LSP state resides on.";
        }
        leaf lsp-id {
          type leafref {
            path "/te:te/te:lsps/te:lsp[tunnel-name="
                           + "current()/../tunnel-name]/te:lsp-id";
          }
          description "The TE LSP identifier.";
        }
      }
    }
  }

  /* This grouping is re-used in path-computation rpc */
  grouping path-computation-response {
    description
      "Attributes reported by path computation response.";
    container computed-paths-properties {
      config false;
      description
        "Computed path properties container.";
      list computed-path-properties {
        key "k-index";
        description
          "List of computed paths.";
        leaf k-index {
          type uint8;
          description
            "The k-th path returned from the computation server.
             A lower k value path is more optimal than higher k
             value path(s)";
        }
        uses te-types:generic-path-properties {
          augment "path-properties" {
            description
              "additional path properties returned by path
               computation.";
            uses te-types:te-bandwidth;
            leaf disjointness-type {
              type te-types:te-path-disjointness;
              config false;
              description
                "The type of resource disjointness.
                 When reported for a primary path, it represents the
                 minimum level of disjointness of all the secondary
                 paths. When reported for a secondary path, it
                 represents the disjointness of the secondary path.";
            }
          }
        }
      }
    }
    container computed-path-error-infos {
      config false;
      description
        "Path computation information container.";
      list computed-path-error-info {
        description
          "List of path computation info entries.";
        leaf error-description {
          type string;
          description
            "Textual representation of the error occurred during
             path computation.";
        }
        leaf error-timestamp {
          type yang:date-and-time;
          description
            "Timestamp of last path computation attempt.";
        }
        leaf error-reason {
          type identityref {
            base te-types:path-computation-error-reason;
          }
          description
            "Reason for the path computation error.";
        }
      }
    }
  }

  grouping protection-restoration-properties {
    description
      "Protection and restoration parameters.";
    container protection {
      description
        "Protection parameters.";
      leaf protection-type {
        type identityref {
          base te-types:lsp-protection-type;
        }
        default "te-types:lsp-protection-unprotected";
        description
          "LSP protection type.";
      }
      leaf protection-reversion-disable {
        type boolean;
        default "false";
        description
          "Disable protection reversion to working path.";
      }
      leaf hold-off-time {
        type uint32;
        units "milli-seconds";
        description
          "The time between the declaration of an SF or SD condition
           and the initialization of the protection switching
           algorithm.";
        reference
          "RFC4427";
      }
      leaf wait-to-revert {
        type uint16;
        units "seconds";
        description
          "Time to wait before attempting LSP reversion.";
        reference
          "RFC4427";
      }
      leaf aps-signal-id {
        type uint8 {
          range "1..255";
        }
        default "1";
        description
          "The APS signal number used to reference the traffic of
           this tunnel. The default value for normal traffic is 1.
           The default value for extra-traffic is 255. If not
           specified, non-default values can be assigned by the
           server, if and only if, the server controls both
            endpoints.";
        reference
          "RFC4427";
      }
    }
    container restoration {
      description
        "Restoration parameters.";
      leaf restoration-type {
        type identityref {
          base te-types:lsp-restoration-type;
        }
        default "te-types:lsp-restoration-restore-none";
        description
          "LSP restoration type.";
      }
      leaf restoration-scheme {
        type identityref {
          base te-types:restoration-scheme-type;
        }
        default "te-types:restoration-scheme-preconfigured";
        description
          "LSP restoration scheme.";
      }
      leaf restoration-reversion-disable {
        type boolean;
        default "false";
        description
          "Disable restoration reversion to working path.";
      }
      leaf hold-off-time {
        type uint32;
        units "milli-seconds";
        description
          "The time between the declaration of an SF or SD condition
           and the initialization of the protection switching
           algorithm.";
        reference
          "RFC4427";
      }
      leaf wait-to-restore {
        type uint16;
        units "seconds";
        description
          "Time to wait before attempting LSP restoration.";
        reference
          "RFC4427";
      }
      leaf wait-to-revert {
        type uint16;
        units "seconds";
        description
          "Time to wait before attempting LSP reversion.";
        reference
          "RFC4427";
      }
    }
  }

  grouping tunnel-associations-properties {
    description
      "TE tunnel association grouping.";
    container association-objects {
      description
        "TE tunnel associations.";
      list association-object {
        key "association-key";
        unique "type id source/id source/type";
        description
          "List of association base objects.";
        reference
          "RFC4872";
        leaf association-key {
          type string;
          description
            "Association key used to identify a specific
             association in the list";
        }
        leaf type {
          type identityref {
            base te-types:association-type;
          }
          description
            "Association type.";
          reference
            "RFC4872";
        }
        leaf id {
          type uint16;
          description
            "Association identifier.";
          reference
            "RFC4872";
        }
        container source {
          uses te-generic-node-id;
          description
            "Association source.";
          reference
            "RFC4872";
        }
      }
      list association-object-extended {
        key "association-key";
        unique
          "type id source/id source/type global-source extended-id";
        description
          "List of extended association objects.";
        reference
          "RFC6780";
        leaf association-key {
          type string;
          description
            "Association key used to identify a specific
             association in the list";
        }
        leaf type {
          type identityref {
            base te-types:association-type;
          }
          description
            "Association type.";
          reference
            "RFC4872, RFC6780";
        }
        leaf id {
          type uint16;
          description
            "Association identifier.";
          reference
            "RFC4872, RFC6780";
        }
        container source {
          uses te-generic-node-id;
          description
            "Association source.";
          reference
            "RFC4872, RFC6780";
        }
        leaf global-source {
          type uint32;
          description
            "Association global source.";
          reference
            "RFC6780";
        }
        leaf extended-id {
          type yang:hex-string;
          description
            "Association extended identifier.";
          reference
            "RFC6780";
        }
      }
    }
  }

  /* This grouping is re-used in path-computation rpc */
  grouping tunnel-common-attributes {
    description
      "Common grouping to define the TE tunnel parameters";
    leaf source {
      type te-types:te-node-id;
      description
        "TE tunnel source node ID.";
    }
    leaf destination {
      type te-types:te-node-id;
      description
        "TE tunnel destination node identifier.";
    }
    leaf src-tunnel-tp-id {
      type binary;
      description
        "TE tunnel source termination point identifier.";
    }
    leaf dst-tunnel-tp-id {
      type binary;
      description
        "TE tunnel destination termination point identifier.";
    }
    leaf bidirectional {
      type boolean;
      default "false";
      description
        "Indicates a bidirectional co-routed LSP (non-associated
         LSP case).";
    }
  }

  /* This grouping is re-used in path-computation rpc */
  grouping tunnel-hierarchy-properties {
    description
      "A grouping for TE tunnel hierarchy information.";
    container hierarchy {
      description
        "Container for TE hierarchy related information.";
      container dependency-tunnels {
        description
          "List of tunnels that this tunnel can be potentially
           dependent on.";
        list dependency-tunnel {
          key "name";
          description
            "A tunnel entry that this tunnel can potentially depend
             on.";
          leaf name {
            type leafref {
              path "/te:te/te:tunnels/te:tunnel/te:name";
              require-instance false;
            }
            description
              "Dependency tunnel name. The tunnel may not have been
               instantiated yet.";
          }
          uses te-types:encoding-and-switching-type;
        }
      }
      container hierarchical-link {
        description
          "Identifies a hierarchical link (in client layer)
           that this tunnel is associated with. By default, the
           topology of the hierarchical link is the same topology of
           the tunnel;";
        reference
          "RFC4206";
        leaf enable {
          type boolean;
          description
            "Enables the hierarchical link properties supported by
             this tunnel";
        }
        leaf local-te-node-id {
          type te-types:te-node-id;
          description
            "The local TE node identifier.";
        }
        leaf local-te-link-tp-id {
          type te-types:te-tp-id;
          description
            "The local TE link termination point identifier.";
        }
        leaf remote-te-node-id {
          type te-types:te-node-id;
          description
            "Remote TE node identifier.";
        }
        uses te-types:te-topology-identifier {
          description
            "The topology identifier where the hierarchical link
             supported by this TE tunnel is instantiated.";
        }
      }
    }
  }

  grouping path-constraints-common {
    description
      "Global named path constraints configuration
       grouping.";
    uses te-types:common-path-constraints-attributes {
      description
        "The constraints applicable to the path. This includes:
         - The path bandwidth constraint
         - The path link protection type constraint
         - The path setup/hold priority constraint
         - path signaling type constraint
         - path metric bounds constraint. The unit of path metric
           bound is interpreted in the context of the metric-type.
           For example for metric-type 'path-metric-loss', the bound
           is multiples of the basic unit 0.000003% as described
           in RFC7471 for OSPF, and RFC8570 for ISIS.
         - path affinity constraints
         - path SRLG constraints";

    }
    uses te-types:generic-path-disjointness;
    uses te-types:path-constraints-route-objects;
    container path-in-segment {
      presence "The end-to-end tunnel starts in a previous domain;
                this tunnel is a segment in the current domain.";
      description
        "If an end-to-end tunnel crosses multiple domains using
         the same technology, some additional constraints have to be
         taken in consideration in each domain.
         This TE tunnel segment is stitched to the upstream TE tunnel
         segment.";
      uses te-types:label-set-info;
    }
    container path-out-segment {
      presence
        "The end-to-end tunnel is not terminated in this domain;
         this tunnel is a segment in the current domain.";
      description
        "If an end-to-end tunnel crosses multiple domains using
         the same technology, some additional constraints have to be
         taken in consideration in each domain.
         This TE tunnel segment is stitched to the downstream TE
         tunnel segment.";
      uses te-types:label-set-info;
    }
  }

  /**
   * TE container
   */

  container te {
    description
      "TE global container.";
    leaf enable {
      type boolean;
      default "false";
      description
        "Enables the TE component features.";
    }

    /* TE Global Data */
    container globals {
      description
        "Globals TE system-wide configuration data container.";
      container named-admin-groups {
        description
          "TE named admin groups container.";
        list named-admin-group {
          if-feature "te-types:extended-admin-groups";
          if-feature "te-types:named-extended-admin-groups";
          key "name";
          description
            "List of named TE admin-groups.";
          leaf name {
            type string;
            description
              "A string name that uniquely identifies a TE
               interface named admin-group.";
          }
          leaf bit-position {
            type uint32;
            description
              "Bit position representing the administrative group.";
            reference
              "RFC3209 and RFC7308";
          }


        }
      }
      container named-srlgs {
        description
          "TE named SRLGs container.";
        list named-srlg {
          if-feature "te-types:named-srlg-groups";
          key "name";
          description
            "A list of named SRLG groups.";
          leaf name {
            type string;
            description
              "A string name that uniquely identifies a TE
               interface named SRLG.";
          }
          leaf value {
            type te-types:srlg;
            description
              "An SRLG value.";
          }
          leaf cost {
            type uint32;
            description
              "SRLG associated cost. Used during path to append
               the path cost when traversing a link with this SRLG.";
          }
        }
      }
      container named-path-constraints {
        description
          "TE named path constraints container.";
        list named-path-constraint {
          if-feature "te-types:named-path-constraints";
          key "name";
          leaf name {
            type string;
            description
              "A string name that uniquely identifies a
               path constraint set.";
          }
          uses path-constraints-common;
          description
            "A list of named path constraints.";
        }
      }
    }

    /* TE Tunnel Data */
    container tunnels {
      description
        "Tunnels TE configuration data container.";
      list tunnel {
        key "name";
        description
          "The list of TE tunnels.";
        leaf name {
          type string;
          description
            "TE tunnel name.";
        }
        leaf alias {
          type string;
          description
            "An alternate name of the TE tunnel that can be modified
             anytime during its lifetime.";
        }
        leaf identifier {
          type uint32;
          description
            "TE tunnel Identifier.";
          reference
            "RFC3209";
        }
        leaf color {
          type uint32;
          description "The color associated with the TE tunnel.";
          reference "RFC9012";
        }
        leaf description {
          type string;
          default "None";
          description
            "Textual description for this TE tunnel.";
        }
        leaf admin-state {
          type identityref {
            base te-types:tunnel-admin-state-type;
          }
          default "te-types:tunnel-admin-state-up";
          description
            "TE tunnel administrative state.";
        }
        leaf operational-state {
          type identityref {
            base te-types:tunnel-state-type;
          }
          config false;
          description
            "TE tunnel operational state.";
        }
        uses te-types:encoding-and-switching-type;
        uses tunnel-common-attributes;
        container controller {
          description
            "Contains tunnel data relevant to external controller(s).
             This target node may be augmented by external module(s),
             for example, to add data for PCEP initiated and/or
             delegated tunnels.";
          leaf protocol-origin {
            type identityref {
              base te-types:protocol-origin-type;
            }
            description
              "The protocol origin for instantiating the tunnel."; 
          }
          leaf controller-entity-id {
            type string;
            description
              "An identifier unique within the scope of visibility
               that associated with the entity that controls the
               tunnel.";
            reference "RFC8232";
          }
        }
        leaf reoptimize-timer {
          type uint16;
          units "seconds";
          description
            "Frequency of reoptimization of a traffic engineered
             LSP.";
        }
        uses tunnel-associations-properties;
        uses protection-restoration-properties;
        uses te-types:tunnel-constraints;
        uses tunnel-hierarchy-properties;
        container primary-paths {
          description
            "The set of primary paths.";
          reference "RFC4872";
          list primary-path {
            key "name";
            description
              "List of primary paths for this tunnel.";
            uses path-common-properties;
            uses path-forward-properties;
            uses k-requested-paths;
            uses path-compute-info;
            uses path-state;
            container primary-reverse-path {
              when "../../../te:bidirectional = 'false'";
              description
                "The reverse primary path properties.";
              uses path-common-properties;
              uses path-compute-info;
              uses path-state;
              container candidate-secondary-reverse-paths {
                when "../../../../te:bidirectional = 'false'";
                description
                  "The set of referenced candidate reverse secondary
                   paths from the full set of secondary reverse paths
                   which may be used for this primary path.";
                list candidate-secondary-reverse-path {
                  key "secondary-path";
                  ordered-by user;
                  description
                    "List of candidate secondary reverse path(s)";
                  leaf secondary-path {
                    type leafref {
                      path "../../../../../../"
                         + "te:secondary-reverse-paths/"
                         + "te:secondary-reverse-path/te:name";
                    }
                    description
                      "A reference to the secondary reverse path that
                       should be utilised when the containing primary
                       reverse path option is in use.";
                  }
                }
              }
            }
            container candidate-secondary-paths {
              description
                "The set of candidate secondary paths which may be
                 used for this primary path. When secondary paths are
                 specified in the list the path of the secondary LSP
                 in use must be restricted to those path options
                 referenced.
                 The priority of the secondary paths is specified
                 within the list. Higher priority values are less
                 preferred - that is to say that a path with priority
                 0 is the most preferred path. In the case that the
                 list is empty, any secondary path option may be
                 utilised when the current primary path is in use.";
              list candidate-secondary-path {
                key "secondary-path";
                ordered-by user;
                description
                  "List of candidate secondary paths for this
                   tunnel.";
                leaf secondary-path {
                  type leafref {
                    path "../../../../../te:secondary-paths/"
                       + "te:secondary-path/te:name";
                  }
                  description
                    "A reference to the secondary path that should be
                     utilised when the containing primary path option
                     is
                     in use.";
                }
                leaf active {
                  type boolean;
                  config false;
                  description
                    "Indicates the current active path option that
                     has been selected of the candidate secondary
                     paths.";
                }
              }
            }
          }
        }
        container secondary-paths {
          description
            "The set of secondary paths.";
          reference "RFC4872";
          list secondary-path {
            key "name";
            description
              "List of secondary paths for this tunnel.";
            uses path-common-properties;
            leaf preference {
              type uint8 {
                range "1..255";
              }
              default "1";
              description
                "Specifies a preference for this path. The lower the
                 number higher the preference.";
            }
            uses path-compute-info;
            uses protection-restoration-properties;
            uses path-state;
          }
        }
        container secondary-reverse-paths {
          description
            "The set of secondary reverse paths.";
          list secondary-reverse-path {
            key "name";
            description
              "List of secondary paths for this tunnel.";
            uses path-common-properties;
            leaf preference {
              type uint8 {
                range "1..255";
              }
              default "1";
              description
                "Specifies a preference for this path. The lower the
                 number higher the preference. Paths that have the
                 same preference will be activated together.";
            }
            uses path-compute-info;
            uses protection-restoration-properties;
            uses path-state;
          }
        }
        action tunnel-action {
          description
            "Tunnel action.";
          input {
            leaf action-type {
              type identityref {
                base te-types:tunnel-action-type;
              }
              description
                "Tunnel action type.";
            }
          }
          output {
            leaf action-result {
              type identityref {
                base te-types:te-action-result;
              }
              description
                "The result of the tunnel action operation.";
            }
          }
        }
        action protection-external-commands {
          input {
            leaf protection-external-command {
              type identityref {
                base te-types:protection-external-commands;
              }
              description
                "Protection external command.";
            }
            leaf protection-group-ingress-node {
              type boolean;
              default "true";
              description
                "When 'true', indicates that the action is
                 applied on ingress node.
                 By default, the action applies to the ingress node
                 only.";
            }
            leaf protection-group-egress-node {
              type boolean;
              default "false";
              description
                "When set to 'true', indicates that the action is
                 applied on egress node.
                 By default, the action applies to the ingress node
                 only.";
            }
            leaf path-name {
              type string;
              description
                "The name of the path that the external command
                applies to.";
            }
            leaf path-type {
              type te-types:path-type;
              description
                "The type of the path that the external command
                applies to.";
            }
            leaf traffic-type {
              type enumeration {
                enum normal-traffic {
                  description
                    "The manual-switch or forced-switch command
                     applies to the normal traffic (this Tunnel).";
                }
                enum null-traffic {
                  description
                    "The manual-switch or forced-switch command
                     applies to the null traffic.";
                }
                enum extra-traffic {
                  description
                    "The manual-switch or forced-switch command
                     applies to the extra traffic (the extra-traffic
                     Tunnel sharing protection bandwidth with this
                     Tunnel).";
                }
              }
              description
                "Indicates whether the manual-switch or forced-switch
                 commands applies to the normal traffic, the null
                 traffic or the extra-traffic.";
              reference
                "RFC4427";
            }
            leaf extra-traffic-tunnel-ref {
              type tunnel-ref;
              description
                "In case there are multiple extra-traffic tunnels
                 sharing protection bandwidth with this Tunnel
                 (m:n protection), represents which extra-traffic
                 Tunnel the manual-switch or forced-switch to
                 extra-traffic command applies to.";
            }
          }
        }
      }
    }

    /* TE LSPs Data */
    container lsps {
      config false;
      description
        "TE LSPs state container.";
      list lsp {
        key "tunnel-name lsp-id node";
        unique "source destination tunnel-id lsp-id "
          + "extended-tunnel-id";
        description
          "List of LSPs associated with the tunnel.";
        leaf tunnel-name {
          type string;
          description "The TE tunnel name.";
        }
        leaf lsp-id {
          type uint16;
          description
            "Identifier used in the SENDER_TEMPLATE and the
             FILTER_SPEC that can be changed to allow a sender to
             share resources with itself.";
          reference
            "RFC3209";
        }
        leaf node {
          type te-types:te-node-id;
          description
            "The node where the TE LSP state resides on.";
        }
        leaf source {
          type te-types:te-node-id;
          description
            "Tunnel sender address extracted from
             SENDER_TEMPLATE  object.";
          reference
            "RFC3209";
        }
        leaf destination {
          type te-types:te-node-id;
          description
            "The tunnel endpoint address.";
          reference
            "RFC3209";
        }
        leaf tunnel-id {
          type uint16;
          description
            "The tunnel identifier that remains
             constant over the life of the tunnel.";
          reference
            "RFC3209";
        }
        leaf extended-tunnel-id {
          type yang:dotted-quad;
          description
            "The LSP Extended Tunnel ID.";
          reference
            "RFC3209";
        }
        leaf operational-state {
          type identityref {
            base te-types:lsp-state-type;
          }
          description
            "The LSP operational state.";
        }
        leaf signaling-type {
          type identityref {
            base te-types:path-signaling-type;
          }
          description
            "The signaling protocol used to set up this LSP.";
        }
        leaf origin-type {
          type enumeration {
            enum ingress {
              description
                "Origin ingress.";
            }
            enum egress {
              description
                "Origin egress.";
            }
            enum transit {
              description
                "Origin transit.";
            }
          }
          description
            "The origin of the LSP relative to the location of the
             local switch in the path.";
        }
        leaf lsp-resource-status {
          type enumeration {
            enum primary {
              description
                "A primary LSP is a fully established LSP for which
                 the resource allocation has been committed at the
                 data plane.";
            }
            enum secondary {
              description
                "A secondary LSP is an LSP that has been provisioned
                 in the control plane only; e.g. resource allocation
                 has not been committed at the data plane.";
            }
          }
          description
            "LSP resource allocation state.";
          reference
            "RFC4872, section 4.2.1";
        }
        leaf lockout-of-normal {
          type boolean;
          description
            "When set to 'true', it represents a lockout of normal
             traffic external command. When set to 'false', it
             represents a clear lockout of normal traffic external
             command. The lockout of normal traffic command applies
             to this Tunnel.";
          reference
            "RFC4427";
        }
        leaf freeze {
          type boolean;
          description
            "When set to 'true', it represents a freeze external
             command.  When set to 'false', it represents a clear
             freeze external command. The freeze command applies to
             all the Tunnels which are sharing the protection
             resources with this Tunnel.";
          reference
            "RFC4427";
        }
        leaf lsp-protection-role {
          type enumeration {
            enum working {
              description
                "A working LSP must be a primary LSP whilst a
                 protecting LSP can be either a primary or a
                 secondary LSP. Also, known as protected LSPs when
                 working LSPs are associated with protecting LSPs.";
            }
            enum protecting {
              description
                "A secondary LSP is an LSP that has been provisioned
                 in the control plane only; e.g. resource allocation
                 has not been committed at the data plane.";
            }
          }
          description
            "LSP role type.";
          reference
            "RFC4872, section 4.2.1";
        }
        leaf lsp-protection-state {
          type identityref {
            base te-types:lsp-protection-state;
          }
          description
            "The APS state machine controlling which
             tunnels are using the resources of the protecting LSP.";
          reference
            "ITU_G.808.1, RFC7271, and RFC8234";
        }
        leaf protection-group-ingress-node-id {
          type te-types:te-node-id;
          description
            "Indicates the te-node-id of the protection group
             ingress node when the APS state represents an external
             command (LoP, SF, MS) applied to it or a WTR timer
             running on it. If the external command is not applied to
             the ingress node or the WTR timer is not running on it,
             this attribute is not specified. A value 0.0.0.0 is used
             when the te-node-id of the protection group ingress node
             is unknown (e.g., because the ingress node is outside
             the scope of control of the server)";
        }
        leaf protection-group-egress-node-id {
          type te-types:te-node-id;
          description
            "Indicates the te-node-id of the protection group egress
             node when the APS state represents an external command
             (LoP, SF, MS) applied to it or a WTR timer running on
             it. If the external command is not applied to the
             ingress node or the WTR timer is not running on it, this
             attribute is not specified. A value 0.0.0.0 is used when
             the te-node-id of the protection group ingress node is
             unknown (e.g., because the ingress node is outside the
             scope of control of the server)";
        }
        container lsp-actual-route-information {
          description
            "RSVP recorded route object information.";
          list lsp-actual-route-information {
            when "../../origin-type = 'ingress'" {
              description
                "Applicable on ingress LSPs only.";
            }
            key "index";
            description
              "Record route list entry.";
            uses te-types:record-route-state;
          }
        }
      }
    }
  }

  /* TE Tunnel RPCs/execution Data */

  rpc tunnels-path-compute {
    description
      "TE tunnels RPC nodes.";
    input {
      container path-compute-info {
        /* 
         * An external path compute module may augment this
         * target.
         */
        description
          "RPC input information.";
      }
    }
    output {
      container path-compute-result {
        /* 
         * An external path compute module may augment this
         * target.
         */
        description
          "RPC output information.";
      }
    }
  }

  rpc tunnels-actions {
    description
      "TE tunnels actions RPC";
    input {
      container tunnel-info {
        description
          "TE tunnel information.";
        choice filter-type {
          mandatory true;
          description
            "Filter choice.";
          case all-tunnels {
            leaf all {
              type empty;
              mandatory true;
              description
                "When present, applies the action on all TE
                 tunnels.";
            }
          }
          case one-tunnel {
            leaf tunnel {
              type tunnel-ref;
              description
                "Apply action on the specific TE tunnel.";
            }
          }
        }
      }
      container action-info {
        description
          "TE tunnel action information.";
        leaf action {
          type identityref {
            base te-types:tunnel-action-type;
          }
          description
            "The action type.";
        }
        leaf disruptive {
          when "derived-from-or-self(../action, "
             + "'te-types:tunnel-action-reoptimize')";
          type empty;
          description
            "When present, specifies whether or not the
             reoptimization
             action is allowed to be disruptive.";
        }
      }
    }
    output {
      leaf action-result {
        type identityref {
          base te-types:te-action-result;
        }
        description
          "The result of the tunnel action operation.";
      }
    }
  }
}
<CODE ENDS>
]]></artwork></figure>

</section>
</section>
<section anchor="te-device-yang-model"><name>TE Device YANG Model</name>

<t>The device TE YANG module ('ietf-te-device') models data that is specific to
managing a TE device.  This module augments the generic TE YANG module.</t>

<section anchor="module-structure-1"><name>Module Structure</name>

<section anchor="te-interfaces"><name>TE Interfaces</name>

<t>This branch of the model manages TE interfaces that are present on a device. 
Examples of TE interface properties are:</t>

<t><list style="symbols">
  <t>Maximum reservable bandwidth, bandwidth constraints (BC)</t>
  <t>Flooding parameters
  <list style="symbols">
      <t>Flooding intervals and threshold values</t>
    </list></t>
  <t>Interface attributes
  <list style="symbols">
      <t>(Extended) administrative groups</t>
      <t>SRLG values</t>
      <t>TE metric value</t>
    </list></t>
  <t>Fast reroute backup tunnel properties (such as static, auto-tunnel)</t>
</list></t>

<t>The derived state associated with interfaces is grouped under the interface
"state" sub-container as shown in <xref target="fig-if-te-state"/>.  This covers state data
such as:</t>

<t><list style="symbols">
  <t>Bandwidth information: maximum bandwidth, available bandwidth at different
priorities and for each class-type (CT)</t>
  <t>List of admitted LSPs
  <list style="symbols">
      <t>Name, bandwidth value and pool, time, priority</t>
    </list></t>
  <t>Statistics: state counters, flooding counters, admission counters
(accepted/rejected), preemption counters</t>
  <t>Adjacency information
  <list style="symbols">
      <t>Neighbor address</t>
      <t>Metric value</t>
    </list></t>
</list></t>

<figure title="TE interface state YANG subtree" anchor="fig-if-te-state"><artwork><![CDATA[
module: ietf-te-device
  augment /te:te:
      +--rw interfaces
         .
         +-- rw te-dev:te-attributes
                <<intended configuration>>
             .
             +-- ro state
                <<derived state associated with the TE interface>>
]]></artwork></figure>

</section>
</section>
<section anchor="tree-diagram-1"><name>Tree Diagram</name>

<t><xref target="fig-te-dev-tree"/> shows the tree diagram of the device TE YANG model defined in
modules 'ietf-te-device.yang'.</t>

<figure title="TE Tunnel device model YANG tree diagram" anchor="fig-te-dev-tree"><artwork><![CDATA[
module: ietf-te-device

  augment /te:te:
    +--rw interfaces
       +--rw threshold-type?            enumeration
       +--rw delta-percentage?          rt-types:percentage
       +--rw threshold-specification?   enumeration
       +--rw up-thresholds*             rt-types:percentage
       +--rw down-thresholds*           rt-types:percentage
       +--rw up-down-thresholds*        rt-types:percentage
       +--rw interface* [interface]
          +--rw interface                           if:interface-ref
          +--rw te-metric?
          |       te-types:te-metric
          +--rw (admin-group-type)?
          |  +--:(value-admin-groups)
          |  |  +--rw (value-admin-group-type)?
          |  |     +--:(admin-groups)
          |  |     |  +--rw admin-group?
          |  |     |          te-types:admin-group
          |  |     +--:(extended-admin-groups)
          |  |              {te-types:extended-admin-groups}?
          |  |        +--rw extended-admin-group?
          |  |                te-types:extended-admin-group
          |  +--:(named-admin-groups)
          |     +--rw named-admin-groups* [named-admin-group]
          |             {te-types:extended-admin-groups,
          |              te-types:named-extended-admin-groups}?
          |        +--rw named-admin-group    leafref
          +--rw (srlg-type)?
          |  +--:(value-srlgs)
          |  |  +--rw values* [value]
          |  |     +--rw value    uint32
          |  +--:(named-srlgs)
          |     +--rw named-srlgs* [named-srlg]
          |             {te-types:named-srlg-groups}?
          |        +--rw named-srlg    leafref
          +--rw threshold-type?                     enumeration
          +--rw delta-percentage?
          |       rt-types:percentage
          +--rw threshold-specification?            enumeration
          +--rw up-thresholds*
          |       rt-types:percentage
          +--rw down-thresholds*
          |       rt-types:percentage
          +--rw up-down-thresholds*
          |       rt-types:percentage
          +--rw switching-capabilities* [switching-capability]
          |  +--rw switching-capability    identityref
          |  +--rw encoding?               identityref
          +--ro te-advertisements-state
             +--ro flood-interval?           uint32
             +--ro last-flooded-time?        uint32
             +--ro next-flooded-time?        uint32
             +--ro last-flooded-trigger?     enumeration
             +--ro advertised-level-areas* [level-area]
                +--ro level-area    uint32
  augment /te:te/te:globals:
    +--rw lsp-install-interval?        uint32
    +--rw lsp-cleanup-interval?        uint32
    +--rw lsp-invalidation-interval?   uint32
  augment /te:te/te:tunnels/te:tunnel:
    +--rw path-invalidation-action?    identityref
    +--rw lsp-install-interval?        uint32
    +--rw lsp-cleanup-interval?        uint32
    +--rw lsp-invalidation-interval?   uint32
  augment /te:te/te:lsps/te:lsp:
    +--ro lsp-timers
    |  +--ro uptime?            uint32
    |  +--ro time-to-install?   uint32
    |  +--ro time-to-destroy?   uint32
    +--ro downstream-info
    |  +--ro nhop?                 te-types:te-tp-id
    |  +--ro outgoing-interface?   if:interface-ref
    |  +--ro neighbor
    |  |  +--ro id?     te-gen-node-id
    |  |  +--ro type?   enumeration
    |  +--ro label?                rt-types:generalized-label
    +--ro upstream-info
       +--ro phop?       te-types:te-tp-id
       +--ro neighbor
       |  +--ro id?     te-gen-node-id
       |  +--ro type?   enumeration
       +--ro label?      rt-types:generalized-label

  rpcs:
    +---x link-state-update
       +---w input
          +---w (filter-type)
             +--:(match-all)
             |  +---w all          empty
             +--:(match-one-interface)
                +---w interface?   if:interface-ref

]]></artwork></figure>

</section>
<section anchor="yang-module-1"><name>YANG Module</name>

<t>The device TE YANG module 'ietf-te-device' imports the following module(s):</t>

<t><list style="symbols">
  <t>ietf-interfaces defined in <xref target="RFC8343"/></t>
  <t>ietf-routing-types defined in <xref target="RFC8294"/></t>
  <t>ietf-te-types defined in <xref target="RFC8776"/></t>
  <t>ietf-te defined in this document</t>
</list></t>

<figure title="TE device data model YANG module" anchor="fig-te-device-types"><artwork><![CDATA[
<CODE BEGINS> file "ietf-te-device@2023-03-11.yang"
module ietf-te-device {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-te-device";

  /* Replace with IANA when assigned */

  prefix te-dev;

  /* Import TE module */

  import ietf-te {
    prefix te;
    reference
      "RFCXXXX: A YANG Data Model for Traffic Engineering
       Tunnels and Interfaces";
  }

  /* Import TE types */

  import ietf-te-types {
    prefix te-types;
    reference
      "RFC8776: Common YANG Data Types for Traffic Engineering.";
  }
  import ietf-interfaces {
    prefix if;
    reference
      "RFC8343: A YANG Data Model for Interface Management";
  }
  import ietf-routing-types {
    prefix rt-types;
    reference
      "RFC8294: Common YANG Data Types for the Routing Area";
  }

  organization
    "IETF Traffic Engineering Architecture and Signaling (TEAS)
     Working Group";
  contact
    "WG Web:   <https://tools.ietf.org/wg/teas/>
     WG List:  <mailto:teas@ietf.org>

     Editor:   Tarek Saad
               <mailto:tsaad.net@gmail.com>

     Editor:   Rakesh Gandhi
               <mailto:rgandhi@cisco.com>

     Editor:   Vishnu Pavan Beeram
               <mailto:vbeeram@juniper.net>

     Editor:   Himanshu Shah
               <mailto:hshah@ciena.com>

     Editor:   Xufeng Liu
               <mailto: xufeng.liu.ietf@gmail.com>

     Editor:   Igor Bryskin
               <mailto:i_bryskin@yahoo.com>";
  description
    "This module defines a data model for TE device configurations,
     state, and RPCs. The model fully conforms to the
     Network Management Datastore Architecture (NMDA).

     Copyright (c) 2023 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
     for full legal notices.";

  // RFC Ed.: replace XXXX with actual RFC number and remove this
  // note.
  // RFC Ed.: update the date below with the date of RFC publication
  // and remove this note.

  revision 2023-03-11 {
    description
      "Initial revision for the TE device YANG module.";
    reference
      "RFCXXXX: A YANG Data Model for Traffic Engineering Tunnels
       and Interfaces";
  }

  grouping lsp-device-timers {
    description
      "Device TE LSP timers configs.";
    leaf lsp-install-interval {
      type uint32;
      units "seconds";
      description
        "TE LSP installation delay time.";
    }
    leaf lsp-cleanup-interval {
      type uint32;
      units "seconds";
      description
        "TE LSP cleanup delay time.";
    }
    leaf lsp-invalidation-interval {
      type uint32;
      units "seconds";
      description
        "TE LSP path invalidation before taking action delay time.";
    }
  }

  grouping te-igp-flooding-bandwidth-config {
    description
      "Configurable items for igp flooding bandwidth
       threshold configuration.";
    leaf threshold-type {
      type enumeration {
        enum delta {
          description
            "'delta' indicates that the local
             system should flood IGP updates when a
             change in reserved bandwidth >= the specified
             delta occurs on the interface.";
        }
        enum threshold-crossed {
          description
            "THRESHOLD-CROSSED indicates that
             the local system should trigger an update (and
             hence flood) the reserved bandwidth when the
             reserved bandwidth changes such that it crosses,
             or becomes equal to one of the threshold values.";
        }
      }
      description
        "The type of threshold that should be used to specify the
         values at which bandwidth is flooded. 'delta' indicates that
         the local system should flood IGP updates when a change in
         reserved bandwidth >= the specified delta occurs on the
         interface. Where 'threshold-crossed' is specified, the local
         system should trigger an update (and hence flood) the
         reserved bandwidth when the reserved bandwidth changes such
         that it crosses, or becomes equal to one of the threshold
         values.";
    }
    leaf delta-percentage {
      when "../threshold-type = 'delta'" {
        description
          "The percentage delta can only be specified when the
           threshold type is specified to be a percentage delta of
           the reserved bandwidth.";
      }
      type rt-types:percentage;
      description
        "The percentage of the maximum-reservable-bandwidth
         considered as the delta that results in an IGP update
         being flooded.";
    }
    leaf threshold-specification {
      when "../threshold-type = 'threshold-crossed'" {
        description
          "The selection of whether mirrored or separate threshold
           values are to be used requires user specified thresholds
           to be set.";
      }
      type enumeration {
        enum mirrored-up-down {
          description
            "mirrored-up-down indicates that a single set of
             threshold values should be used for both increasing
             and decreasing bandwidth when determining whether
             to trigger updated bandwidth values to be flooded
             in the IGP TE extensions.";
        }
        enum separate-up-down {
          description
            "separate-up-down indicates that a separate
             threshold values should be used for the increasing
             and decreasing bandwidth when determining whether
             to trigger updated bandwidth values to be flooded
             in the IGP TE extensions.";
        }
      }
      description
        "This value specifies whether a single set of threshold
         values should be used for both increasing and decreasing
         bandwidth when determining whether to trigger updated
         bandwidth values to be flooded in the IGP TE extensions.
         'mirrored-up-down' indicates that a single value (or set of
         values) should be used for both increasing and decreasing
         values, where 'separate-up-down' specifies that the
         increasing and decreasing values will be separately
         specified.";
    }
    leaf-list up-thresholds {
      when "../threshold-type = 'threshold-crossed'"
         + "and ../threshold-specification = 'separate-up-down'" {
        description
          "A list of up-thresholds can only be specified when the
           bandwidth update is triggered based on crossing a
           threshold and separate up and down thresholds are
           required.";
      }
      type rt-types:percentage;
      description
        "The thresholds (expressed as a percentage of the maximum
         reservable bandwidth) at which bandwidth updates are to be
         triggered when the bandwidth is increasing.";
    }
    leaf-list down-thresholds {
      when "../threshold-type = 'threshold-crossed'"
         + "and ../threshold-specification = 'separate-up-down'" {
        description
          "A list of down-thresholds can only be specified when the
           bandwidth update is triggered based on crossing a
           threshold and separate up and down thresholds are
           required.";
      }
      type rt-types:percentage;
      description
        "The thresholds (expressed as a percentage of the maximum
         reservable bandwidth) at which bandwidth updates are to be
         triggered when the bandwidth is decreasing.";
    }
    leaf-list up-down-thresholds {
      when "../threshold-type = 'threshold-crossed'"
         + "and ../threshold-specification = 'mirrored-up-down'" {
        description
          "A list of thresholds corresponding to both increasing
           and decreasing bandwidths can be specified only when an
           update is triggered based on crossing a threshold, and
           the same up and down thresholds are required.";
      }
      type rt-types:percentage;
      description
        "The thresholds (expressed as a percentage of the maximum
         reservable bandwidth of the interface) at which bandwidth
         updates are flooded - used both when the bandwidth is
         increasing and decreasing.";
    }
  }

  /**
   * TE device augmentations
   */
  augment "/te:te" {
    description
      "TE global container.";
    /* TE Interface Configuration Data */
    container interfaces {
      description
        "Configuration data model for TE interfaces.";
      uses te-igp-flooding-bandwidth-config;
      list interface {
        key "interface";
        description
          "TE interfaces.";
        leaf interface {
          type if:interface-ref;
          description
            "TE interface name.";
        }
        /* TE interface parameters */
        leaf te-metric {
          type te-types:te-metric;
          description
            "TE interface metric.";
        }
        choice admin-group-type {
          description
            "TE interface administrative groups
             representation type.";
          case value-admin-groups {
            choice value-admin-group-type {
              description
                "choice of admin-groups.";
              case admin-groups {
                description
                  "Administrative group/Resource
                   class/Color.";
                leaf admin-group {
                  type te-types:admin-group;
                  description
                    "TE interface administrative group.";
                }
              }
              case extended-admin-groups {
                if-feature "te-types:extended-admin-groups";
                description
                  "Extended administrative group/Resource
                   class/Color.";
                leaf extended-admin-group {
                  type te-types:extended-admin-group;
                  description
                    "TE interface extended administrative group.";
                }
              }
            }
          }
          case named-admin-groups {
            list named-admin-groups {
              if-feature "te-types:extended-admin-groups";
              if-feature "te-types:named-extended-admin-groups";
              key "named-admin-group";
              description
                "A list of named admin-group entries.";
              leaf named-admin-group {
                type leafref {
                  path "../../../../te:globals/"
                     + "te:named-admin-groups/te:named-admin-group/"
                     + "te:name";
                }
                description
                  "A named admin-group entry.";
              }
            }
          }
        }
        choice srlg-type {
          description
            "Choice of SRLG configuration.";
          case value-srlgs {
            list values {
              key "value";
              description
                "List of SRLG values that
                 this link is part of.";
              leaf value {
                type uint32 {
                  range "0..4294967295";
                }
                description
                  "Value of the SRLG";
              }
            }
          }
          case named-srlgs {
            list named-srlgs {
              if-feature "te-types:named-srlg-groups";
              key "named-srlg";
              description
                "A list of named SRLG entries.";
              leaf named-srlg {
                type leafref {
                  path "../../../../te:globals/"
                     + "te:named-srlgs/te:named-srlg/te:name";
                }
                description
                  "A named SRLG entry.";
              }
            }
          }
        }
        uses te-igp-flooding-bandwidth-config;
        list switching-capabilities {
          key "switching-capability";
          description
            "List of interface capabilities for this interface.";
          leaf switching-capability {
            type identityref {
              base te-types:switching-capabilities;
            }
            description
              "Switching Capability for this interface.";
          }
          leaf encoding {
            type identityref {
              base te-types:lsp-encoding-types;
            }
            description
              "Encoding supported by this interface.";
          }
        }
        container te-advertisements-state {
          config false;
          description
            "TE interface advertisements state container.";
          leaf flood-interval {
            type uint32;
            description
              "The periodic flooding interval.";
          }
          leaf last-flooded-time {
            type uint32;
            units "seconds";
            description
              "Time elapsed since last flooding in seconds.";
          }
          leaf next-flooded-time {
            type uint32;
            units "seconds";
            description
              "Time remained for next flooding in seconds.";
          }
          leaf last-flooded-trigger {
            type enumeration {
              enum link-up {
                description
                  "Link-up flooding trigger.";
              }
              enum link-down {
                description
                  "Link-down flooding trigger.";
              }
              enum threshold-up {
                description
                  "Bandwidth reservation up threshold.";
              }
              enum threshold-down {
                description
                  "Bandwidth reservation down threshold.";
              }
              enum bandwidth-change {
                description
                  "Bandwidth capacity change.";
              }
              enum user-initiated {
                description
                  "Initiated by user.";
              }
              enum srlg-change {
                description
                  "SRLG property change.";
              }
              enum periodic-timer {
                description
                  "Periodic timer expired.";
              }
            }
            default "periodic-timer";
            description
              "Trigger for the last flood.";
          }
          list advertised-level-areas {
            key "level-area";
            description
              "List of level-areas that the TE interface is
               advertised in.";
            leaf level-area {
              type uint32;
              description
                "The IGP area or level where the TE interface link
                 state is advertised in.";
            }
          }
        }
      }
    }
  }

  /* TE globals device augmentation */

  augment "/te:te/te:globals" {
    description
      "Global TE device specific configuration parameters.";
    uses lsp-device-timers;
  }

  /* TE tunnels device configuration augmentation */

  augment "/te:te/te:tunnels/te:tunnel" {
    description
      "Tunnel device dependent augmentation.";
    leaf path-invalidation-action {
      type identityref {
        base te-types:path-invalidation-action-type;
      }
      description
        "Tunnel path invalidation action.";
    }
    uses lsp-device-timers;
  }

  /* TE LSPs device state augmentation */

  augment "/te:te/te:lsps/te:lsp" {
    description
      "TE LSP device dependent augmentation.";
    container lsp-timers {
      when "../te:origin-type = 'ingress'" {
        description
          "Applicable to ingress LSPs only.";
      }
      description
        "Ingress LSP timers.";
      leaf uptime {
        type uint32;
        units "seconds";
        description
          "The LSP uptime.";
      }
      leaf time-to-install {
        type uint32;
        units "seconds";
        description
          "The time remaining for a new LSP to be instantiated
           in forwarding to carry traffic.";
      }
      leaf time-to-destroy {
        type uint32;
        units "seconds";
        description
          "The time remaining for a existing LSP to be deleted
           from forwarding.";
      }
    }
    container downstream-info {
      when "../te:origin-type != 'egress'" {
        description
          "Downstream information of the LSP.";
      }
      description
        "downstream information.";
      leaf nhop {
        type te-types:te-tp-id;
        description
          "downstream next-hop address.";
      }
      leaf outgoing-interface {
        type if:interface-ref;
        description
          "downstream interface.";
      }
      container neighbor {
        uses te:te-generic-node-id;
        description
          "downstream neighbor address.";
      }
      leaf label {
        type rt-types:generalized-label;
        description
          "downstream label.";
      }
    }
    container upstream-info {
      when "../te:origin-type != 'ingress'" {
        description
          "Upstream information of the LSP.";
      }
      description
        "upstream information.";
      leaf phop {
        type te-types:te-tp-id;
        description
          "upstream next-hop or previous-hop address.";
      }
      container neighbor {
        uses te:te-generic-node-id;
        description
          "upstream neighbor address.";
      }
      leaf label {
        type rt-types:generalized-label;
        description
          "upstream label.";
      }
    }
  }

  /* TE interfaces RPCs/execution Data */

  rpc link-state-update {
    description
      "Triggers a link state update for the specific interface.";
    input {
      choice filter-type {
        mandatory true;
        description
          "Filter choice.";
        case match-all {
          leaf all {
            type empty;
            mandatory true;
            description
              "Match all TE interfaces.";
          }
        }
        case match-one-interface {
          leaf interface {
            type if:interface-ref;
            description
              "Match a specific TE interface.";
          }
        }
      }
    }
  }
}
<CODE ENDS>
]]></artwork></figure>

</section>
</section>
<section anchor="notifications"><name>Notifications</name>

<t>Notifications are a key component of any topology data model.</t>

<t><xref target="RFC8639"/> and <xref target="RFC8641"/> define a subscription mechanism and a push
mechanism for YANG datastores.  These mechanisms currently allow the
user to:</t>

<t><list style="symbols">
  <t>Subscribe to notifications on a per-client basis.</t>
  <t>Specify subtree filters or XML Path Language (XPath) filters so
that only contents of interest will be sent.</t>
  <t>Specify either periodic or on-demand notifications.</t>
</list></t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document registers the following URIs in the IETF XML registry
<xref target="RFC3688"/>.
Following the format in <xref target="RFC3688"/>, the following registrations are
requested to be made.</t>

<figure><artwork><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-te
   Registrant Contact:  The IESG.
   XML: N/A, the requested URI is an XML namespace.

   URI: urn:ietf:params:xml:ns:yang:ietf-te-device
   Registrant Contact:  The IESG.
   XML: N/A, the requested URI is an XML namespace.
]]></artwork></figure>

<t>This document registers two YANG modules in the YANG Module Names
registry <xref target="RFC6020"/>.</t>

<figure><artwork><![CDATA[
   Name:       ietf-te
   Namespace:  urn:ietf:params:xml:ns:yang:ietf-te
   Prefix:     te
   Reference:  RFCXXXX

   Name:       ietf-te-device
   Namespace:  urn:ietf:params:xml:ns:yang:ietf-te-device
   Prefix:     te-device
   Reference:  RFCXXXX
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The YANG module specified in this document defines a schema for data that is
designed to be accessed via network management protocols such as NETCONF
<xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure
transport layer, and the mandatory-to-implement secure transport is Secure
Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the
mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>

<t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/> provides the
means to restrict access for particular NETCONF or RESTCONF users to a
preconfigured subset of all available NETCONF or RESTCONF protocol operations
and content.</t>

<t>There are a number of data nodes defined in this YANG module that are
writable/creatable/deletable (i.e., config true, which is the default). These
data nodes may be considered sensitive or vulnerable in some network
environments. Write operations (e.g., edit-config) to these data nodes without
proper protection can have a negative effect on network operations. These are
the subtrees and data nodes and their sensitivity/vulnerability:</t>

<t>"/te/globals":  This module specifies the global TE configurations on a device.
Unauthorized access to this container could cause the device to ignore packets
it should receive and process.</t>

<t>"/te/tunnels":  This list specifies the configuration and state of TE Tunnels
present on the device or controller.  Unauthorized access to this list could
cause the device to ignore packets it should receive and process. An attacker
may also use state to derive information about the network topology,
and subsequently orchestrate further attacks.</t>

<t>"/te/interfaces":  This list specifies the configuration and state TE interfaces
on a device. Unauthorized access to this list could cause the device to ignore packets it
should receive and process.</t>

<t>Some of the readable data nodes in this YANG module may be considered sensitive
or vulnerable in some network environments. It is thus important to control
read access (e.g., via get, get-config, or notification) to these data nodes.
These are the subtrees and data nodes and their sensitivity/vulnerability:</t>

<t>"/te/lsps": this list contains information state about established LSPs in the network.
An attacker can use this information to derive information about the network topology,
and subsequently orchestrate further attacks.</t>

<t>Some of the RPC operations in this YANG module may be considered sensitive or
vulnerable in some network environments. It is thus important to control access
to these operations. These are the operations and their
sensitivity/vulnerability:</t>

<t>"/te/tunnels-actions": using this RPC, an attacker can modify existing paths that
may be carrying live traffic, and hence result to interruption to services
carried over the network.</t>

<t>"/te/tunnels-path-compute": using this RPC, an attacker can retrieve secured
information about the network provider which can be used to orchestrate further
attacks.</t>

<t>The security considerations spelled out in the YANG 1.1 specification
<xref target="RFC7950"/> apply for this document as well.</t>

</section>
<section anchor="acknowledgement"><name>Acknowledgement</name>

<t>The authors would like to thank the  members of the multi-vendor YANG design
team who are involved in the definition of this model.</t>

<t>The authors would like to thank Tom Petch and Adrian Farrel for reviewing and
providing useful feedback about the document. The authors would also like to
thank Loa Andersson, Lou Berger, Sergio Belotti, Italo Busi, Carlo Perocchio,
Francesco Lazzeri, Aihua Guo, Dhruv Dhody, and Raqib Jones for providing
feedback on this document.</t>

</section>
<section anchor="contributors"><name>Contributors</name>

<figure><artwork><![CDATA[
   Himanshu Shah
   Ciena

   Email: hshah@ciena.com


   Xia Chen
   Huawei Technologies

   Email: jescia.chenxia@huawei.com


   Bin Wen
   Comcast

   Email: Bin_Wen@cable.comcast.com

]]></artwork></figure>

</section>
<section anchor="AppendixA"><name>Appendix A: Data Tree Examples</name>

<t>This section contains examples of use of the model with RESTCONF <xref target="RFC8040"/> and JSON encoding.</t>

<t>For the example we will use a 4 node MPLS network were RSVP-TE MPLS Tunnels can be setup. The
loopbacks of each router are shown. The network in <xref target="AppFig-Topo"/> will be used in the examples
described in the following sections.</t>

<figure title="TE network used in data tree examples" anchor="AppFig-Topo"><artwork><![CDATA[
 192.0.2.1        192.0.2.2      192.0.2.4
 +-------+        +-------+      +-------+
 |       |        |       |      |       |
 |   A   +--------+   B   +------+   D   |
 +---+---+        +-------+      +---+---+
     |                               |
     |            +-------+          |
     |            |       |          |
     +------------+   C   +----------+
                  |       |
                  +-------+
                  192.0.2.3
]]></artwork></figure>

<section anchor="TeTunnel"><name>Basic Tunnel Setup</name>

<t>This example uses the TE Tunnel YANG data model defined in this document to create an
RSVP-TE signaled Tunnel of packet LSP encoding type. First, the TE Tunnel is created with no specific restrictions or constraints (e.g., protection or restoration).
The TE Tunnel ingresses on router A and egresses on router D.</t>

<t>In this case, the TE Tunnel is created without specifying additional information about the primary paths.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/tunnels HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_2",
      "encoding": "te-types:lsp-encoding-packet",
      "admin-state": "te-types:tunnel-state-up",
      "source": "192.0.2.1",
      "destination": "192.0.2.4",
      "bidirectional": "false",
      "signaling-type": "te-types:path-setup-rsvp"
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="global-named-path-constraints"><name>Global Named Path Constraints</name>

<t>This example uses the YANG data model to create a 'named path constraint' that can be reference by TE Tunnels.
The path constraint, in this case, limits the TE Tunnel hops for the computed path.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/globals/named-path-constraints
     HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json


  "ietf-te:named-path-constraint": {
          "name": "max-hop-3",
          "path-metric-bounds": {
            "path-metric-bound": {
              "metric-type": "te-types:path-metric-hop",
              "upper-bound": "3"
    }
   }
  }
}
]]></artwork></figure>

</section>
<section anchor="tunnel-with-global-path-constraint"><name>Tunnel with Global Path Constraint</name>

<t>In this example, the previously created 'named path constraint' is applied to the TE Tunnel created in <xref target="TeTunnel"/>.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/tunnels HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:ietf-tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_4_1",
      "encoding": "te-types:lsp-encoding-packet",
      "description": "Simple_LSP_with_named_path",
      "admin-state": "te-types:tunnel-state-up",
      "source": "192.0.2.1",
      "destination": "192.0.2.4",
      "signaling-type": "path-setup-rsvp",
      "primary-paths": [
        {
          "primary-path": {
            "name": "Simple_LSP_1",
            "use-path-computation": "true",
            "named-path-constraint": "max-hop-3"
          }
        }
      ]
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="tunnel-with-per-tunnel-path-constraint"><name>Tunnel with Per-tunnel Path Constraint</name>

<t>In this example, the a per tunnel path constraint is explicitly indicated under the TE Tunnel created in <xref target="TeTunnel"/> to constrain the computed path for the tunnel.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/tunnels HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_4_2",
      "encoding": "te-types:lsp-encoding-packet",
      "admin-state": "te-types:tunnel-state-up",
      "source": "192.0.2.1",
      "destination": "192.0.2.4",
      "signaling-type": "te-types:path-setup-rsvp",
      "primary-paths": {
        "primary-path": [
          {
            "name": "path1",
            "path-metric-bounds": {
              "path-metric-bound": [ 
                {
                  "metric-type": "te-types:path-metric-hop",
                  "upper-bound": "3"
                }
              ]
            }
          }
        ]
      }
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="tunnel-state"><name>Tunnel State</name>

<t>In this example, the 'GET' query is sent to return the state stored about the tunnel.</t>

<figure><artwork><![CDATA[
GET  /restconf/data/ietf-te:te/tunnels +
     /tunnel="Example_LSP_Tunnel_A_4_1"
     /p2p-primary-paths/ HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
]]></artwork></figure>

<t>The request, with status code 200 would include, for example, the following json:</t>

<figure><artwork><![CDATA[
{
  "ietf-te:primary-paths": {
    "primary-path": [
      {
        "name": "path1",
        "path-computation-method": "te-types:path-locally-computed",
        "computed-paths-properties": {
          "computed-path-properties": [
            {
              "k-index": "1",
              "path-properties": {
                "path-route-objects": {
                  "path-route-object": [
                    {
                      "index": "1",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": "2",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.4"
                      }
                    }
                  ]
                }
              }
            }
          ]
        },
        "lsps": {
          "lsp": [
            {
              "tunnel-name": "Example_LSP_Tunnel_A_4_1",
              "node": "192.0.2.1 ",
              "lsp-id": "25356"
            }
          ]
        }
      }
    ]
  }
}
]]></artwork></figure>

</section>
<section anchor="example-te-tunnel-with-primary-and-secondary-paths"><name>Example TE Tunnel with Primary and Secondary Paths</name>

<figure title="TE network used in data tree examples" anchor="AppFig-Topo2"><artwork><![CDATA[
                       +----------+          +----------+
                     +-|192.0.2.9 |---+      |192.0.2.10|
                     | +----------+   |      +----------+
                     |                |          |   |
+----------+    +----------+     +----------+    |   |
|192.0.2.8 |----|192.0.2.3 |-----|192.0.2.4 |----+   |
+----------+    +----------+     +----------+        |
  |                  |                |              |
+----------+         |                |              |
|192.0.2.1 |---------+                |           +----------+
+----------+                          +-----------|192.0.2.5 |
      |  |                                        +----------+
      |  |              +----------+                     | |
      |  +--------------|192.0.2.2 |---------------------+ |
      |                 +----------+                       |
      |                       | |                          |
  +----------+                | |                   +----------+
  |192.0.2.6 |----------------+ +-------------------|192.0.2.7 |
  +----------+                                      +----------+

]]></artwork></figure>

<t>Below is the state retrieved for a TE tunnel from source 192.0.2.1 to 192.0.2.5
with primary, secondary, reverse, and secondary reverse paths as shown in <xref target="AppFig-Topo2"/>.</t>

<figure><artwork><![CDATA[
{
  "ietf-te:te": {
    "tunnels": {
      "tunnel": [
        {
          "name": "example-1",
          "description": "Example in slide 1",
          "source": "192.0.2.1",
          "destination": "192.0.2.5",
          "bidirectional": false,
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-1 (fwd)",
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "name": "primary-2 (rev)",
                  "explicit-route-objects-always": {
                    "route-object-include-exclude": [
                      {
                        "index": 1,
                        "numbered-node-hop": {
                          "node-id": "192.0.2.3",
                          "hop-type": "loose"
                        }
                      }
                    ]
                  },
                  "candidate-secondary-reverse-paths": {
                    "candidate-secondary-reverse-path": [
                      "secondary-3 (rev)",
                      "secondary-4 (rev)",
                      "secondary-5 (rev)"
                    ]
                  }
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    "secondary-1 (fwd)",
                    "secondary-2 (fwd)"
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-1 (fwd)",
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-2 (fwd)",
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          },
          "secondary-reverse-paths": {
            "secondary-reverse-path": [
              {
                "name": "secondary-3 (rev)",
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.4",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-4 (rev)",
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.4"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.3",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-5 (rev)",
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.3"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1",
                        "hop-type":"loose"
                      }
                    }
                  ]
                }
              }
            ]
          }
        },
        {
          "name": "example-3",
          "description": "Example in slide 3",
          "source": "192.0.2.1",
          "destination": "192.0.2.5",
          "bidirectional": true,
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-1 (bidir)",
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    "secondary-1 (bidir)",
                    "secondary-2 (bidir)"
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-1 (bidir)",
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-2 (bidir)",
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          }
        },
        {
          "name": "example-4",
          "description": "Example in slide 4",
          "source": "192.0.2.1",
          "destination": "192.0.2.5",
          "bidirectional": false,
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-1 (fwd)",
                "co-routed": [null],
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "name": "primary-2 (rev)",
                  "candidate-secondary-reverse-paths": {
                    "candidate-secondary-reverse-path": [
                      "secondary-3 (rev)",
                      "secondary-4 (rev)"
                    ]
                  }
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    "secondary-1 (fwd)",
                    "secondary-2 (fwd)"
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-1 (fwd)",
                "co-routed": [null],
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-2 (fwd)",
                "co-routed": [null],
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          },
          "secondary-reverse-paths": {
            "secondary-reverse-path": [
              {
                "name": "secondary-3 (rev)"
              },
              {
                "name": "secondary-4 (rev)"
              }
            ]
          }
        }
      ]
    }
  }
}
]]></artwork></figure>

</section>
</section>
<section anchor="AppendixB"><name>Appendix B: Full Model Tree Diagram</name>

<t><xref target="fig-te-tree-full"/> shows the full tree diagram of the TE YANG model defined in
module 'ietf-te.yang'.</t>

<figure title="Full tree diagram of TE Tunnel YANG data model" anchor="fig-te-tree-full"><artwork><![CDATA[
module: ietf-te
  +--rw te
     +--rw enable?    boolean
     +--rw globals
     |  +--rw named-admin-groups
     |  |  +--rw named-admin-group* [name]
     |  |          {te-types:extended-admin-groups,
     |  |           te-types:named-extended-admin-groups}?
     |  |     +--rw name            string
     |  |     +--rw bit-position?   uint32
     |  +--rw named-srlgs
     |  |  +--rw named-srlg* [name] {te-types:named-srlg-groups}?
     |  |     +--rw name     string
     |  |     +--rw value?   te-types:srlg
     |  |     +--rw cost?    uint32
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
     |             {te-types:named-path-constraints}?
     |        +--rw name                       string
     |        +---u path-constraints-common
     +--rw tunnels
     |  +--rw tunnel* [name]
     |     +--rw name                                    string
     |     +--rw alias?                                  string
     |     +--rw identifier?                             uint32
     |     +--rw color?                                  uint32
     |     +--rw description?                            string
     |     +--rw admin-state?                            identityref
     |     +--ro operational-state?                      identityref
     |     +---u te-types:encoding-and-switching-type
     |     +---u tunnel-common-attributes
     |     +--rw controller
     |     |  +--rw protocol-origin?        identityref
     |     |  +--rw controller-entity-id?   string
     |     +--rw reoptimize-timer?                       uint16
     |     +---u tunnel-associations-properties
     |     +---u protection-restoration-properties
     |     +---u te-types:tunnel-constraints
     |     +---u tunnel-hierarchy-properties
     |     +--rw primary-paths
     |     |  +--rw primary-path* [name]
     |     |     +---u path-common-properties
     |     |     +---u path-forward-properties
     |     |     +---u k-requested-paths
     |     |     +---u path-compute-info
     |     |     +---u path-state
     |     |     +--rw primary-reverse-path
     |     |     |  +---u path-common-properties
     |     |     |  +---u path-compute-info
     |     |     |  +---u path-state
     |     |     |  +--rw candidate-secondary-reverse-paths
     |     |     |     +--rw candidate-secondary-reverse-path*
     |     |     |             [secondary-path]
     |     |     |        +--rw secondary-path    leafref
     |     |     +--rw candidate-secondary-paths
     |     |        +--rw candidate-secondary-path* [secondary-path]
     |     |           +--rw secondary-path    leafref
     |     |           +--ro active?           boolean
     |     +--rw secondary-paths
     |     |  +--rw secondary-path* [name]
     |     |     +---u path-common-properties
     |     |     +--rw preference?                          uint8
     |     |     +---u path-compute-info
     |     |     +---u protection-restoration-properties
     |     |     +---u path-state
     |     +--rw secondary-reverse-paths
     |     |  +--rw secondary-reverse-path* [name]
     |     |     +---u path-common-properties
     |     |     +--rw preference?                          uint8
     |     |     +---u path-compute-info
     |     |     +---u protection-restoration-properties
     |     |     +---u path-state
     |     +---x tunnel-action
     |     |  +---w input
     |     |  |  +---w action-type?   identityref
     |     |  +--ro output
     |     |     +--ro action-result?   identityref
     |     +---x protection-external-commands
     |        +---w input
     |           +---w protection-external-command?     identityref
     |           +---w protection-group-ingress-node?   boolean
     |           +---w protection-group-egress-node?    boolean
     |           +---w path-name?                       string
     |           +---w path-type?
     |           |       te-types:path-type
     |           +---w traffic-type?                    enumeration
     |           +---w extra-traffic-tunnel-ref?        tunnel-ref
     +--ro lsps
        +--ro lsp* [tunnel-name lsp-id node]
           +--ro tunnel-name                         string
           +--ro lsp-id                              uint16
           +--ro node
           |       te-types:te-node-id
           +--ro source?
           |       te-types:te-node-id
           +--ro destination?
           |       te-types:te-node-id
           +--ro tunnel-id?                          uint16
           +--ro extended-tunnel-id?                 yang:dotted-quad
           +--ro operational-state?                  identityref
           +--ro signaling-type?                     identityref
           +--ro origin-type?                        enumeration
           +--ro lsp-resource-status?                enumeration
           +--ro lockout-of-normal?                  boolean
           +--ro freeze?                             boolean
           +--ro lsp-protection-role?                enumeration
           +--ro lsp-protection-state?               identityref
           +--ro protection-group-ingress-node-id?
           |       te-types:te-node-id
           +--ro protection-group-egress-node-id?
           |       te-types:te-node-id
           +--ro lsp-actual-route-information
              +--ro lsp-actual-route-information* [index]
                 +---u te-types:record-route-state

  rpcs:
    +---x tunnels-path-compute
    |  +---w input
    |  |  +---w path-compute-info
    |  +--ro output
    |     +--ro path-compute-result
    +---x tunnels-actions
       +---w input
       |  +---w tunnel-info
       |  |  +---w (filter-type)
       |  |     +--:(all-tunnels)
       |  |     |  +---w all       empty
       |  |     +--:(one-tunnel)
       |  |        +---w tunnel?   tunnel-ref
       |  +---w action-info
       |     +---w action?       identityref
       |     +---w disruptive?   empty
       +--ro output
          +--ro action-result?   identityref

  grouping te-generic-node-id:
    +-- id?     te-gen-node-id
    +-- type?   enumeration
  grouping path-common-properties:
    +-- name?                      string
    +-- path-computation-method?   identityref
    +-- path-computation-server
    |  +---u te-generic-node-id
    +-- compute-only?              empty
    +-- use-path-computation?      boolean
    +-- lockdown?                  empty
    +--ro path-scope?                identityref
  grouping path-compute-info:
    +---u tunnel-associations-properties
    +---u te-types:generic-path-optimization
    +-- named-path-constraint?                leafref
    |       {te-types:named-path-constraints}?
    +---u path-constraints-common
  grouping path-forward-properties:
    +-- preference?   uint8
    +-- co-routed?    boolean
  grouping k-requested-paths:
    +-- k-requested-paths?   uint8
  grouping path-state:
    +---u path-computation-response
    +--ro lsp-provisioning-error-infos
    |  +--ro lsp-provisioning-error-info* []
    |     +--ro error-reason?        identityref
    |     +--ro error-description?   string
    |     +--ro error-timestamp?     yang:date-and-time
    |     +--ro error-node-id?       te-types:te-node-id
    |     +--ro error-link-id?       te-types:te-tp-id
    |     +--ro lsp-id?              uint16
    +--ro lsps
       +--ro lsp* [node lsp-id]
          +--ro tunnel-name?   -> /te/lsps/lsp/tunnel-name
          +--ro node?          leafref
          +--ro lsp-id?        leafref
  grouping path-computation-response:
    +--ro computed-paths-properties
    |  +--ro computed-path-properties* [k-index]
    |     +--ro k-index?                            uint8
    |     +---u te-types:generic-path-properties
    +--ro computed-path-error-infos
       +--ro computed-path-error-info* []
          +--ro error-description?   string
          +--ro error-timestamp?     yang:date-and-time
          +--ro error-reason?        identityref
  grouping protection-restoration-properties:
    +-- protection
    |  +-- protection-type?                identityref
    |  +-- protection-reversion-disable?   boolean
    |  +-- hold-off-time?                  uint32
    |  +-- wait-to-revert?                 uint16
    |  +-- aps-signal-id?                  uint8
    +-- restoration
       +-- restoration-type?                identityref
       +-- restoration-scheme?              identityref
       +-- restoration-reversion-disable?   boolean
       +-- hold-off-time?                   uint32
       +-- wait-to-restore?                 uint16
       +-- wait-to-revert?                  uint16
  grouping tunnel-associations-properties:
    +-- association-objects
       +-- association-object* [association-key]
       |  +-- association-key?   string
       |  +-- type?              identityref
       |  +-- id?                uint16
       |  +-- source
       |     +---u te-generic-node-id
       +-- association-object-extended* [association-key]
          +-- association-key?   string
          +-- type?              identityref
          +-- id?                uint16
          +-- source
          |  +---u te-generic-node-id
          +-- global-source?     uint32
          +-- extended-id?       yang:hex-string
  grouping tunnel-common-attributes:
    +-- source?             te-types:te-node-id
    +-- destination?        te-types:te-node-id
    +-- src-tunnel-tp-id?   binary
    +-- dst-tunnel-tp-id?   binary
    +-- bidirectional?      boolean
  grouping tunnel-hierarchy-properties:
    +-- hierarchy
       +-- dependency-tunnels
       |  +-- dependency-tunnel* [name]
       |     +-- name?
       |     |       -> /te/tunnels/tunnel/name
       |     +---u te-types:encoding-and-switching-type
       +-- hierarchical-link
          +-- enable?                            boolean
          +-- local-te-node-id?                  te-types:te-node-id
          +-- local-te-link-tp-id?               te-types:te-tp-id
          +-- remote-te-node-id?                 te-types:te-node-id
          +---u te-types:te-topology-identifier
  grouping path-constraints-common:
    +---u te-types:common-path-constraints-attributes
    +---u te-types:generic-path-disjointness
    +---u te-types:path-constraints-route-objects
    +-- path-in-segment!
    |  +---u te-types:label-set-info
    +-- path-out-segment!
       +---u te-types:label-set-info
]]></artwork></figure>

</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='RFC3209' target='https://www.rfc-editor.org/info/rfc3209'>
<front>
<title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
<author fullname='D. Awduche' initials='D.' surname='Awduche'><organization/></author>
<author fullname='L. Berger' initials='L.' surname='Berger'><organization/></author>
<author fullname='D. Gan' initials='D.' surname='Gan'><organization/></author>
<author fullname='T. Li' initials='T.' surname='Li'><organization/></author>
<author fullname='V. Srinivasan' initials='V.' surname='Srinivasan'><organization/></author>
<author fullname='G. Swallow' initials='G.' surname='Swallow'><organization/></author>
<date month='December' year='2001'/>
<abstract><t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching).  Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels.  A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3209'/>
<seriesInfo name='DOI' value='10.17487/RFC3209'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC6020' target='https://www.rfc-editor.org/info/rfc6020'>
<front>
<title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
<author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'><organization/></author>
<date month='October' year='2010'/>
<abstract><t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6020'/>
<seriesInfo name='DOI' value='10.17487/RFC6020'/>
</reference>



<reference anchor='RFC6241' target='https://www.rfc-editor.org/info/rfc6241'>
<front>
<title>Network Configuration Protocol (NETCONF)</title>
<author fullname='R. Enns' initials='R.' role='editor' surname='Enns'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'><organization/></author>
<author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'><organization/></author>
<author fullname='A. Bierman' initials='A.' role='editor' surname='Bierman'><organization/></author>
<date month='June' year='2011'/>
<abstract><t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6241'/>
<seriesInfo name='DOI' value='10.17487/RFC6241'/>
</reference>



<reference anchor='RFC6991' target='https://www.rfc-editor.org/info/rfc6991'>
<front>
<title>Common YANG Data Types</title>
<author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'><organization/></author>
<date month='July' year='2013'/>
<abstract><t>This document introduces a collection of common data types to be used with the YANG data modeling language.  This document obsoletes RFC 6021.</t></abstract>
</front>
<seriesInfo name='RFC' value='6991'/>
<seriesInfo name='DOI' value='10.17487/RFC6991'/>
</reference>



<reference anchor='RFC6107' target='https://www.rfc-editor.org/info/rfc6107'>
<front>
<title>Procedures for Dynamically Signaled Hierarchical Label Switched Paths</title>
<author fullname='K. Shiomoto' initials='K.' role='editor' surname='Shiomoto'><organization/></author>
<author fullname='A. Farrel' initials='A.' role='editor' surname='Farrel'><organization/></author>
<date month='February' year='2011'/>
<abstract><t>Label Switched Paths (LSPs) set up in Multiprotocol Label Switching (MPLS) or Generalized MPLS (GMPLS) networks can be used to form links to carry traffic in those networks or in other (client) networks.</t><t>Protocol mechanisms already exist to facilitate the establishment of such LSPs and to bundle traffic engineering (TE) links to reduce the load on routing protocols.  This document defines extensions to those mechanisms to support identifying the use to which such LSPs are to be put and to enable the TE link endpoints to be assigned addresses or unnumbered identifiers during the signaling process.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6107'/>
<seriesInfo name='DOI' value='10.17487/RFC6107'/>
</reference>



<reference anchor='RFC8040' target='https://www.rfc-editor.org/info/rfc8040'>
<front>
<title>RESTCONF Protocol</title>
<author fullname='A. Bierman' initials='A.' surname='Bierman'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'><organization/></author>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t></abstract>
</front>
<seriesInfo name='RFC' value='8040'/>
<seriesInfo name='DOI' value='10.17487/RFC8040'/>
</reference>


<reference anchor="ITU_G.808.1" >
  <front>
    <title>Generic protection switching - Linear trail and subnetwork protection</title>
    <author >
      <organization>ITU-T Recommendation G.808.1</organization>
    </author>
    <date year="2014" month="May"/>
  </front>
  <seriesInfo name="ITU-T G.808.1" value=""/>
</reference>




<reference anchor='RFC7950' target='https://www.rfc-editor.org/info/rfc7950'>
<front>
<title>The YANG 1.1 Data Modeling Language</title>
<author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'><organization/></author>
<date month='August' year='2016'/>
<abstract><t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols.  This document describes the syntax and semantics of version 1.1 of the YANG language.  YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification.  There are a small number of backward incompatibilities from YANG version 1.  This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t></abstract>
</front>
<seriesInfo name='RFC' value='7950'/>
<seriesInfo name='DOI' value='10.17487/RFC7950'/>
</reference>



<reference anchor='RFC3473' target='https://www.rfc-editor.org/info/rfc3473'>
<front>
<title>Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) Extensions</title>
<author fullname='L. Berger' initials='L.' role='editor' surname='Berger'><organization/></author>
<date month='January' year='2003'/>
<abstract><t>This document describes extensions to Multi-Protocol Label Switching (MPLS) Resource ReserVation Protocol - Traffic Engineering (RSVP-TE) signaling required to support Generalized MPLS.  Generalized MPLS extends the MPLS control plane to encompass time-division (e.g., Synchronous Optical Network and Synchronous Digital Hierarchy, SONET/SDH), wavelength (optical lambdas) and spatial switching (e.g., incoming port or fiber to outgoing port or fiber).  This document presents a RSVP-TE specific description of the extensions.  A generic functional description can be found in separate documents.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3473'/>
<seriesInfo name='DOI' value='10.17487/RFC3473'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC8294' target='https://www.rfc-editor.org/info/rfc8294'>
<front>
<title>Common YANG Data Types for the Routing Area</title>
<author fullname='X. Liu' initials='X.' surname='Liu'><organization/></author>
<author fullname='Y. Qu' initials='Y.' surname='Qu'><organization/></author>
<author fullname='A. Lindem' initials='A.' surname='Lindem'><organization/></author>
<author fullname='C. Hopps' initials='C.' surname='Hopps'><organization/></author>
<author fullname='L. Berger' initials='L.' surname='Berger'><organization/></author>
<date month='December' year='2017'/>
<abstract><t>This document defines a collection of common data types using the YANG data modeling language.  These derived common types are designed to be imported by other modules defined in the routing area.</t></abstract>
</front>
<seriesInfo name='RFC' value='8294'/>
<seriesInfo name='DOI' value='10.17487/RFC8294'/>
</reference>



<reference anchor='RFC8776' target='https://www.rfc-editor.org/info/rfc8776'>
<front>
<title>Common YANG Data Types for Traffic Engineering</title>
<author fullname='T. Saad' initials='T.' surname='Saad'><organization/></author>
<author fullname='R. Gandhi' initials='R.' surname='Gandhi'><organization/></author>
<author fullname='X. Liu' initials='X.' surname='Liu'><organization/></author>
<author fullname='V. Beeram' initials='V.' surname='Beeram'><organization/></author>
<author fullname='I. Bryskin' initials='I.' surname='Bryskin'><organization/></author>
<date month='June' year='2020'/>
<abstract><t>This document defines a collection of common data types and groupings in YANG data modeling language. These derived common types and groupings are intended to be imported by modules that model Traffic Engineering (TE) configuration and state capabilities.</t></abstract>
</front>
<seriesInfo name='RFC' value='8776'/>
<seriesInfo name='DOI' value='10.17487/RFC8776'/>
</reference>



<reference anchor='RFC8340' target='https://www.rfc-editor.org/info/rfc8340'>
<front>
<title>YANG Tree Diagrams</title>
<author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'><organization/></author>
<author fullname='L. Berger' initials='L.' role='editor' surname='Berger'><organization/></author>
<date month='March' year='2018'/>
<abstract><t>This document captures the current syntax used in YANG module tree diagrams.  The purpose of this document is to provide a single location for this definition.  This syntax may be updated from time to time based on the evolution of the YANG language.</t></abstract>
</front>
<seriesInfo name='BCP' value='215'/>
<seriesInfo name='RFC' value='8340'/>
<seriesInfo name='DOI' value='10.17487/RFC8340'/>
</reference>



<reference anchor='RFC8342' target='https://www.rfc-editor.org/info/rfc8342'>
<front>
<title>Network Management Datastore Architecture (NMDA)</title>
<author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'><organization/></author>
<author fullname='J. Schoenwaelder' initials='J.' surname='Schoenwaelder'><organization/></author>
<author fullname='P. Shafer' initials='P.' surname='Shafer'><organization/></author>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<author fullname='R. Wilton' initials='R.' surname='Wilton'><organization/></author>
<date month='March' year='2018'/>
<abstract><t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model.  This document updates RFC 7950.</t></abstract>
</front>
<seriesInfo name='RFC' value='8342'/>
<seriesInfo name='DOI' value='10.17487/RFC8342'/>
</reference>



<reference anchor='RFC9012' target='https://www.rfc-editor.org/info/rfc9012'>
<front>
<title>The BGP Tunnel Encapsulation Attribute</title>
<author fullname='K. Patel' initials='K.' surname='Patel'><organization/></author>
<author fullname='G. Van de Velde' initials='G.' surname='Van de Velde'><organization/></author>
<author fullname='S. Sangli' initials='S.' surname='Sangli'><organization/></author>
<author fullname='J. Scudder' initials='J.' surname='Scudder'><organization/></author>
<date month='April' year='2021'/>
<abstract><t>This document defines a BGP path attribute known as the &quot;Tunnel Encapsulation attribute&quot;, which can be used with BGP UPDATEs of various Subsequent Address Family Identifiers (SAFIs) to provide information needed to create tunnels and their corresponding encapsulation headers. It provides encodings for a number of tunnel types, along with procedures for choosing between alternate tunnels and routing packets into tunnels.</t><t>This document obsoletes RFC 5512, which provided an earlier definition of the Tunnel Encapsulation attribute. RFC 5512 was never deployed in production. Since RFC 5566 relies on RFC 5512, it is likewise obsoleted. This document updates RFC 5640 by indicating that the Load-Balancing Block sub-TLV may be included in any Tunnel Encapsulation attribute where load balancing is desired.</t></abstract>
</front>
<seriesInfo name='RFC' value='9012'/>
<seriesInfo name='DOI' value='10.17487/RFC9012'/>
</reference>



<reference anchor='RFC8795' target='https://www.rfc-editor.org/info/rfc8795'>
<front>
<title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
<author fullname='X. Liu' initials='X.' surname='Liu'><organization/></author>
<author fullname='I. Bryskin' initials='I.' surname='Bryskin'><organization/></author>
<author fullname='V. Beeram' initials='V.' surname='Beeram'><organization/></author>
<author fullname='T. Saad' initials='T.' surname='Saad'><organization/></author>
<author fullname='H. Shah' initials='H.' surname='Shah'><organization/></author>
<author fullname='O. Gonzalez de Dios' initials='O.' surname='Gonzalez de Dios'><organization/></author>
<date month='August' year='2020'/>
<abstract><t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t></abstract>
</front>
<seriesInfo name='RFC' value='8795'/>
<seriesInfo name='DOI' value='10.17487/RFC8795'/>
</reference>



<reference anchor='RFC4206' target='https://www.rfc-editor.org/info/rfc4206'>
<front>
<title>Label Switched Paths (LSP) Hierarchy with Generalized Multi-Protocol Label Switching (GMPLS) Traffic Engineering (TE)</title>
<author fullname='K. Kompella' initials='K.' surname='Kompella'><organization/></author>
<author fullname='Y. Rekhter' initials='Y.' surname='Rekhter'><organization/></author>
<date month='October' year='2005'/>
<abstract><t>To improve scalability of Generalized Multi-Protocol Label Switching (GMPLS) it may be useful to aggregate Label Switched Paths (LSPs) by creating a hierarchy of such LSPs.  A way to create such a hierarchy is by (a) a Label Switching Router (LSR) creating a Traffic Engineering Label Switched Path (TE LSP), (b) the LSR forming a forwarding adjacency (FA) out of that LSP (by advertising this LSP as a Traffic Engineering (TE) link into the same instance of ISIS/OSPF as the one that was used to create the LSP), (c) allowing other LSRs to use FAs for their path computation, and (d) nesting of LSPs originated by other LSRs into that LSP (by using the label stack construct).</t><t>This document describes the mechanisms to accomplish this.  [PROPOSED STANDARD]</t></abstract>
</front>
<seriesInfo name='RFC' value='4206'/>
<seriesInfo name='DOI' value='10.17487/RFC4206'/>
</reference>



<reference anchor='RFC4427' target='https://www.rfc-editor.org/info/rfc4427'>
<front>
<title>Recovery (Protection and Restoration) Terminology for Generalized Multi-Protocol Label Switching (GMPLS)</title>
<author fullname='E. Mannie' initials='E.' role='editor' surname='Mannie'><organization/></author>
<author fullname='D. Papadimitriou' initials='D.' role='editor' surname='Papadimitriou'><organization/></author>
<date month='March' year='2006'/>
<abstract><t>This document defines a common terminology for Generalized Multi-Protocol Label Switching (GMPLS)-based recovery mechanisms (i.e., protection and restoration).  The terminology is independent of the underlying transport technologies covered by GMPLS.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='4427'/>
<seriesInfo name='DOI' value='10.17487/RFC4427'/>
</reference>



<reference anchor='RFC4872' target='https://www.rfc-editor.org/info/rfc4872'>
<front>
<title>RSVP-TE Extensions in Support of End-to-End Generalized Multi-Protocol Label Switching (GMPLS) Recovery</title>
<author fullname='J.P. Lang' initials='J.P.' role='editor' surname='Lang'><organization/></author>
<author fullname='Y. Rekhter' initials='Y.' role='editor' surname='Rekhter'><organization/></author>
<author fullname='D. Papadimitriou' initials='D.' role='editor' surname='Papadimitriou'><organization/></author>
<date month='May' year='2007'/>
<abstract><t>This document describes protocol-specific procedures and extensions for Generalized Multi-Protocol Label Switching (GMPLS) Resource ReSerVation Protocol - Traffic Engineering (RSVP-TE) signaling to support end-to-end Label Switched Path (LSP) recovery that denotes protection and restoration.  A generic functional description of GMPLS recovery can be found in a companion document, RFC 4426.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4872'/>
<seriesInfo name='DOI' value='10.17487/RFC4872'/>
</reference>



<reference anchor='RFC6780' target='https://www.rfc-editor.org/info/rfc6780'>
<front>
<title>RSVP ASSOCIATION Object Extensions</title>
<author fullname='L. Berger' initials='L.' surname='Berger'><organization/></author>
<author fullname='F. Le Faucheur' initials='F.' surname='Le Faucheur'><organization/></author>
<author fullname='A. Narayanan' initials='A.' surname='Narayanan'><organization/></author>
<date month='October' year='2012'/>
<abstract><t>The RSVP ASSOCIATION object was defined in the context of GMPLS-controlled Label Switched Paths (LSPs).  In this context, the object is used to associate recovery LSPs with the LSP they are protecting.  This object also has broader applicability as a mechanism to associate RSVP state.  This document defines how the ASSOCIATION object can be more generally applied.  This document also defines Extended ASSOCIATION objects that, in particular, can be used in the context of the MPLS Transport Profile (MPLS-TP).  This document updates RFC 2205, RFC 3209, and RFC 3473.  It also generalizes the definition of the Association ID field defined in RFC 4872.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6780'/>
<seriesInfo name='DOI' value='10.17487/RFC6780'/>
</reference>



<reference anchor='RFC7471' target='https://www.rfc-editor.org/info/rfc7471'>
<front>
<title>OSPF Traffic Engineering (TE) Metric Extensions</title>
<author fullname='S. Giacalone' initials='S.' surname='Giacalone'><organization/></author>
<author fullname='D. Ward' initials='D.' surname='Ward'><organization/></author>
<author fullname='J. Drake' initials='J.' surname='Drake'><organization/></author>
<author fullname='A. Atlas' initials='A.' surname='Atlas'><organization/></author>
<author fullname='S. Previdi' initials='S.' surname='Previdi'><organization/></author>
<date month='March' year='2015'/>
<abstract><t>In certain networks, such as, but not limited to, financial information networks (e.g., stock market data providers), network performance information (e.g., link propagation delay) is becoming critical to data path selection.</t><t>This document describes common extensions to RFC 3630 &quot;Traffic                                           Engineering (TE) Extensions to OSPF Version 2&quot; and RFC 5329 &quot;Traffic                                     Engineering Extensions to OSPF Version 3&quot; to enable network performance information to be distributed in a scalable fashion.  The information distributed using OSPF TE Metric Extensions can then be used to make path selection decisions based on network performance.</t><t>Note that this document only covers the mechanisms by which network performance information is distributed.  The mechanisms for measuring network performance information or using that information, once distributed, are outside the scope of this document.</t></abstract>
</front>
<seriesInfo name='RFC' value='7471'/>
<seriesInfo name='DOI' value='10.17487/RFC7471'/>
</reference>



<reference anchor='RFC8570' target='https://www.rfc-editor.org/info/rfc8570'>
<front>
<title>IS-IS Traffic Engineering (TE) Metric Extensions</title>
<author fullname='L. Ginsberg' initials='L.' role='editor' surname='Ginsberg'><organization/></author>
<author fullname='S. Previdi' initials='S.' role='editor' surname='Previdi'><organization/></author>
<author fullname='S. Giacalone' initials='S.' surname='Giacalone'><organization/></author>
<author fullname='D. Ward' initials='D.' surname='Ward'><organization/></author>
<author fullname='J. Drake' initials='J.' surname='Drake'><organization/></author>
<author fullname='Q. Wu' initials='Q.' surname='Wu'><organization/></author>
<date month='March' year='2019'/>
<abstract><t>In certain networks, such as, but not limited to, financial information networks (e.g., stock market data providers), network-performance criteria (e.g., latency) are becoming as critical to data-path selection as other metrics.</t><t>This document describes extensions to IS-IS Traffic Engineering Extensions (RFC 5305).  These extensions provide a way to distribute and collect network-performance information in a scalable fashion. The information distributed using IS-IS TE Metric Extensions can then be used to make path-selection decisions based on network performance.</t><t>Note that this document only covers the mechanisms with which network-performance information is distributed.  The mechanisms for measuring network performance or acting on that information, once distributed, are outside the scope of this document.</t><t>This document obsoletes RFC 7810.</t></abstract>
</front>
<seriesInfo name='RFC' value='8570'/>
<seriesInfo name='DOI' value='10.17487/RFC8570'/>
</reference>



<reference anchor='RFC8232' target='https://www.rfc-editor.org/info/rfc8232'>
<front>
<title>Optimizations of Label Switched Path State Synchronization Procedures for a Stateful PCE</title>
<author fullname='E. Crabbe' initials='E.' surname='Crabbe'><organization/></author>
<author fullname='I. Minei' initials='I.' surname='Minei'><organization/></author>
<author fullname='J. Medved' initials='J.' surname='Medved'><organization/></author>
<author fullname='R. Varga' initials='R.' surname='Varga'><organization/></author>
<author fullname='X. Zhang' initials='X.' surname='Zhang'><organization/></author>
<author fullname='D. Dhody' initials='D.' surname='Dhody'><organization/></author>
<date month='September' year='2017'/>
<abstract><t>A stateful Path Computation Element (PCE) has access to not only the information disseminated by the network's Interior Gateway Protocol (IGP) but also the set of active paths and their reserved resources for its computation.  The additional Label Switched Path (LSP) state information allows the PCE to compute constrained paths while considering individual LSPs and their interactions.  This requires a State Synchronization mechanism between the PCE and the network, the PCE and Path Computation Clients (PCCs), and cooperating PCEs.  The basic mechanism for State Synchronization is part of the stateful PCE specification.  This document presents motivations for optimizations to the base State Synchronization procedure and specifies the required Path Computation Element Communication Protocol (PCEP) extensions.</t></abstract>
</front>
<seriesInfo name='RFC' value='8232'/>
<seriesInfo name='DOI' value='10.17487/RFC8232'/>
</reference>



<reference anchor='RFC7271' target='https://www.rfc-editor.org/info/rfc7271'>
<front>
<title>MPLS Transport Profile (MPLS-TP) Linear Protection to Match the Operational Expectations of Synchronous Digital Hierarchy, Optical Transport Network, and Ethernet Transport Network Operators</title>
<author fullname='J. Ryoo' initials='J.' role='editor' surname='Ryoo'><organization/></author>
<author fullname='E. Gray' initials='E.' role='editor' surname='Gray'><organization/></author>
<author fullname='H. van Helvoort' initials='H.' surname='van Helvoort'><organization/></author>
<author fullname='A. D&apos;Alessandro' initials='A.' surname='D&apos;Alessandro'><organization/></author>
<author fullname='T. Cheung' initials='T.' surname='Cheung'><organization/></author>
<author fullname='E. Osborne' initials='E.' surname='Osborne'><organization/></author>
<date month='June' year='2014'/>
<abstract><t>This document describes alternate mechanisms to perform some of the functions of MPLS Transport Profile (MPLS-TP) linear protection defined in RFC 6378, and also defines additional mechanisms.  The purpose of these alternate and additional mechanisms is to provide operator control and experience that more closely models the behavior of linear protection seen in other transport networks.</t><t>This document also introduces capabilities and modes for linear protection.  A capability is an individual behavior, and a mode is a particular combination of capabilities.  Two modes are defined in this document: Protection State Coordination (PSC) mode and Automatic Protection Switching (APS) mode.</t><t>This document describes the behavior of the PSC protocol including priority logic and state machine when all the capabilities associated with the APS mode are enabled.</t><t>This document updates RFC 6378 in that the capability advertisement method defined here is an addition to that document.</t></abstract>
</front>
<seriesInfo name='RFC' value='7271'/>
<seriesInfo name='DOI' value='10.17487/RFC7271'/>
</reference>



<reference anchor='RFC8234' target='https://www.rfc-editor.org/info/rfc8234'>
<front>
<title>Updates to MPLS Transport Profile (MPLS-TP) Linear Protection in Automatic Protection Switching (APS) Mode</title>
<author fullname='J. Ryoo' initials='J.' surname='Ryoo'><organization/></author>
<author fullname='T. Cheung' initials='T.' surname='Cheung'><organization/></author>
<author fullname='H. van Helvoort' initials='H.' surname='van Helvoort'><organization/></author>
<author fullname='I. Busi' initials='I.' surname='Busi'><organization/></author>
<author fullname='G. Wen' initials='G.' surname='Wen'><organization/></author>
<date month='August' year='2017'/>
<abstract><t>This document contains updates to MPLS Transport Profile (MPLS-TP) linear protection in Automatic Protection Switching (APS) mode defined in RFC 7271.  The updates provide rules related to the initialization of the Protection State Coordination (PSC) Control Logic (in which the state machine resides) when operating in APS mode and clarify the operation related to state transition table lookup.</t></abstract>
</front>
<seriesInfo name='RFC' value='8234'/>
<seriesInfo name='DOI' value='10.17487/RFC8234'/>
</reference>



<reference anchor='RFC7308' target='https://www.rfc-editor.org/info/rfc7308'>
<front>
<title>Extended Administrative Groups in MPLS Traffic Engineering (MPLS-TE)</title>
<author fullname='E. Osborne' initials='E.' surname='Osborne'><organization/></author>
<date month='July' year='2014'/>
<abstract><t>MPLS Traffic Engineering (MPLS-TE) advertises 32 administrative groups (commonly referred to as &quot;colors&quot; or &quot;link colors&quot;) using the Administrative Group sub-TLV.  This is defined for OSPFv2 (RFC 3630), OSPFv3 (RFC 5329) and IS-IS (RFC 5305).</t><t>This document adds a sub-TLV to the IGP TE extensions, &quot;Extended Administrative Group&quot;.  This sub-TLV provides for additional administrative groups (link colors) beyond the current limit of 32.</t></abstract>
</front>
<seriesInfo name='RFC' value='7308'/>
<seriesInfo name='DOI' value='10.17487/RFC7308'/>
</reference>



<reference anchor='RFC8343' target='https://www.rfc-editor.org/info/rfc8343'>
<front>
<title>A YANG Data Model for Interface Management</title>
<author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'><organization/></author>
<date month='March' year='2018'/>
<abstract><t>This document defines a YANG data model for the management of network interfaces.  It is expected that interface-type-specific data models augment the generic interfaces data model defined in this document. The data model includes definitions for configuration and system state (status information and counters for the collection of statistics).</t><t>The YANG data model in this document conforms to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t><t>This document obsoletes RFC 7223.</t></abstract>
</front>
<seriesInfo name='RFC' value='8343'/>
<seriesInfo name='DOI' value='10.17487/RFC8343'/>
</reference>



<reference anchor='RFC8639' target='https://www.rfc-editor.org/info/rfc8639'>
<front>
<title>Subscription to YANG Notifications</title>
<author fullname='E. Voit' initials='E.' surname='Voit'><organization/></author>
<author fullname='A. Clemm' initials='A.' surname='Clemm'><organization/></author>
<author fullname='A. Gonzalez Prieto' initials='A.' surname='Gonzalez Prieto'><organization/></author>
<author fullname='E. Nilsen-Nygaard' initials='E.' surname='Nilsen-Nygaard'><organization/></author>
<author fullname='A. Tripathy' initials='A.' surname='Tripathy'><organization/></author>
<date month='September' year='2019'/>
<abstract><t>This document defines a YANG data model and associated mechanisms enabling subscriber-specific subscriptions to a publisher's event streams.  Applying these elements allows a subscriber to request and receive a continuous, customized feed of publisher-generated information.</t></abstract>
</front>
<seriesInfo name='RFC' value='8639'/>
<seriesInfo name='DOI' value='10.17487/RFC8639'/>
</reference>



<reference anchor='RFC8641' target='https://www.rfc-editor.org/info/rfc8641'>
<front>
<title>Subscription to YANG Notifications for Datastore Updates</title>
<author fullname='A. Clemm' initials='A.' surname='Clemm'><organization/></author>
<author fullname='E. Voit' initials='E.' surname='Voit'><organization/></author>
<date month='September' year='2019'/>
<abstract><t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore.  Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t></abstract>
</front>
<seriesInfo name='RFC' value='8641'/>
<seriesInfo name='DOI' value='10.17487/RFC8641'/>
</reference>



<reference anchor='RFC3688' target='https://www.rfc-editor.org/info/rfc3688'>
<front>
<title>The IETF XML Registry</title>
<author fullname='M. Mealling' initials='M.' surname='Mealling'><organization/></author>
<date month='January' year='2004'/>
<abstract><t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t></abstract>
</front>
<seriesInfo name='BCP' value='81'/>
<seriesInfo name='RFC' value='3688'/>
<seriesInfo name='DOI' value='10.17487/RFC3688'/>
</reference>



<reference anchor='RFC6242' target='https://www.rfc-editor.org/info/rfc6242'>
<front>
<title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
<author fullname='M. Wasserman' initials='M.' surname='Wasserman'><organization/></author>
<date month='June' year='2011'/>
<abstract><t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem.  This document obsoletes RFC 4742.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6242'/>
<seriesInfo name='DOI' value='10.17487/RFC6242'/>
</reference>



<reference anchor='RFC8446' target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<date month='August' year='2018'/>
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>



<reference anchor='RFC8341' target='https://www.rfc-editor.org/info/rfc8341'>
<front>
<title>Network Configuration Access Control Model</title>
<author fullname='A. Bierman' initials='A.' surname='Bierman'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'><organization/></author>
<date month='March' year='2018'/>
<abstract><t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability.  There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.  This document defines such an access control model.</t><t>This document obsoletes RFC 6536.</t></abstract>
</front>
<seriesInfo name='STD' value='91'/>
<seriesInfo name='RFC' value='8341'/>
<seriesInfo name='DOI' value='10.17487/RFC8341'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC9256' target='https://www.rfc-editor.org/info/rfc9256'>
<front>
<title>Segment Routing Policy Architecture</title>
<author fullname='C. Filsfils' initials='C.' surname='Filsfils'><organization/></author>
<author fullname='K. Talaulikar' initials='K.' role='editor' surname='Talaulikar'><organization/></author>
<author fullname='D. Voyer' initials='D.' surname='Voyer'><organization/></author>
<author fullname='A. Bogdanov' initials='A.' surname='Bogdanov'><organization/></author>
<author fullname='P. Mattes' initials='P.' surname='Mattes'><organization/></author>
<date month='July' year='2022'/>
<abstract><t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t><t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t></abstract>
</front>
<seriesInfo name='RFC' value='9256'/>
<seriesInfo name='DOI' value='10.17487/RFC9256'/>
</reference>



<reference anchor='RFC3945' target='https://www.rfc-editor.org/info/rfc3945'>
<front>
<title>Generalized Multi-Protocol Label Switching (GMPLS) Architecture</title>
<author fullname='E. Mannie' initials='E.' role='editor' surname='Mannie'><organization/></author>
<date month='October' year='2004'/>
<abstract><t>Future data and transmission networks will consist of elements such as routers, switches, Dense Wavelength Division Multiplexing (DWDM) systems, Add-Drop Multiplexors (ADMs), photonic cross-connects (PXCs), optical cross-connects (OXCs), etc. that will use Generalized Multi-Protocol Label Switching (GMPLS) to dynamically provision resources and to provide network survivability using protection and restoration techniques. </t><t> This document describes the architecture of GMPLS.  GMPLS extends MPLS to encompass time-division (e.g., SONET/SDH, PDH, G.709), wavelength (lambdas), and spatial switching (e.g., incoming port or fiber to outgoing port or fiber).  The focus of GMPLS is on the control plane of these various layers since each of them can use physically diverse data or forwarding planes.  The intention is to cover both the signaling and the routing part of that control plane.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3945'/>
<seriesInfo name='DOI' value='10.17487/RFC3945'/>
</reference>



<reference anchor='rfc3473' target='https://www.rfc-editor.org/info/rfc3473'>
<front>
<title>Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) Extensions</title>
<author fullname='L. Berger' initials='L.' role='editor' surname='Berger'><organization/></author>
<date month='January' year='2003'/>
<abstract><t>This document describes extensions to Multi-Protocol Label Switching (MPLS) Resource ReserVation Protocol - Traffic Engineering (RSVP-TE) signaling required to support Generalized MPLS.  Generalized MPLS extends the MPLS control plane to encompass time-division (e.g., Synchronous Optical Network and Synchronous Digital Hierarchy, SONET/SDH), wavelength (optical lambdas) and spatial switching (e.g., incoming port or fiber to outgoing port or fiber).  This document presents a RSVP-TE specific description of the extensions.  A generic functional description can be found in separate documents.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3473'/>
<seriesInfo name='DOI' value='10.17487/RFC3473'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

