<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc comments="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-teas-yang-te-41" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="TE YANG Data Model">A YANG Data Model for Traffic Engineering Tunnels, Label Switched Paths, and Interfaces</title>

    <author initials="T." surname="Saad" fullname="Tarek Saad">
      <organization>Cisco Systems Inc</organization>
      <address>
        <email>tsaad.net@gmail.com</email>
      </address>
    </author>
    <author initials="R." surname="Gandhi" fullname="Rakesh Gandhi">
      <organization>Cisco Systems Inc</organization>
      <address>
        <email>rgandhi@cisco.com</email>
      </address>
    </author>
    <author initials="X." surname="Liu" fullname="Xufeng Liu">
      <organization>Alef Edge</organization>
      <address>
        <email>xufeng.liu.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="V. P." surname="Beeram" fullname="Vishnu Pavan Beeram">
      <organization>Juniper Networks</organization>
      <address>
        <email>vbeeram@juniper.net</email>
      </address>
    </author>
    <author initials="I." surname="Bryskin" fullname="Igor Bryskin">
      <organization>Individual</organization>
      <address>
        <email>i_bryskin@yahoo.com</email>
      </address>
    </author>

    <date year="2026" month="January" day="18"/>

    
    <workgroup>TEAS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 62?>

<t>This document defines a YANG data model for the provisioning and management of
Traffic Engineering (TE) tunnels, Label Switched Paths (LSPs), and interfaces.
The model covers data that is independent of any technology or dataplane encapsulation
and is divided into two YANG modules that cover device-specific, and device independent
data.</t>

<t>This model covers data for configuration, operational state, remote procedural
calls, and event notifications.</t>



    </abstract>



  </front>

  <middle>


<?line 73?>

<section anchor="introduction"><name>Introduction</name>

<t>YANG <xref target="RFC6020"/> and <xref target="RFC7950"/> is a data modeling language that was
introduced to define the contents of a conceptual data store that allows
networked devices to be managed using NETCONF <xref target="RFC6241"/>. YANG has proved
relevant beyond its initial confines, as bindings to other interfaces (e.g.
RESTCONF <xref target="RFC8040"/>) and encoding other than XML (e.g. JSON) are being defined.
Furthermore, YANG data models can be used as the basis of implementation for
other interfaces, such as CLI and programmatic APIs.</t>

<t>This document defines a YANG data model intended for the provisioning and management
of point-to-point Traffic Engineering (TE) tunnels, Label Switched Paths (LSPs),
and interfaces. The modelling of point-to-multipoint TE Tunnels <xref target="RFC4875"/>
and Segment-Routing (SR) Policies <xref target="RFC9256"/> falls outside the scope of this
document.</t>

<t>The data model described herein is divided into two YANG modules. The 'ietf-te'
module contains generic, device-independent data, and the 'ietf-te-device'
module addresses device-specific data.</t>

<t>This document outlines the high-level relationships between the YANG modules it
defines and other external protocol YANG modules. The TE YANG data
model intentionally excludes data specific to any signaling protocol, 
such as RSVP-TE (<xref target="RFC3209"/>, <xref target="RFC3473"/>), or Segment-Routing TE (SR-TE) 
<xref target="RFC9256"/> with the
expectation that such technology models will be defined in separate documents
and will augment the generic TE model as needed.</t>

</section>
<section anchor="terms-and-conventions"><name>Terms and Conventions</name>

<section anchor="terminology"><name>Terminology</name>

<t>The following terms are defined in <xref target="RFC6241"/> and are used in this specification:</t>

<t><list style="symbols">
  <t>client</t>
  <t>configuration data</t>
  <t>state data</t>
</list></t>

<t>This document also makes use of the following terminology introduced in the
YANG Data Modeling Language <xref target="RFC7950"/>:</t>

<t><list style="symbols">
  <t>augment</t>
  <t>data model</t>
  <t>data node</t>
</list></t>

</section>
<section anchor="prefixes-in-data-node-names"><name>Prefixes in Data Node Names</name>

<t>In this document, names of data nodes and other data model objects are prefixed
using the standard prefix associated with the corresponding YANG imported
modules, as shown in <xref target="tab1"/>.</t>

<texttable title="Prefixes and corresponding YANG modules" anchor="tab1">
      <ttcol align='left'>Prefix</ttcol>
      <ttcol align='left'>YANG module</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>yang</c>
      <c>ietf-yang-types</c>
      <c><xref target="RFC6991"/></c>
      <c>inet</c>
      <c>ietf-inet-types</c>
      <c><xref target="RFC6991"/></c>
      <c>rt-types</c>
      <c>ietf-routing-types</c>
      <c><xref target="RFC8294"/></c>
      <c>te-types</c>
      <c>ietf-te-types</c>
      <c><xref target="I-D.draft-ietf-teas-rfc8776-update"/></c>
      <c>te-packet-types</c>
      <c>ietf-te-packet-types</c>
      <c><xref target="I-D.draft-ietf-teas-rfc8776-update"/></c>
      <c>te</c>
      <c>ietf-te</c>
      <c>this document</c>
      <c>te-dev</c>
      <c>ietf-te-device</c>
      <c>this document</c>
</texttable>

</section>
<section anchor="model-tree-diagrams"><name>Model Tree Diagrams</name>

<t>The tree diagrams extracted from the modules defined in this document are given in
subsequent sections as per the syntax defined in <xref target="RFC8340"/>.</t>

</section>
</section>
<section anchor="design-considerations"><name>Design Considerations</name>

<t>This document describes a generic TE YANG data model that is independent of
any dataplane technology.  One of the design objectives is to allow specific
data plane technology models to reuse the TE generic data model and possibly
augment it with technology specific data.</t>

<t>The elements of the generic TE YANG data model, including TE Tunnels, LSPs, and
interfaces have leafs that identify the technology layer where they reside.
For example, the LSP encoding type can identify the technology associated with a
TE Tunnel or LSP.</t>

<t>Also, the generic TE YANG data model does not cover signaling protocol data.
The signaling protocols used to instantiate TE LSPs are outside the scope of this
document and expected to be covered by augmentations defined in other documents.</t>

<t>The following other design considerations are taken into account with respect to data
organization:</t>

<t><list style="symbols">
  <t>The device independent TE data is defined in the 'ietf-te' module, and
can be used to manage data off a device, such as a TE controller. When the
model is used to manage a specific device, the model contains the TE Tunnels
originating from the specific device.  When the model is used to manage a TE
controller, the 'tunnel' list contains all TE Tunnels and TE tunnel segments
originating from devices that the TE controller manages.</t>
  <t>The device-specific TE data is defined in the 'ietf-te-device' module.</t>
  <t>Minimal elements in the model are designated as "mandatory" to
allow freedom to vendors to adapt the data model to their specific product
implementation.</t>
  <t>Suitable defaults are specified for all configurable elements.</t>
  <t>Where TE functions or features might be optional within the
deployed TE network, the model declares them as optional.</t>
</list></t>

<section anchor="state-data-organization"><name>State Data Organization</name>

<t>The Network Management Datastore Architecture (NMDA) <xref target="RFC8342"/> addresses
modeling state data for ephemeral objects.  This document adopts the NMDA model
for configuration and state data representation as per IETF guidelines for new
IETF YANG data models.</t>

</section>
</section>
<section anchor="model-overview"><name>Model Overview</name>

<t>The data model defined in this document cover the core TE features that are
commonly supported by different vendor implementations. The support of extended
or vendor specific TE features is expected to either be in augmentations, or
deviations to this model that are defined in separate documents.</t>

<section anchor="module-relationship"><name>Module Relationship</name>

<t>The generic TE YANG data model, defined in the 'ietf-te' YANG module, provides
device-independent building blocks that are agnostic of specific technologies
or control plane instances. The TE device YANG data model, defined in the
'ietf-te-device' YANG module, augments the 'ietf-te' YANG module as illustrated in
<xref target="figctrl"/> by including device-specific data such as TE interface attributes and
local TE node timers.</t>

<t>The TE data models for specific instances of data plane technology and
signaling protocols are outside the scope of this document.  They could be
defined in separate YANG modules that augment the generic TE YANG data model.</t>

<figure title="Relationship of TE modules with signaling protocol modules" anchor="figctrl"><artwork><![CDATA[
     TE generic     +---------+
     module         | ietf-te |o-------------+
                    +---------+               \
                        o  o                   \
                        |   \                   \
                        |    \ TE device module  \
                        |     +----------------+  \
                        |     | ietf-te-device |   \
                        |     +----------------+    \
                        |        o                   \
                        |        |                    \
                        |        |                     \
                    +---------------+          +---------------+
     RSVP-TE module | ietf-rsvp-te^ |o         | ietf-te-mpls^ |
                    +---------------+ \        +---------------+
                        |              \
                        |               \
                        |                \
                        |                 \
                        |                  \
                        o                +-------------------+
                    +------------+       | ietf-rsvp-otn-te^ |
     RSVP module    | ietf-rsvp^ |       +-------------------+
                    +------------+         RSVP-TE with OTN
                                              extensions

                   X---oY indicates that module X augments module Y
                   ^ indicates a module defined in other documents

]]></artwork></figure>

</section>
</section>
<section anchor="te-yang-model"><name>TE YANG Model</name>

<t>The generic TE YANG data model defined in the 'ietf-te' module supports the management and
operation of a TE network. This includes creating, modifying, and retrieving
information about TE Tunnels, LSPs, and interfaces and their associated
attributes (e.g.  Administrative-Groups, SRLGs, etc.).</t>

<t>A full tree diagram of the TE YANG data model is shown in <xref target="AppendixB"/>.</t>

<section anchor="module-structure"><name>Module Structure</name>

<t>The 'te' container is the top level container in the 'ietf-te' module. The
presence of the 'te' container enables TE function system-wide.  Further
descriptions of containers that exist under the 'te' top level container are
provided in the following sections.</t>

<t>The three containers grouped under the 'te'
container as shown in <xref target="fig-highlevel"/> and described below.</t>

<t>globals:</t>

<ul empty="true"><li>
  <t>The 'globals' container maintains the set of global TE attributes that can be
applicable to TE Tunnels and interfaces. Refer to <xref target="TeGlobals"/> for further details.</t>
</li></ul>

<t>tunnels:</t>

<ul empty="true"><li>
  <t>The 'tunnels' container includes the list of TE Tunnels that are instantiated.
Refer to <xref target="TE_TUNNELS"/> for further details on the properties of a TE Tunnel.</t>
</li></ul>

<t>lsps:</t>

<ul empty="true"><li>
  <t>The 'lsps' container includes the list of TE LSPs that are instantiated for
TE Tunnels. Refer to <xref target="TE_LSPS"/> for further details on the properties of a TE LSP.</t>
</li></ul>

<t>The model also contains two Remote Procedure Calls (RPCs) as shown
in <xref target="AppendixB"/> and described below.</t>

<t>tunnels-path-compute:</t>

<ul empty="true"><li>
  <t>An RPC to request path computation for a specific TE Tunnel.
The RPC allows requesting path computation using atomic and stateless operation.
A tunnel may also be configured in 'compute-only' mode to provide stateful path updates
- see <xref target="TE_TUNNELS"/> for further details.</t>
</li></ul>

<t>tunnels-action:</t>

<ul empty="true"><li>
  <t>An RPC to request a specific action (e.g. reoptimize, or tear-and-setup) to be taken
on a specific tunnel or all tunnels.</t>
</li></ul>

<figure title="TE Tunnel model high-level YANG tree view" anchor="fig-highlevel"><artwork><![CDATA[
module: ietf-te
  +--rw te!
     +--rw globals
     |     ...
     +--rw tunnels
     |     ...
     +--ro lsps
           ...

  rpcs:
    +---x tunnels-path-compute
    |  +---w input
    |  |     ...
    |  +--ro output
    |        ...
    +---x tunnels-actions
       +---w input
       |     ...
       +--ro output
             ...

]]></artwork></figure>

<section anchor="TeGlobals"><name>TE Globals</name>

<t>The 'globals' container covers properties that control a TE feature's
behavior system-wide, and its respective state as shown in <xref target="fig-globals"/>
and described in the text that follows.</t>

<figure title="TE globals YANG subtree high-level structure" anchor="fig-globals"><artwork><![CDATA[
     +--rw globals
     |  +--rw named-admin-groups
     |  |  +--rw named-admin-group* [name]
     |  |        ...
     |  +--rw named-srlgs
     |  |  +--rw named-srlg* [name]
     |  |        ...
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
]]></artwork></figure>

<t>named-admin-groups:</t>

<ul empty="true"><li>
  <t>A YANG container for the list of named (extended) administrative groups that may be applied
to TE links.</t>
</li></ul>

<t>named-srlgs:</t>

<ul empty="true"><li>
  <t>A YANG container for the list of named Shared Risk Link Groups (SRLGs) that may be
applied to TE links.</t>
</li></ul>

<t>named-path-constraints:</t>

<ul empty="true"><li>
  <t>A YANG container for a list of named path constraints. Each named path constraint is
composed of a set of constraints that can be applied during path computation.
A named path constraint can be applied to multiple TE Tunnels. Path constraints may also
be specified directly under the TE Tunnel. The path constraints specified under
the TE Tunnel take precedence over the path constraints 
derived from the referenced named path constraint. A named path constraint entry can be
formed of the path constraints shown in <xref target="fig-named-constraints"/>:</t>
</li></ul>

<figure title="Named path constraints YANG subtree" anchor="fig-named-constraints"><artwork><![CDATA[
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
     |             {te-types:named-path-constraints}?
     |        +--rw name                             string
     |        +--rw te-bandwidth
     |        |     ...
     |        +--rw link-protection?                 identityref
     |        +--rw setup-priority?                  uint8
     |        +--rw hold-priority?                   uint8
     |        +--rw signaling-type?                  identityref
     |        +--rw path-metric-bounds
     |        |     ...
     |        +--rw path-affinities-values
     |        |     ...
     |        +--rw path-affinity-names
     |        |     ...
     |        +--rw path-srlgs-lists
     |        |     ...
     |        +--rw path-srlgs-names
     |        |     ...
     |        +--rw disjointness?
     |        |       te-path-disjointness
     |        +--rw explicit-route-objects
     |        |     ...
     |        +--rw path-in-segment!
     |        |     ...
     |        +--rw path-out-segment!
     |              ...

]]></artwork></figure>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>name: A YANG leaf that holds the named path constraint entry. This is unique in the list and used as a key.</t>
    <t>te-bandwidth: A YANG container that holds the technology agnostic TE bandwidth constraint.</t>
    <t>link-protection: A YANG leaf that holds the link protection type constraint required for the links to be included in the computed path.</t>
    <t>setup/hold priority: YANG leafs that hold the LSP setup and hold admission priority as defined in <xref target="RFC3209"/>.</t>
    <t>signaling-type: A YANG leaf that holds the LSP setup type, such as RSVP-TE or SR.</t>
    <t>path-metric-bounds: A YANG container that holds the set of metric bounds applicable on the
computed TE tunnel path.</t>
    <t>path-affinities-values: A YANG container that holds the set of affinity values and
mask to be used during path computation.</t>
    <t>path-affinity-names: A YANG container that holds the set of named affinity constraints and
corresponding inclusion or exclusion instructions for each to be used during path computation.</t>
    <t>path-srlgs-lists: A YANG container that holds the set of SRLG values and
corresponding inclusion or exclusion instructions to be used during path computation.</t>
    <t>path-srlgs-names: A YANG container that holds the set of named SRLG constraints and
corresponding inclusion or exclusion instructions for each to be used during path computation.</t>
    <t>disjointness: The level of resource disjointness constraint that the secondary path
of a TE tunnel has to adhere to.</t>
    <t>explicit-route-objects: A YANG container that holds path constraints in the form of route entries present in the following two lists:
    <list style="symbols">
        <t>'route-object-exclude-always': a list of route entries that are always excluded from the path computation. The exclusion of a route entry in this list during path computation is not order sensitive. The route entries in this list have a 'strict' hop-type as described in <xref target="RFC4874"/> section 3.1.</t>
        <t>'route-object-include-exclude': a list of route entries to include or exclude for the path computation. For route entries in this list that are to be excluded, the hop-type is only allowed to be 'strict' as described in <xref target="RFC4874"/> section 3.1.<br />
The constraint type (include or exclude) is specified with each route entry. The path computation considers route entry constraints in the order they appear in this list. Once a route entry constraint is consumed from this list, it is not considered any further in the computation of the TE path.<br />
The 'route-object-include-exclude' is used to configure constraints on which route objects (e.g., nodes, links) are included or excluded in the path computation.<br />
The interpretation of an empty 'route-object-include-exclude' list depends on the TE Tunnel (end-to-end or Tunnel Segment) and on the specific path, according to the following rules:<br />
        <list style="numbers" type="1">
            <t>An empty 'route-object-include-exclude' list for the primary path of an end-to-end TE Tunnel indicates that there are no route objects to be included or excluded in the path computation.</t>
            <t>An empty 'route-object-include-exclude' list for the primary path of a TE Tunnel Segment indicates that no primary LSP is required for that TE Tunnel Segement.</t>
            <t>An empty 'route-object-include-exclude' list for a reverse path means it always follows the forward path (i.e., the TE Tunnel is co-routed). When the 'route-object-include-exclude' list is not empty, the reverse path is routed independently of the forward path.</t>
            <t>An empty 'route-object-include-exclude' list for the secondary (forward) path of a TE Tunnel segment indicates that the secondary path has the same endpoints as the primary path.</t>
          </list></t>
      </list></t>
    <t>path-in-segment: A YANG container that contains a list of label restrictions
that have to be taken into considerations when stitching to another tunnel
segment such as at a domain boundary.  The TE tunnel segment in this case
is being stitched to the upstream TE tunnel segment.</t>
    <t>path-out-segment: A YANG container that contains a list of label restrictions
that have to be taken into considerations when stitching to another tunnel
segment such as at a domain boundary.  The TE tunnel segment in this case
is being stitched to the downstream TE tunnel segment.</t>
  </list></t>
</li></ul>

</section>
<section anchor="TE_TUNNELS"><name>TE Tunnels</name>

<t>The 'tunnels' container holds the list of TE Tunnels that are provisioned on
ingress router devices in the network as shown in <xref target="fig-te-tunnel"/>.</t>

<figure title="TE Tunnel YANG subtree structure" anchor="fig-te-tunnel"><artwork><![CDATA[
module: ietf-te
  +--rw te
     +--rw tunnels
        +--rw tunnel* [name]
           +--rw name                            string
           +--rw alias?                          string
           +--rw identifier?                     uint32
           +--rw color?                          uint32
           +--rw description?                    string
           +--rw admin-state?                    identityref
           +--ro operational-state?              identityref
           +--rw encoding?                       identityref
           +--rw switching-type?                 identityref
           +--rw source
           |     ...
           +--rw destination
           |     ...
           +--rw bidirectional?                  boolean
           +--rw controller
           |     ...
           +--rw reoptimize-timer?               uint16
           +--rw association-objects
           |     ...
           +--rw protection
           |     ...
           +--rw restoration
           |     ...
           +--rw network-id?                     nw:network-id
           +--rw te-topology-identifier
           |     ...
           +--rw te-bandwidth
           |     ...
           +--rw link-protection?                identityref
           +--rw setup-priority?                 uint8
           +--rw hold-priority?                  uint8
           +--rw signaling-type?                 identityref
           +--rw hierarchy
           |     ...
           +--rw primary-paths
           |     ...
           +--rw secondary-paths
           |     ...
           +--rw secondary-reverse-paths
           |     ...
           +---x tunnel-action
           |     ...
           +---x protection-external-commands
                 ...

]]></artwork></figure>

<t>When the model is used to manage a specific device, the 'tunnel' list contains
the TE Tunnels originating from the specific device. When the model is used to
manage a TE controller, the 'tunnel' list contains all TE Tunnels and TE
tunnel segments originating from devices that the TE controller manages.</t>

<t>The TE Tunnel model allows the configuration and management of the following TE
tunnel objects:</t>

<t>TE Tunnel:</t>

<ul empty="true"><li>
  <t>A YANG container of one or more TE LSPs established between the source and destination
TE Tunnel termination points.</t>
</li></ul>

<t>TE Path:</t>

<ul empty="true"><li>
  <t>An engineered path that once instantiated in the forwarding plane can be used
to forward traffic from the source to the destination TE Tunnel termination points.</t>
</li></ul>

<t>TE LSP:</t>

<ul empty="true"><li>
  <t>A TE LSP is a connection-oriented service established over a TE Path
and that allows the delivery of traffic between the TE Tunnel source and
destination termination points.</t>
</li></ul>

<t>TE Tunnel Segment:</t>

<ul empty="true"><li>
  <t>A segment of a TE Tunnel that is stitched with other segments in order to provision an end-to-end tunnel.</t>
</li></ul>

<t>The TE Tunnel has a number of attributes that are set directly under the
tunnel (as shown in <xref target="fig-te-tunnel"/>). The main attributes of a TE Tunnel are described below:</t>

<t>name:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the name of a TE Tunnel.  The name of the
TE Tunnel uniquely identifies the tunnel within the TE tunnel list.  The name
of the TE Tunnel can be formatted as a Uniform Resource Indicator (URI) by
including the namespace to ensure uniqueness of the name among all the TE
Tunnels present on devices and controllers. The configured TE Tunnels can
be reported with the name of the device embedded within the TE Tunnel name.
For TE Tunnels initiated by the controller, the controller is responsible
to ensure that TE Tunnel names are unique.</t>
</li></ul>

<t>alias:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds an alternate name to the TE tunnel. Unlike the TE tunnel
name, the alias can be modified at any time during the lifetime of the TE tunnel.</t>
</li></ul>

<t>identifier:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds an identifier of the tunnel. This identifier is unique among tunnels
originated from the same ingress device.</t>
</li></ul>

<t>color:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the color associated with the TE tunnel. The color is used
to map or steer services that carry matching color onto the TE tunnel as described in
<xref target="RFC9012"/>.</t>
</li></ul>

<t>admin-state:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the tunnel administrative state.</t>
</li></ul>

<t>operational-state:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the tunnel operational state.</t>
</li></ul>

<t>encoding/switching:</t>

<ul empty="true"><li>
  <t>The 'encoding' and 'switching-type' are YANG leafs that define the specific
technology in which the tunnel operates in as described in <xref target="RFC3945"/>.</t>
</li></ul>

<t>source/destination:</t>

<ul empty="true"><li>
  <t>YANG containers that hold the tunnel source and destination node endpoint identities, including:</t>
</li></ul>

<ul empty="true"><li>
  <t><list style="symbols">
    <t>te-node-id:  A YANG leaf that holds the TE node identifier (as defined in <xref target="I-D.draft-ietf-teas-rfc8776-update"/>) of the source
 or destination of the TE Tunnel.</t>
    <t>node-id: A YANG leaf that holds the node identifier (as defined in <xref target="RFC8345"/>) of the source or
 destination of the TE Tunnel.</t>
    <t>tunnel-tp-id: A YANG leaf that holds the identifier of the source or destination of the TE Tunnel
Termination Points (TTPs) as defined in <xref target="RFC8795"/>. The TTP identifiers are optional
on nodes that have a single TTP per node. For example, TTP identifiers are optional for packet
(IP/MPLS) routers.</t>
  </list></t>
</li></ul>

<t>bidirectional:</t>

<ul empty="true"><li>
  <t>A YANG leaf that when present indicates the LSP of a TE Tunnel is bidirectional
as defined in <xref target="rfc3473"/>.</t>
</li></ul>

<t>controller:</t>

<ul empty="true"><li>
  <t>A YANG container that holds tunnel data relevant to an optional external TE controller that
may initiate or control a tunnel. This target node may be augmented by external modules, for example, to add data for Path Computation Element Protocol (PCEP) initiated and/or
delegated tunnels.</t>
</li></ul>

<t>reoptimize-timer:</t>

<ul empty="true"><li>
  <t>A YANG leaf to set the interval period for tunnel reoptimization.</t>
</li></ul>

<t>association-objects:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the set of associations of the TE Tunnel to other
TE Tunnels. Associations at the TE Tunnel level apply to all paths of the TE
Tunnel. The TE tunnel associations can be overridden by associations
configured directly under the TE Tunnel path.</t>
</li></ul>

<t>protection:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the TE Tunnel protection properties.</t>
</li></ul>

<t>restoration:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the TE Tunnel restoration properties.</t>
</li></ul>

<t>te-topology-identifier:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the topology identifier associated with the topology where paths for the TE tunnel are computed as defined in <xref target="RFC8795"/>.</t>
</li></ul>

<t>network-id:</t>

<ul empty="true"><li>
  <t>A YANG leaf that can optionally be used to identify the network topology where paths for the TE tunnel are computed as defined in <xref target="RFC8345"/>.</t>
</li></ul>

<t>hierarchy:</t>

<ul empty="true"><li>
  <t>A YANG container that holds hierarchy related properties of the TE Tunnel. A TE LSP
  can be set up in MPLS or Generalized MPLS (GMPLS) networks to be used as
  a TE link to carry traffic in other (client) networks <xref target="RFC6107"/>.  In this
  case, the model introduces the TE Tunnel hierarchical link endpoint parameters
  to identify the specific link in the client layer that the underlying TE Tunnel is
  associated with. The hierarchy container includes the following:</t>
</li></ul>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>dependency-tunnels: A hierarchical set of TE Tunnels either provisioned or
to be provisioned in the immediate lower layer, upon which the
current TE Tunnel relies for multi-layer path computation. A dependency TE
Tunnel is provisioned if it has been selected by path computation to support
at least one client-layer TE Tunnel. When a dependency TE Tunnel is
provisioned, it makes the TE link operational in the client layer's network
topology, enabling the provisioning of TE Tunnels in the client layer.</t>
  </list></t>
</li></ul>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>hierarchical-link: A YANG container that holds the identity of the
hierarchical link (in the client layer) that is supported by this TE Tunnel.
The endpoints of the hierarchical link are defined by TE tunnel source and
destination node endpoints. The hierarchical link can be identified by its source
and destination link termination point identifiers.</t>
  </list></t>
</li></ul>

<t>primary-paths:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the list of primary paths.
A primary path is identified by 'name'. A primary path is selected from the list
to instantiate a primary forwarding LSP for the tunnel.  The list of primary
paths is visited by order of preference. A primary path has the following
attributes:</t>
</li></ul>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>primary-reverse-path: A YANG container that holds properties of the
primary reverse path. The reverse path is applicable to
bidirectional TE Tunnels.</t>
  </list></t>
</li></ul>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>candidate-secondary-paths: A YANG container that holds a list of candidate
secondary paths which may be used for the primary path to support path
protection. The candidate secondary paths reference paths from the
tunnel secondary paths list.  The preference of the secondary paths is
specified within the list and dictates the order of visiting the secondary
path from the list. The attributes of a secondary path can be defined
separately from the primary path. The attributes of a secondary path will be
inherited from the associated 'active' primary when not explicitly defined
for the secondary path.</t>
  </list></t>
</li></ul>

<ul empty="true"><li>

</li></ul>

<t>secondary-paths:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the set of secondary paths. A secondary path is
 identified by 'name'. A secondary path can be referenced from the TE Tunnel's
'candidate-secondary-path' list.</t>
</li></ul>

<t>secondary-reverse-paths:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the set of secondary reverse paths. A secondary reverse
path is identified by 'name'. A secondary reverse path can be referenced from the
TE Tunnel's 'candidate-secondary-reverse-paths' list. A secondary reverse path is modeled with
the same data attributes as those of the primary path.</t>
</li></ul>

<t>The following set of common path attributes are shared for primary (forward and reverse) and secondary paths:</t>

<t>path-computation-method:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the method used for computing the TE path.</t>
</li></ul>

<t>path-computation-server:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the path computation server properties when the path is
 externally queried.</t>
</li></ul>

<t>compute-only:</t>

<ul empty="true"><li>
  <t>A path of a TE Tunnel is, by default, provisioned so that it can be instantiated
  in the forwarding plane so that it can carry traffic.
  In some cases, a TE path may be configured only for the
  purpose of computing a path and reporting it without the need to instantiate
  the LSP or commit any resources. In such a case, the path is configured in
  'compute-only' mode to distinguish it from the default behavior. A
  'compute-only' path is configured as usual with the associated per-path
  constraints and properties on a device or TE controller. The device or TE
  controller computes the feasible paths subject to configured constraints.
  A client may query the 'compute-only' computed path properties 'on-demand',
  or alternatively, can subscribe to be notified of computed paths and
  whenever the path properties change.</t>
</li></ul>

<t>use-path-computation:</t>

<ul empty="true"><li>
  <t>A YANG leaf that indicates whether or not path computation is to
  be used for a specified path.</t>
</li></ul>

<t>lockdown:</t>

<ul empty="true"><li>
  <t>A YANG leaf that when set indicates the existing path should not
be globally repaired or reoptimized.</t>
</li></ul>

<t>path-scope:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies whether the path is a segment or an end-to-end path.</t>
</li></ul>

<t>preference:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the preference for the path, used to
choose between paths in a list.  The lower the number, the higher the
preference. Paths with the same preference are treated as equal
and other methods are used to choose between them.</t>
</li></ul>

<t>k-requested-paths:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the number of k-shortest paths requested from the path
  computation server, which are returned in order based on their computed optimization
  objective costs.</t>
</li></ul>

<t>association-objects:</t>

<ul empty="true"><li>
  <t>A YANG container that holds a list of tunnel association properties.</t>
</li></ul>

<t>optimizations:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the optimization objectives
  that path computation will use to select a path.</t>
</li></ul>

<t>named-path-constraint:</t>

<ul empty="true"><li>
  <t>A YANG leafref that references an entry from the global list of named path constraints.</t>
</li></ul>

<t>te-bandwidth:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the path bandwidth (see <xref target="I-D.draft-ietf-teas-rfc8776-update"/>).</t>
</li></ul>

<t>link-protection:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the link protection type required for the links to
be included in the computed path (see <xref target="I-D.draft-ietf-teas-rfc8776-update"/>).</t>
</li></ul>

<t>setup/hold-priority:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>signaling-type:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. This value overrides
the provided one in the referenced named-path-constraint.</t>
</li></ul>

<t>path-metric-bounds:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-affinities-values:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-affinity-names:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-srlgs-lists:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-srlgs-names:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>disjointness:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>explicit-route-objects:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-in-segment:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-out-segment:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>computed-paths-properties:</t>

<ul empty="true"><li>
  <t>A YANG container that holds properties for the list of computed paths.</t>
</li></ul>

<t>computed-path-error-infos:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the list of path computation error information. The
TE system populates entries in this list whenever an error is encountered during the computation of the TE path.</t>
</li></ul>

<t>path-compute-info:</t>

<ul empty="true"><li>
  <t>A YANG grouping that contains leafs representing the path attributes that are passed to the TE path computation engine
to be considered during the path computation. This includes:</t>

  <t><list style="symbols">
    <t>path constraints,</t>
    <t>path optimization objectives, and</t>
    <t>path associations</t>
  </list></t>

  <t>Note, unless overridden under a specific path of the TE tunnel, the TE tunnel's primary path constraints, optimization objectives, and associations are inherited by the primary reverse path, secondary path and secondary reverse path.</t>
</li></ul>

<t>lsps:</t>

<ul empty="true"><li>
  <t>A YANG container that holds a list of LSPs that have been instantiated for this specific path.</t>
</li></ul>

<t>In addition to the path common attributes, the primary path has the following
attributes that are not present in the secondary path:</t>

<t><list style="symbols">
  <t>Only the primary path contains the list of 'candidate-secondary-paths' that
can protect the primary path.</t>
  <t>Only the primary path can contain a primary-reverse-path associated with the
primary path (and its associated list of
'candidate-secondary-reverse-path').</t>
</list></t>

<t>lsp-provisioning-error-infos:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the list of LSP provisioning error information. The
TE system populates entries in this list whenever an error is encountered during the LSP provisioning.</t>
</li></ul>

</section>
<section anchor="TE_LSPS"><name>TE LSPs</name>

<t>The 'lsps' container includes the set of TE LSPs that have been instantiated.
A TE LSP is identified by a 3-tuple ('tunnel-name', 'lsp-id', 'node').</t>

<t>When the model is used to manage a specific device, the 'lsps' list contains all TE
LSPs that traverse the device (including ingressing, transiting and egressing the device).</t>

<t>When the model is used to manage a TE controller, the 'lsps' list
contains the TE LSPs on devices managed by the controller that act as ingress, and may optionally include
TE LSPs on devices managed by the controller that act as transit or egress role.</t>

</section>
</section>
<section anchor="tree-diagram"><name>Tree Diagram</name>

<t><xref target="fig-te-tree"/> shows the tree diagram of depth=4 for the generic TE YANG data model defined in
the 'ietf-te' module. The full tree diagram is shown in <xref target="AppendixB"/>.</t>

<figure title="Tree diagram of depth-4 of TE Tunnel YANG data model" anchor="fig-te-tree"><artwork><![CDATA[
module: ietf-te
  +--rw te
     +--rw enable?    boolean
     +--rw globals
     |  +--rw named-admin-groups
     |  |  +--rw named-admin-group* [name]
     |  |          {te-types:extended-admin-groups,
     |  |           te-types:named-extended-admin-groups}?
     |  |        ...
     |  +--rw named-srlgs
     |  |  +--rw named-srlg* [name] {te-types:named-srlg-groups}?
     |  |        ...
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
     |             {te-types:named-path-constraints}?
     |           ...
     +--rw tunnels
     |  +--rw tunnel* [name]
     |     +--rw name                            string
     |     +--rw alias?                          string
     |     +--rw identifier?                     uint32
     |     +--rw color?                          uint32
     |     +--rw description?                    string
     |     +--rw admin-state?                    identityref
     |     +--ro operational-state?              identityref
     |     +--rw encoding?                       identityref
     |     +--rw switching-type?                 identityref
     |     +--rw source
     |     |     ...
     |     +--rw destination
     |     |     ...
     |     +--rw bidirectional?                  boolean
     |     +--rw controller
     |     |     ...
     |     +--rw reoptimize-timer?               uint16
     |     +--rw association-objects
     |     |     ...
     |     +--rw protection
     |     |     ...
     |     +--rw restoration
     |     |     ...
     |     +--rw network-id?                     nw:network-id
     |     +--rw te-topology-identifier
     |     |     ...
     |     +--rw te-bandwidth
     |     |     ...
     |     +--rw link-protection?                identityref
     |     +--rw setup-priority?                 uint8
     |     +--rw hold-priority?                  uint8
     |     +--rw signaling-type?                 identityref
     |     +--rw hierarchy
     |     |     ...
     |     +--rw primary-paths
     |     |     ...
     |     +--rw secondary-paths
     |     |     ...
     |     +--rw secondary-reverse-paths
     |     |     ...
     |     +---x tunnel-action
     |     |     ...
     |     +---x protection-external-commands
     |           ...
     +--ro lsps
        +--ro lsp* [tunnel-name lsp-id node]
           +--ro tunnel-name                         string
           +--ro lsp-id                              uint16
           +--ro node
           |       te-types:te-node-id
           +--ro source?
           |       te-types:te-node-id
           +--ro destination?
           |       te-types:te-node-id
           +--ro tunnel-id?                          uint16
           +--ro extended-tunnel-id?
           |       yang:dotted-quad
           +--ro operational-state?                  identityref
           +--ro signaling-type?                     identityref
           +--ro origin-type?                        enumeration
           +--ro lsp-resource-status?                enumeration
           +--ro lockout-of-normal?                  boolean
           +--ro freeze?                             boolean
           +--ro lsp-protection-role?                enumeration
           +--ro lsp-protection-state?               identityref
           +--ro ingress-node-id?
           |       te-types:te-node-id
           +--ro egress-node-id?
           |       te-types:te-node-id
           +--ro lsp-actual-route-information
                 ...

  rpcs:
    +---x tunnels-path-compute
    |  +---w input
    |  |  +---w path-compute-info
    |  +--ro output
    |     +--ro path-compute-result
    +---x tunnels-actions
       +---w input
       |  +---w tunnel-info
       |  |  +---w (filter-type)
       |  |        ...
       |  +---w action-info
       |     +---w action?       identityref
       |     +---w disruptive?   empty
       +--ro output
          +--ro action-result?   identityref

]]></artwork></figure>

</section>
<section anchor="yang-module"><name>YANG Module</name>

<t>The generic TE YANG module 'ietf-te' imports the following modules:</t>

<t><list style="symbols">
  <t>ietf-te-types defined in <xref target="I-D.draft-ietf-teas-rfc8776-update"/></t>
  <t>ietf-yang-types and ietf-inet-types defined in <xref target="RFC6991"/></t>
  <t>ietf-network and ietf-network-topology defined in <xref target="RFC8345"/></t>
</list></t>

<t>This module references the following documents:
<xref target="RFC4206"/>, <xref target="RFC4427"/>,
<xref target="RFC4872"/>, <xref target="RFC3209"/>, <xref target="RFC6780"/>,
<xref target="RFC7471"/>, <xref target="RFC9012"/>, <xref target="RFC8570"/>,
<xref target="RFC8232"/>, <xref target="RFC7271"/>, <xref target="RFC8234"/>, <xref target="RFC7308"/>, and <xref target="ITU_G.808.1"/>.</t>

<figure><artwork><![CDATA[
<CODE BEGINS> file "ietf-te@2025-10-27.yang"
module ietf-te {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-te";

  /* RFC Editor Note: Please replace the above line with the URN
   * assigned by IANA and remove this note.
   */

  prefix te;

  /* Import TE generic types */

  import ietf-te-types {
    prefix te-types;
    reference
      "draft-ietf-teas-rfc8776-update: Common YANG Data Types
       for Traffic Engineering.";
  }
  import ietf-yang-types {
    prefix yang;
    reference
      "RFC6991: Common YANG Data Types.";
  }

  import ietf-network {
    prefix "nw";
    reference "RFC 8345: A YANG Data Model for Network Topologies";
  }

  import ietf-network-topology {
    prefix "nt";
    reference "RFC 8345: A YANG Data Model for Network Topologies";
  }

  organization
    "IETF Traffic Engineering Architecture and Signaling (TEAS)
     Working Group.";
  contact
    "WG Web:   <https://tools.ietf.org/wg/teas/>
     WG List:  <mailto:teas@ietf.org>

     Editor:   Tarek Saad
               <mailto:tsaad.net@gmail.com>

     Editor:   Rakesh Gandhi
               <mailto:rgandhi@cisco.com>

     Editor:   Vishnu Pavan Beeram
               <mailto:vbeeram@juniper.net>

     Editor:   Xufeng Liu
               <mailto: xufeng.liu.ietf@gmail.com>

     Editor:   Igor Bryskin
               <mailto:i_bryskin@yahoo.com>";

  description
    "YANG data module for TE configuration, state, and RPCs.
     The model fully conforms to the Network Management
     Datastore Architecture (NMDA).

     Copyright (c) 2025 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
     for full legal notices.";

  // RFC Ed.: replace XXXX with actual RFC number and remove this
  // note.
  // RFC Ed.: update the date below with the date of RFC publication
  // and remove this note.

  revision 2025-10-27 {
    description
      "Initial revision for the TE generic YANG module.";
    reference
      "RFCXXXX: A YANG Data Model for Traffic Engineering Tunnels
       and Interfaces.";
  }

  typedef tunnel-ref {
    type leafref {
      path "/te:te/te:tunnels/te:tunnel/te:name";
      require-instance false;
    }
    description
      "This type is used by data models that need to reference
       a configured TE tunnel.";
  }

  /**
   * TE tunnel generic groupings
   */

  grouping path-common-properties {
    description
      "Common path attributes.";
    leaf name {
      type string;
      description
        "TE path name.";
    }
    leaf symbolic-name {
      type string;
      description
        "The symbolic path name is a human-readable string that
         identifies an LSP in the network.  The symbolic path name
         must remain constant throughout an LSP's lifetime.";
      reference
        "RFC8231, section-7.3.2";
    }
    leaf path-computation-method {
      type identityref {
        base te-types:path-computation-method;
      }
      default "te-types:path-locally-computed";
      description
        "The method used for computing the path, either
         locally computed, queried from a server or not
         computed at all (explicitly configured).";
    }
    container path-computation-server {
      when "derived-from-or-self(../path-computation-method, "
         + "'te-types:path-externally-queried')" {
        description
        "The IP address or the TE identifier of the external
         path computation server.";
      }
      uses te-types:te-generic-node-id;
      description
        "Address of the external path computation
         server.";
    }
    leaf compute-only {
      when "../use-path-computation = 'true'" {
        description
          "Applicable when path computation is requested.";
      }
      type empty;
      description
        "When present, the path is computed, but no resources
         are committed or reserved in the network. The path may
         be recomputed upon topology changes.";
    }
    leaf use-path-computation {
      when "derived-from-or-self(../path-computation-method, "
         + "'te-types:path-locally-computed')";
      type boolean;
      default "true";
      description
        "When 'true' indicates the path is dynamically computed
         and/or validated against the Traffic-Engineering Database
         (TED), and when 'false' indicates no path expansion or
         validation against the TED is required.";
    }
    leaf lockdown {
      type empty;
      description
        "When present, indicates the existing path should not be
         globally repaired or reoptimized.";
    }
    leaf path-scope {
      type identityref {
        base te-types:path-scope-type;
      }
      default "te-types:path-scope-end-to-end";
      config false;
      description
        "Indicates whether the path is a segment or portion of
         the full path, or is an end-to-end path for
         the TE Tunnel.";
    }
  }

  /* This grouping is re-used in path-computation YANG model
   * defined in [I-D.ietf-teas-yang-path-computation] */
  grouping path-compute-info {
    description
      "Attributes used for path computation request.";
    uses tunnel-associations-properties;
    uses te-types:generic-path-optimization;
    leaf named-path-constraint {
      if-feature "te-types:named-path-constraints";
      type leafref {
        path "/te:te/te:globals/te:named-path-constraints/"
           + "te:named-path-constraint/te:name";
      }
      description
        "Reference to a globally defined named path constraint set.";
    }
    uses path-constraints-common;
  }

  /* This grouping is re-used in path-computation YANG model
   * defined in [I-D.ietf-teas-yang-path-computation] */
  grouping path-forward-properties {
    description
      "The path preference.";
    leaf preference {
      type uint8 {
        range "1..255";
      }
      default "1";
      description
        "Specifies a preference for this path. The lower the number
         higher the preference.";
    }
    leaf co-routed {
      when "/te:te/te:tunnels/te:tunnel/te:bidirectional = 'true'" {
        description
          "Applicable to bidirectional tunnels only.";
      }
      type boolean;
      default "false";
      description
        "Indicates whether the reverse path must be co-routed
         with the primary.";
    }
  }

  /* This grouping is re-used in path-computation YANG model
   * defined in [I-D.ietf-teas-yang-path-computation] */
  grouping k-requested-paths {
    description
      "The k-shortest paths requests.";
    leaf k-requested-paths {
      type uint8;
      default "1";
      description
        "The number of k-shortest paths requested from the path
         computation server, which are returned in order based on
         their computed optimization objective costs.";
    }
  }

  grouping path-state {
    description
      "TE per path state parameters.";
    uses path-computation-response;
    container lsp-provisioning-error-infos {
      config false;
      description
        "LSP provisioning error information.";
      list lsp-provisioning-error-info {
        description
          "List of LSP provisioning error info entries.";
        leaf error-reason {
          type identityref {
            base te-types:lsp-provisioning-error-reason;
          }
          description
            "LSP provision error type.";
        }
        leaf error-description {
          type string;
          description
            "The textual representation of the error that occurred
             during LSP provisioning.";
        }
        leaf error-timestamp {
          type yang:date-and-time;
          description
            "Timestamp of when the reported error occurred.";
        }
        leaf error-node-id {
          type te-types:te-node-id;
          description
            "Node identifier of node where error occurred.";
        }
        leaf error-link-id {
          type te-types:te-tp-id;
          description
            "Link ID where the error occurred.";
        }
        leaf lsp-id {
          type uint16;
          description
            "The LSP-ID for which LSP provisioning error was
             returned.";
        }
      }
    }
    container lsps {
      config false;
      description
        "The TE LSPs container.";
      list lsp {
        key "node lsp-id";
        description
          "List of LSPs associated with the tunnel.";
        leaf tunnel-name {
          type leafref {
            path "/te:te/te:lsps/te:lsp/te:tunnel-name";
          }
          description "TE tunnel name.";
        }
        leaf node {
          type leafref {
            path "/te:te/te:lsps/te:lsp[tunnel-name="
               + "current()/../te:tunnel-name][lsp-id="
               + "current()/../te:lsp-id]/te:node";
          }
          description "The node where the LSP state resides.";
        }
        leaf lsp-id {
          type leafref {
            path "/te:te/te:lsps/te:lsp[tunnel-name="
               + "current()/../tunnel-name]/te:lsp-id";
          }
          description "The TE LSP identifier.";
        }
        leaf state-change-timestamp {
          type yang:date-and-time;
          description
            "Indicates the time at which the LSP operational
             state was last updated.";
        }
      }
    }
  }

  /* This grouping is re-used in path-computation YANG model
   * defined in [I-D.ietf-teas-yang-path-computation] */
  grouping path-computation-response {
    description
      "Attributes reported by path computation response.";
    container computed-paths-properties {
      config false;
      description
        "Computed path properties container.";
      list computed-path-properties {
        key "k-index";
        description
          "List of computed paths.";
        leaf k-index {
          type uint8;
          description
            "The k-th path returned from the computation server.
             A lower k value path is more optimal than higher k
             value paths";
        }
        uses te-types:generic-path-properties {
          augment "path-properties" {
            description
              "additional path properties returned by path
               computation.";
            uses te-types:te-bandwidth;
            leaf disjointness-type {
              type te-types:te-path-disjointness;
              config false;
              description
                "The type of resource disjointness.
                 When reported for a primary path, it represents the
                 minimum level of disjointness of all the secondary
                 paths. When reported for a secondary path, it
                 represents the disjointness of the secondary path.";
            }
            leaf last-computed-timestamp {
              type yang:date-and-time;
              config false;
              description
                "Timestamp of when the path was last computed.";
            }
          }
        }
      }
    }
    container computed-path-error-infos {
      config false;
      description
        "Path computation information container.";
      list computed-path-error-info {
        description
          "List of path computation info entries.";
        leaf error-description {
          type string;
          description
            "Textual representation of the error that occurred
             during path computation.";
        }
        leaf error-timestamp {
          type yang:date-and-time;
          description
            "Timestamp of last path computation attempt.";
        }
        leaf error-reason {
          type identityref {
            base te-types:path-computation-error-reason;
          }
          description
            "Reason for the path computation error.";
        }
      }
    }
  }

  grouping protection-restoration-properties {
    description
      "Protection and restoration parameters.";
    container protection {
      description
        "Protection parameters.";
      leaf protection-type {
        type identityref {
          base te-types:lsp-protection-type;
        }
        default "te-types:lsp-protection-unprotected";
        description
          "LSP protection type.";
      }
      leaf protection-reversion-disable {
        type boolean;
        default "false";
        description
          "Disable protection reversion to working path.";
      }
      leaf hold-off-time {
        type uint32;
        units "milli-seconds";
        description
          "The time between the declaration of an SF or SD condition
           and the initialization of the protection switching
           algorithm.";
        reference
          "RFC4427";
      }
      leaf wait-to-revert {
        type uint16;
        units "seconds";
        description
          "Time to wait before attempting LSP reversion.";
        reference
          "RFC4427";
      }
      leaf aps-signal-id {
        type uint8 {
          range "1..255";
        }
        default "1";
        description
          "The Automatic Protection Switching (APS) signal number
           used to reference the traffic of this tunnel. The default
           value for normal traffic is 1.
           The default value for extra-traffic is 255. If not
           specified, non-default values can be assigned by the
           server, if and only if, the server controls both
            endpoints.";
        reference
          "ITU_G.808.1";
      }
    }
    container restoration {
      description
        "Restoration parameters.";
      leaf restoration-type {
        type identityref {
          base te-types:lsp-restoration-type;
        }
        description
          "LSP restoration type.";
      }
      leaf restoration-scheme {
        type identityref {
          base te-types:restoration-scheme-type;
        }
        description
          "LSP restoration scheme.";
      }
      leaf restoration-reversion-disable {
        type boolean;
        default "false";
        description
          "Disable restoration reversion to working path.";
      }
      leaf hold-off-time {
        type uint32;
        units "milli-seconds";
        description
          "The time between the declaration of an SF or SD condition
           and the initialization of the protection switching
           algorithm.";
        reference
          "RFC4427";
      }
      leaf wait-to-restore {
        type uint16;
        units "seconds";
        description
          "Time to wait before attempting LSP restoration.";
        reference
          "RFC4427";
      }
      leaf wait-to-revert {
        type uint16;
        units "seconds";
        description
          "Time to wait before attempting LSP reversion.";
        reference
          "RFC4427";
      }
    }
  }

  grouping tunnel-associations-properties {
    description
      "TE tunnel association grouping.";
    container association-objects {
      description
        "TE tunnel associations.";
      list association-object {
        key "association-key";
        unique "type id source/id source/type";
        description
          "List of association base objects.";
        reference
          "RFC4872";
        leaf association-key {
          type string;
          description
            "Association key used to identify a specific
             association in the list";
        }
        leaf type {
          type identityref {
            base te-types:association-type;
          }
          description
            "Association type.";
          reference
            "RFC4872";
        }
        leaf id {
          type uint16;
          description
            "Association identifier.";
          reference
            "RFC4872";
        }
        container source {
          uses te-types:te-generic-node-id;
          description
            "Association source.";
          reference
            "RFC4872";
        }
      }
      list association-object-extended {
        key "association-key";
        unique
          "type id source/id source/type global-source extended-id";
        description
          "List of extended association objects.";
        reference
          "RFC6780";
        leaf association-key {
          type string;
          description
            "Association key used to identify a specific
             association in the list";
        }
        leaf type {
          type identityref {
            base te-types:association-type;
          }
          description
            "Association type.";
          reference
            "RFC4872, RFC6780";
        }
        leaf id {
          type uint16;
          description
            "Association identifier.";
          reference
            "RFC4872, RFC6780";
        }
        container source {
          uses te-types:te-generic-node-id;
          description
            "Association source.";
          reference
            "RFC4872, RFC6780";
        }
        leaf global-source {
          type uint32;
          description
            "Association global source.";
          reference
            "RFC6780";
        }
        leaf extended-id {
          type yang:hex-string;
          description
            "Association extended identifier.";
          reference
            "RFC6780";
        }
      }
    }
  }

  grouping tunnel-end-point {
    description
      "Common grouping used to specify the tunnel source and 
      destination end-points.";
    leaf node-id {
      type nw:node-id;
      description
        "The TE tunnel end-point node identifier";
    }
    leaf te-node-id {
      type te-types:te-node-id;
      description
        "The TE tunnel end-point TE node identifier";
    }
    leaf tunnel-tp-id {
      when "../node-id or ../te-node-id" {
        description
          "The TE tunnel termination point identifier is local to 
          a node";
      }
      type binary;
      description
        "The TE tunnel end-point TE tunnel termination point 
        identifier";
    }
  }

  /* This grouping is re-used in path-computation YANG model
   * defined in [I-D.ietf-teas-yang-path-computation] */
  grouping tunnel-common-attributes {
    description
      "Common grouping to define the TE tunnel parameters";
    container source {
      description
        "TE tunnel source end-point.";
      uses tunnel-end-point;
    }
    container destination {
      description
        "TE tunnel destination end-point.";
      uses tunnel-end-point;
    }
    leaf bidirectional {
      type boolean;
      default "false";
      description
        "Indicates a bidirectional tunnel";
    }
  }

  /* This grouping is re-used in path-computation YANG
   * model defined in [I-D.ietf-teas-yang-path-computation] */
  grouping tunnel-hierarchy-properties {
    description
      "A grouping for TE tunnel hierarchy information.";
    container hierarchy {
      description
        "Container for TE hierarchy related information.";
      container dependency-tunnels {
        description
          "List of tunnels that this tunnel can be potentially
           dependent on.";
        list dependency-tunnel {
          key "name";
          description
            "A tunnel entry that this tunnel can potentially depend
             on.";
          leaf name {
            type tunnel-ref;
            description
              "Dependency tunnel name. The tunnel may not have been
               instantiated yet.";
          }
          uses te-types:encoding-and-switching-type;
        }
      }
      container hierarchical-link {
        description
          "Identifies a hierarchical link (in client layer)
           that this tunnel is associated with. By default, the
           topology of the hierarchical link is the same topology of
           the tunnel;";
        reference
          "RFC4206";
        leaf enable {
          type boolean;
          default "false";
          description
            "Enables the hierarchical link properties supported by
             this tunnel";
        }
        leaf local-node-id {
          type nw:node-id;
          description
            "The local node identifier.";
        }
        leaf local-te-node-id {
          type te-types:te-node-id;
          description
            "The local TE node identifier.";
        }
        leaf local-link-tp-id {
          type nt:tp-id;
          description
            "The local link termination point identifier.";
          reference
            "RFC8345";
        }
        leaf local-te-link-tp-id {
          type te-types:te-tp-id;
          description
            "The local TE link termination point identifier.";
        }
        leaf remote-node-id {
          type nw:node-id;
          description
            "The remote node identifier.";
        }
        leaf remote-link-tp-id {
          type nt:tp-id;
          description
            "The remote link termination point identifier.";
          reference
            "RFC8345";
        }
        leaf remote-te-link-tp-id {
          type te-types:te-tp-id;
          description
            "The remote TE link termination point identifier.";
        }
        leaf remote-te-node-id {
          type te-types:te-node-id;
          description
            "Remote TE node identifier.";
        }
        leaf link-id {
          type nt:link-id;
          config false;
          description
            "A network topology assigned identifier to the link";
          reference
            "RFC8345";
        }
        leaf network-id {
          type nw:network-id;
          description
            "The network topology identifier where the hierarchical 
            link supported by this TE tunnel is instantiated.";
        }
        uses te-types:te-topology-identifier {
          description
            "The TE topology identifier where the hierarchical link
             supported by this TE tunnel is instantiated.";
        }
      }
    }
  }

  grouping path-constraints-common {
    description
      "Global named path constraints configuration
       grouping.";
    uses te-types:common-path-constraints-attributes;
    uses te-types:generic-path-disjointness;
    uses te-types:path-constraints-route-objects;
    container path-in-segment {
      presence "The end-to-end tunnel starts in a previous domain;
                this tunnel is a segment in the current domain.";
      description
        "If an end-to-end tunnel crosses multiple domains using
         the same technology, some additional constraints have to be
         taken in consideration in each domain.
         This TE tunnel segment is stitched to the upstream TE tunnel
         segment.";
      uses te-types:label-set-info;
    }
    container path-out-segment {
      presence
        "The end-to-end tunnel is not terminated in this domain;
         this tunnel is a segment in the current domain.";
      description
        "If an end-to-end tunnel crosses multiple domains using
         the same technology, some additional constraints have to be
         taken in consideration in each domain.
         This TE tunnel segment is stitched to the downstream TE
         tunnel segment.";
      uses te-types:label-set-info;
    }
  }

  /**
   * TE container
   */

  container te {
    description
      "TE global container.";
    leaf enable {
      type boolean;
      description
        "Enables the TE component features.";
    }

    /* TE Global Data */
    container globals {
      description
        "Globals TE system-wide configuration data container.";
      container named-admin-groups {
        description
          "TE named admin groups container.";
        list named-admin-group {
          if-feature "te-types:extended-admin-groups";
          if-feature "te-types:named-extended-admin-groups";
          key "name";
          description
            "List of named TE admin-groups.";
          leaf name {
            type string;
            description
              "A name that uniquely identifies a TE
               interface named admin-group.";
          }
          leaf bit-position {
            type uint32;
            description
              "Bit position representing the administrative group.
               Uniquely identify a specific administrative group by
               its numerical position within the bitmask.";
            reference
              "RFC3209 and RFC7308";
          }


        }
      }
      container named-srlgs {
        description
          "TE named SRLGs container.";
        list named-srlg {
          if-feature "te-types:named-srlg-groups";
          key "name";
          description
            "A list of named SRLG groups.";
          leaf name {
            type string;
            description
              "A name that uniquely identifies a TE
               interface named SRLG.";
          }
          leaf value {
            type te-types:srlg;
            description
              "An SRLG value.";
          }
          leaf cost {
            type uint32;
            description
              "The cost associated with an SRLG. This is used as
               a penalty during path computation when the TE path
               traverses a link with this SRLG.";
          }
        }
      }
      container named-path-constraints {
        description
          "TE named path constraints container.";
        list named-path-constraint {
          if-feature "te-types:named-path-constraints";
          key "name";
          leaf name {
            type string;
            description
              "A name that uniquely identifies a
               path constraint set.";
          }
          uses path-constraints-common;
          description
            "A list of named path constraints.";
        }
      }
    }

    /* TE Tunnel Data */
    container tunnels {
      description
        "Tunnels TE configuration data container.";
      list tunnel {
        key "name";
        description
          "The list of TE tunnels.";
        leaf name {
          type string;
          description
            "TE tunnel name.";
        }
        leaf alias {
          type string;
          description
            "An alternate name of the TE tunnel that can be modified
             anytime during its lifetime.";
        }
        leaf identifier {
          type uint32;
          description
            "TE tunnel Identifier.";
          reference
            "RFC3209";
        }
        leaf color {
          type uint32;
          description "The color associated with the TE tunnel.";
          reference "RFC9012";
        }
        leaf description {
          type string;
          default "None";
          description
            "Textual description for this TE tunnel.";
        }
        leaf admin-state {
          type identityref {
            base te-types:tunnel-admin-state-type;
          }
          default "te-types:tunnel-admin-state-up";
          description
            "TE tunnel administrative state.";
        }
        leaf operational-state {
          type identityref {
            base te-types:tunnel-state-type;
          }
          config false;
          description
            "TE tunnel operational state.";
        }
        leaf state-change-timestamp {
          type yang:date-and-time;
          description
            "Indicates the time at which the TE tunnel's operational
             state was last updated.";
        }
        uses te-types:encoding-and-switching-type;
        uses tunnel-common-attributes;
        container controller {
          description
            "Contains tunnel data relevant to external controllers.
             This target node may be augmented by external modules,
             for example, to add data for PCEP initiated and/or
             delegated tunnels.";
          leaf protocol-origin {
            type identityref {
              base te-types:protocol-origin-type;
            }
            description
              "The protocol origin for instantiating the tunnel.";
          }
          leaf controller-entity-id {
            type string;
            description
              "An identifier that is associated with the entity that
               controls the tunnel as defined in RFC8232.";
            reference "RFC8232";
          }
        }
        leaf reoptimize-timer {
          type uint16;
          units "seconds";
          description
            "Frequency of reoptimization of a traffic-engineered
             LSP. A value of 0 means that the LSP is never
             reoptimized";
        }
        uses tunnel-associations-properties;
        uses protection-restoration-properties;
        uses te-types:tunnel-constraints;
        uses tunnel-hierarchy-properties;
        container primary-paths {
          description
            "The set of primary paths.";
          reference "RFC4872";
          list primary-path {
            key "name";
            description
              "List of primary paths for this tunnel.";
            leaf active {
              type boolean;
              config false;
              description
                "Indicates an active path that
                 has been selected from the primary paths list.";
            }
            uses path-common-properties;
            uses path-forward-properties;
            uses k-requested-paths;
            uses path-compute-info;
            uses path-state;
            container primary-reverse-path {
              when "../../../te:bidirectional = 'true'";
              description
                "The reverse primary path properties.";
              uses path-common-properties;
              uses path-compute-info;
              uses path-state;
              container candidate-secondary-reverse-paths {
                description
                  "The set of referenced candidate reverse secondary
                   paths from the full set of secondary reverse paths
                   which may be used for this primary path.";
                list candidate-secondary-reverse-path {
                  key "secondary-reverse-path";
                  ordered-by user;
                  description
                    "List of candidate secondary reverse paths";
                  leaf secondary-reverse-path {
                    type leafref {
                      path "../../../../../../"
                         + "te:secondary-reverse-paths/"
                         + "te:secondary-reverse-path/te:name";
                    }
                    description
                      "A reference to the secondary reverse path that
                       may be utilized when the containing primary
                       reverse path is in use.";
                  }
                  leaf active {
                    type boolean;
                    config false;
                    description
                      "Indicates an active path that has been
                       selected from the secondary reverse paths
                       list.";
                  }
                }
              }
            }
            container candidate-secondary-paths {
              description
                "The set of candidate secondary paths which may be
                 used for this primary path. When secondary paths are
                 specified in the list the path of the secondary LSP
                 in use must be restricted to those paths
                 referenced.
                 The priority of the secondary paths is specified
                 within the list. Higher priority values are less
                 preferred - that is to say that a path with priority
                 0 is the most preferred path. In the case that the
                 list is empty, any secondary path may be
                 utilised when the current primary path is in use.";
              list candidate-secondary-path {
                key "secondary-path";
                ordered-by user;
                description
                  "List of candidate secondary paths for this
                   tunnel.";
                leaf secondary-path {
                  type leafref {
                    path "../../../../../te:secondary-paths/"
                       + "te:secondary-path/te:name";
                  }
                  description
                    "A reference to the secondary path that may be
                     utilised when the containing primary path is
                     in use.";
                }
                leaf active {
                  type boolean;
                  config false;
                  description
                    "Indicates an active path that has been selected
                     from the candidate secondary paths.";
                }
              }
            }
          }
        }
        container secondary-paths {
          description
            "The set of secondary paths.";
          reference "RFC4872";
          list secondary-path {
            key "name";
            description
              "List of secondary paths for this tunnel.";
            uses path-common-properties;
            leaf preference {
              type uint8 {
                range "1..255";
              }
              default "1";
              description
                "Specifies a preference for this path. The lower the
                 number, the higher the preference.";
            }
            leaf secondary-reverse-path {
              type leafref {
                path "../../../"
                   + "te:secondary-reverse-paths/"
                   + "te:secondary-reverse-path/te:name";
              }
              description
                "A reference to the reverse secondary path when
                 co-routed with the secondary path.";
            }
            uses path-compute-info;
            uses protection-restoration-properties;
            uses path-state;
          }
        }
        container secondary-reverse-paths {
          description
            "The set of secondary reverse paths.";
          list secondary-reverse-path {
            key "name";
            description
              "List of secondary paths for this tunnel.";
            uses path-common-properties;
            leaf preference {
              type uint8 {
                range "1..255";
              }
              default "1";
              description
                "Specifies a preference for this path. The lower the
                 number higher the preference. Paths that have the
                 same preference will be activated together.";
            }
            uses path-compute-info;
            uses protection-restoration-properties;
            uses path-state;
          }
        }
        action tunnel-action {
          description
            "Action commands to manipulate the TE tunnel state.";
          reference
            "RFC 3209: RSVP-TE: Extensions to RSVP for LSP Tunnels,
             Section 2.5";
          input {
            leaf action-type {
              type identityref {
                base te-types:tunnel-action-type;
              }
              description
                "The action to be invoked on the TE tunnel.";
            }
          }
          output {
            leaf action-result {
              type identityref {
                base te-types:te-action-result;
              }
              description
                "The result of the tunnel action operation.";
            }
          }
        }
        action protection-external-commands {
          description
            "Actions to manipulate the protection external
             commands of the TE tunnel.";
          reference
            "RFC 4427: Recovery (Protection and Restoration)
             Terminology for Generalized Multi-Protocol Label
             Switching (GMPLS)";
          input {
            leaf protection-external-command {
              type identityref {
                base te-types:protection-external-commands;
              }
              description
                "Protection external command.";
            }
            leaf ingress-node {
              type boolean;
              default "true";
              description
                "When 'true', indicates that the action is
                 applied on the ingress node.
                 By default, the action applies to the ingress
                 node";
            }
            leaf egress-node {
              type boolean;
              default "false";
              description
                "When set to 'true', indicates that the action is
                 applied on the egress node.
                 By default, the action applies to the ingress
                 node.";
            }
            leaf path-name {
              type string;
              description
                "The name of the path that the external command
                applies to.";
            }
            leaf path-type {
              type te-types:path-type;
              description
                "The type of the path that the external command
                applies to.";
            }
            leaf traffic-type {
              type enumeration {
                enum normal-traffic {
                  description
                    "The manual-switch or forced-switch command
                     applies to the normal traffic (this Tunnel).";
                }
                enum null-traffic {
                  description
                    "The manual-switch or forced-switch command
                     applies to the null traffic.";
                }
                enum extra-traffic {
                  description
                    "The manual-switch or forced-switch command
                     applies to the extra traffic (the extra-traffic
                     Tunnel sharing protection bandwidth with this
                     Tunnel).";
                }
              }
              description
                "Indicates whether the manual-switch or forced-switch
                 commands applies to the normal traffic, the null
                 traffic or the extra-traffic.";
              reference
                "RFC4427";
            }
            leaf extra-traffic-tunnel-ref {
              type tunnel-ref;
              description
                "In case there are multiple extra-traffic tunnels
                 sharing protection bandwidth with this Tunnel
                 (m:n protection), represents which extra-traffic
                 Tunnel the manual-switch or forced-switch to
                 extra-traffic command applies to.";
            }
          }
        }
      }
    }

    /* TE LSPs Data */
    container lsps {
      config false;
      description
        "TE LSPs state container.";
      list lsp {
        key "tunnel-name lsp-id node";
        unique "source destination tunnel-id lsp-id "
          + "extended-tunnel-id";
        description
          "List of LSPs associated with the tunnel.";
        leaf tunnel-name {
          type string;
          description "The TE tunnel name.";
        }
        leaf lsp-id {
          type uint16;
          description
            "An identifier unique in the context of the LSP head-end.
             For example, as used in the RSVP-TE SENDER_TEMPLATE and
             FILTER_SPEC objects. The value can be changed to allow a
             sender to share resources with itself.";
          reference
            "RFC3209";
        }
        leaf node {
          type te-types:te-node-id;
          description
            "The node where the LSP state is retrieved.";
        }
        leaf source {
          type te-types:te-node-id;
          description
            "An address of the LSP head-end that identfies the start
             of the tunnel. For example, this may be the tunnel
             sender address extracted from RSVP SENDER_TEMPLATE
             object.";
          reference
            "RFC3209";
        }
        leaf destination {
          type te-types:te-node-id;
          description
            "An address of the LSP endpoint that identfies the end
             of the tunnel. For example, this may be the tunnel end
             point address extracted from RSVP-TE SESSION object.";
          reference
            "RFC3209";
        }
        leaf tunnel-id {
          type uint16;
          description
            "An identifier of the tunnel that remains constant over
             the life of the tunnel. For example, this may be the
             Tunnel ID extracted from RSVP-TE SESSION object.";
          reference
            "RFC3209";
        }
        leaf extended-tunnel-id {
          type yang:dotted-quad;
          description
            "An optional extension qualifier that can be used to
             ensure global uniqueness of the the tunnel identifier
             by carrying an IPv4 address of the LSP head end. For
             example, this may be the Extended Tunnel ID extracted
             from RSVP-TE SESSION object.";
          reference
            "RFC3209";
        }
        leaf operational-state {
          type identityref {
            base te-types:lsp-state-type;
          }
          description
            "The LSP operational state.";
        }
        leaf signaling-type {
          type identityref {
            base te-types:path-signaling-type;
          }
          description
            "The signaling protocol used to set up this LSP.";
        }
        leaf origin-type {
          type enumeration {
            enum ingress {
              description
                "Origin ingress.";
            }
            enum egress {
              description
                "Origin egress.";
            }
            enum transit {
              description
                "Origin transit.";
            }
          }
          description
            "The origin of the LSP relative to the location of the
             local switch in the path.";
        }
        leaf lsp-resource-status {
          type enumeration {
            enum primary {
              description
                "A primary LSP is a fully established LSP for which
                 the resource allocation has been committed at the
                 data plane.";
            }
            enum secondary {
              description
                "A secondary LSP is an LSP that has been provisioned
                 in the control plane only; e.g. resource allocation
                 has not been committed at the data plane.";
            }
          }
          description
            "LSP resource allocation state.";
          reference
            "RFC4872, section 4.2.1";
        }
        leaf lockout-of-normal {
          type boolean;
          description
            "When set to 'true', it represents a lockout of normal
             traffic external command. When set to 'false', it
             represents a clear lockout of normal traffic external
             command. The lockout of normal traffic command applies
             to this Tunnel.";
          reference
            "RFC4427";
        }
        leaf freeze {
          type boolean;
          description
            "When set to 'true', it represents a freeze external
             command.  When set to 'false', it represents a clear
             freeze external command. The freeze command applies to
             all the Tunnels which are sharing the protection
             resources with this Tunnel.";
          reference
            "RFC4427";
        }
        leaf lsp-protection-role {
          type enumeration {
            enum working {
              description
                "A working LSP must be a primary LSP whilst a
                 protecting LSP can be either a primary or a
                 secondary LSP. Also, known as protected LSPs when
                 working LSPs are associated with protecting LSPs.";
            }
            enum protecting {
              description
                "A secondary LSP is an LSP that has been provisioned
                 in the control plane only; e.g. resource allocation
                 has not been committed at the data plane.";
            }
          }
          description
            "LSP role type.";
          reference
            "RFC4872, section 4.2.1";
        }
        leaf lsp-protection-state {
          type identityref {
            base te-types:lsp-protection-state;
          }
          config false;
          description
            "The reported protection state controlling which
             tunnel is using the resources of the protecting LSP.";
        }
        leaf ingress-node-id {
          type te-types:te-node-id;
          description
            "Indicates the te-node-id of the ingress node of the TE
             tunnel or tunnel segment when the protection action is
             applied to the ingress node or the Wait To Restore (WTR)
             timer is active.
             This is set to '0.0.0.0' when the controller is not
             aware of the te-node-id of ingress-node.";
        }
        leaf egress-node-id {
          type te-types:te-node-id;
          description
            "Indicates the te-node-id of the egress node of the TE
             tunnel or tunnel segment when the protection action is
             applied to the ingress node or the WTR timer is active.
             This is set to '0.0.0.0' when the controller is not
             aware of the te-node-id of ingress-node.";
        }
        container lsp-actual-route-information {
          description
            "RSVP recorded route object information.";
          list lsp-actual-route-information {
            when "../../origin-type = 'ingress'" {
              description
                "Applicable on ingress LSPs only.";
            }
            key "index";
            description
              "Record route list entry.";
            uses te-types:record-route-state;
          }
        }
      }
    }
  }

  /* TE Tunnel RPCs/execution Data */

  rpc tunnels-path-compute {
    description
      "This RPC is a generic API whose
       input and output parameters are expected to be provided by
       augments to this module.";
    reference
      "RFC 4655: A Path Computation Element (PCE)-Based
       Architecture.";
    input {
      container path-compute-info {
        /* 
         * An external path compute module may augment this
         * target.
         */
        description
          "RPC input information.";
      }
    }
    output {
      container path-compute-result {
        /* 
         * An external path compute module may augment this
         * target.
         */
        description
          "RPC output information.";
      }
    }
  }

  rpc tunnels-actions {
    description
      "RPC that manipulates the state of a TE tunnel.";
    reference
      "RFC 3209: RSVP-TE: Extensions to RSVP for LSP Tunnels,
       Section 2.5";
    input {
      container tunnel-info {
        description
          "TE tunnel information.";
        choice filter-type {
          mandatory true;
          description
            "Filter choice.";
          case all-tunnels {
            leaf all {
              type empty;
              mandatory true;
              description
                "When present, applies the action on all TE
                 tunnels.";
            }
          }
          case one-tunnel {
            leaf tunnel {
              type tunnel-ref;
              description
                "Apply action on the specific TE tunnel.";
            }
          }
        }
      }
      container action-info {
        description
          "TE tunnel action information.";
        leaf action {
          type identityref {
            base te-types:tunnel-action-type;
          }
          description
            "The action type.";
        }
        leaf disruptive {
          when "derived-from-or-self(../action, "
             + "'te-types:tunnel-action-reoptimize')";
          type empty;
          description
            "Specifies whether reoptimization operations,
             particularly when multiple tunnels are involved,
             are permitted to cause traffic disruption on some
             TE tunnels.";
        }
      }
    }
    output {
      leaf action-result {
        type identityref {
          base te-types:te-action-result;
        }
        description
          "The result of the tunnel action operation.";
      }
    }
  }
}
<CODE ENDS>
]]></artwork></figure>

</section>
</section>
<section anchor="te-device-yang-model"><name>TE Device YANG Model</name>

<t>The device TE YANG module 'ietf-te-device' models data that is specific to
managing a TE device.  This module augments the generic TE YANG module.</t>

<section anchor="module-structure-1"><name>Module Structure</name>

<t>The 'ietf-te-device' modufle defines the configuration and operational state data
that is specific to the device, including those related to the TE subsystem, tunnels, LSPs, and interfaces.</t>

<section anchor="te-device-globals-tunnels-and-lsps"><name>TE Device Globals, Tunnels and LSPs</name>

<t>The 'ietf-te-device' module augments the generic 'ietf-te' module at the
'globals', 'tunnels', and 'lsps' levels to include the device-specific
configurations and operational state.</t>

<t><xref target="fig-if-te-01"/> shows the
'ietf-te-device' subtree generated with depth=4 that describes those
augmentations.</t>

<figure title="TE Device Augmentations to Globals, Tunnels, and LSPs YANG Subtree" anchor="fig-if-te-01"><artwork><![CDATA[
module: ietf-te-device

  augment /te:te/te:globals:
    +--rw lsp-install-interval?        uint32
    +--rw lsp-cleanup-interval?        uint32
    +--rw lsp-invalidation-interval?   uint32
  augment /te:te/te:tunnels/te:tunnel:
    +--rw path-invalidation-action?    identityref
    +--rw lsp-install-interval?        uint32
    +--rw lsp-cleanup-interval?        uint32
    +--rw lsp-invalidation-interval?   uint32
  augment /te:te/te:lsps/te:lsp:
    +--ro lsp-timers
    |  +--ro uptime?            uint32
    |  +--ro time-to-install?   uint32
    |  +--ro time-to-destroy?   uint32
    +--ro downstream-info
    |     ..
    +--ro upstream-info
          ..
]]></artwork></figure>

<t>The following is the description of the augmented data at each level.</t>

<t>Global Timers (Augmenting /te:te/te:globals):</t>

<t>These are device-specific global configuration parameters related to LSP timers, applied system-wide.</t>

<dl>
  <dt>lsp-install-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, before a newly provisioned LSP is installed into the forwarding plane to carry traffic.</t>
  </dd>
  <dt>lsp-cleanup-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, before an LSP is completely removed from the system after it is no longer in use.</t>
  </dd>
  <dt>lsp-invalidation-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, during which a TE LSP's path is considered invalid before any corrective action is taken.</t>
  </dd>
</dl>

<t>Tunnel Device-Dependent Attributes (Augmenting /te:te/te:tunnels/te:tunnel).</t>

<t>These are device-specific configuration parameters that apply to individual TE Tunnels:</t>

<dl>
  <dt>path-invalidation-action</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional identityref that specifies the action to be taken when a TE Tunnel's path is deemed invalid (e.g., tear down, recompute).</t>
  </dd>
  <dt>lsp-install-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, for this specific TE Tunnel before its LSPs are installed into the forwarding plane. This value can override the global lsp-install-interval.</t>
  </dd>
  <dt>lsp-cleanup-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, for this specific TE Tunnel before its LSPs are cleaned up. This value can override the global lsp-cleanup-interval.</t>
  </dd>
  <dt>lsp-invalidation-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, for this specific TE Tunnel during which its path is considered invalid before action is taken. This value can override the global lsp-invalidation-interval.</t>
  </dd>
</dl>

<t>LSP Device-Dependent State (Augmenting /te:te/te:lsps/te:lsp).</t>

<t>These are read-only operational state parameters providing device-specific details for individual LSPs:</t>

<dl>
  <dt>lsp-timers</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>A container that holds various timer-related operational state for an LSP, applicable primarily to ingress LSPs.</t>
  </dd>
  <dt>uptime</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that indicates the total time, in seconds, that the LSP has been operational.</t>
  </dd>
  <dt>time-to-install</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that indicates the remaining time, in seconds, for a new LSP to be fully instantiated and ready to carry traffic.</t>
  </dd>
  <dt>time-to-destroy</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that indicates the remaining time, in seconds, before an existing LSP is torn down.</t>
  </dd>
  <dt>downstream-info</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>A container that holds information about the downstream neighbor and label for the LSP, applicable when the LSP is not at its egress.</t>
  </dd>
  <dt>upstream-info</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>A container that holds information about the upstream neighbor and label for the LSP, applicable when the LSP is not at its ingress.</t>
  </dd>
</dl>

</section>
<section anchor="te-device-interfaces"><name>TE Device Interfaces</name>

<t><xref target="fig-if-te-02"/> shows the TE interface subtree from the TE device module 'ietf-te-device' with depth=4.
The full tree diagram is shown in <xref target="AppendixB"/>.</t>

<figure title="TE interfaces YANG subtree from the TE device YANG data model" anchor="fig-if-te-02"><artwork><![CDATA[
module: ietf-te-device

  augment /te:te:
    +--rw interfaces
       +--rw threshold-type?            enumeration
       +--rw delta-percentage?          rt-types:percentage
       +--rw threshold-specification?   enumeration
       +--rw up-thresholds*             rt-types:percentage
       +--rw down-thresholds*           rt-types:percentage
       +--rw up-down-thresholds*        rt-types:percentage
       +--rw interface* [name]
          +--rw name                                if:interface-ref
          +--rw te-metric?
          |       te-types:te-metric
          +--rw (admin-group-type)?
          |  +--:(value-admin-groups)
          |  |     ...
          |  +--:(named-admin-groups)
          |        ...
          +--rw (srlg-type)?
          |  +--:(value-srlgs)
          |  |     ...
          |  +--:(named-srlgs)
          |        ...
          +--rw threshold-type?                     enumeration
          +--rw delta-percentage?
          |       rt-types:percentage
          +--rw threshold-specification?            enumeration
          +--rw up-thresholds*
          |       rt-types:percentage
          +--rw down-thresholds*
          |       rt-types:percentage
          +--rw up-down-thresholds*
          |       rt-types:percentage
          +--rw switching-capabilities* [switching-capability]
          |  +--rw switching-capability    identityref
          |  +--rw encoding?               identityref
          +--ro te-advertisements-state
             +--ro flood-interval?           uint32
             +--ro last-flooded-time?        uint32
             +--ro next-flooded-time?        uint32
             +--ro last-flooded-trigger?     enumeration
             +--ro advertised-level-areas* [level-area]
                   ...

]]></artwork></figure>

<t>The main elements under the interfaces container are:</t>

<t>threshold-type:</t>

<ul empty="true"><li>
  <t>An optional enumeration that specifies the type of thresholding mechanism used for flooding bandwidth updates for all TE interfaces on the device. Options include 'delta' (flooding on a change greater than a specified delta) or 'threshold-crossed' (flooding when bandwidth crosses a defined threshold).</t>
</li></ul>

<t>delta-percentage:</t>

<ul empty="true"><li>
  <t>An optional percentage value, used when threshold-type is 'delta', indicating the change in reservable bandwidth that triggers an IGP update for all TE interfaces.</t>
</li></ul>

<t>threshold-specification:</t>

<ul empty="true"><li>
  <t>An optional enumeration, used when threshold-type is 'threshold-crossed', to define whether a single set of 'mirrored-up-down' thresholds or separate 'separate-up-down' thresholds are used for increasing and decreasing bandwidth. This applies globally to all TE interfaces.</t>
</li></ul>

<t>up-thresholds:</t>

<ul empty="true"><li>
  <t>A list of percentage values, used with 'separate-up-down' thresholding, that define the points at which bandwidth updates are triggered when the reservable bandwidth is increasing across all TE interfaces.</t>
</li></ul>

<t>down-thresholds:</t>

<ul empty="true"><li>
  <t>A list of percentage values, used with 'separate-up-down' thresholding, that define the points at which bandwidth updates are triggered when the reservable bandwidth is decreasing across all TE interfaces.</t>
</li></ul>

<t>up-down-thresholds:</t>

<ul empty="true"><li>
  <t>A list of percentage values, used with 'mirrored-up-down' thresholding, that define the points at which bandwidth updates are triggered for both increasing and decreasing reservable bandwidth across all TE interfaces.</t>
</li></ul>

<t>interface:</t>

<ul empty="true"><li>
  <t>A list of individual TE interfaces configured on the device. Each entry represents a network interface enabled for Traffic Engineering and contains its specific attributes and state. A TE interface is identified by the 'name' leaf, which references an existing network interface on the device.</t>
</li></ul>

<ul empty="true"><li>
  <t>name:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A leaf that uniquely identifies the TE interface, referencing an existing network interface.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>te-metric:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>An optional leaf that holds the TE metric value associated with this specific interface, used during path computation.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>admin-group-type:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A choice node that allows configuring administrative groups for the interface using either direct values or named references.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>value-admin-groups:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A choice for defining administrative groups using direct bitmask values.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>named-admin-groups:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A list of named administrative groups applied to this TE interface, referencing globally defined named administrative groups.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>srlg-type:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A choice node that allows configuring Shared Risk Link Groups (SRLGs) for the interface using either direct values or named references.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>value-srlgs:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>A list of direct SRLG values that this link is a part of.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>named-srlgs:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>A list of named SRLGs applied to this interface, referencing globally defined named SRLGs.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>threshold-type:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>An optional enumeration, similar to the global threshold-type, but specifically for this individual TE interface, allowing per-interface override of the global bandwidth flooding behavior.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>delta-percentage:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>An optional percentage value, specific to this interface, used when its threshold-type is 'delta'.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>threshold-specification:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>An optional enumeration, specific to this interface, used when its threshold-type is 'threshold-crossed'.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>up-thresholds:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A list of percentage values, specific to this interface, used with 'separate-up-down' thresholding for increasing bandwidth.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>down-thresholds:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A list of percentage values, specific to this interface, used with 'separate-up-down' thresholding for decreasing bandwidth.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>up-down-thresholds:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A list of percentage values, specific to this interface, used with 'mirrored-up-down' thresholding for both increasing and decreasing bandwidth.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>switching-capabilities:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A list of switching capabilities supported by this interface.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>switching-capability:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An identityref indicating a specific switching capability (e.g., Packet, Lambda, Fiber).</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>encoding:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An optional identityref indicating the LSP encoding type supported by this capability on the interface.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>te-advertisements-state:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A read-only container that provides operational state information related to how this TE interface's attributes are advertised.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>flood-interval:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An optional leaf indicating the configured periodic flooding interval for this interface.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>last-flooded-time:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An optional leaf showing the time elapsed since the last advertisement flood for this interface.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>next-flooded-time:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An optional leaf showing the time remaining until the next scheduled advertisement flood for this interface.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>last-flooded-trigger:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An optional enumeration indicating the event that triggered the last advertisement flood (e.g., link-up, bandwidth-change, periodic-timer).</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>advertised-level-areas:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>A list of IGP level-areas in which this TE interface's link state information is advertised.</t>
    </li></ul>
  </li></ul>
</li></ul>

</section>
</section>
<section anchor="tree-diagram-1"><name>Tree Diagram</name>

<t><xref target="fig-te-dev-tree"/> shows the tree diagram of the device TE YANG data model defined in
the 'ietf-te-device' module.</t>

<figure title="TE Tunnel device model YANG tree diagram" anchor="fig-te-dev-tree"><artwork><![CDATA[
module: ietf-te-device

  augment /te:te:
    +--rw interfaces
       +--rw threshold-type?            enumeration
       +--rw delta-percentage?          rt-types:percentage
       +--rw threshold-specification?   enumeration
       +--rw up-thresholds*             rt-types:percentage
       +--rw down-thresholds*           rt-types:percentage
       +--rw up-down-thresholds*        rt-types:percentage
       +--rw interface* [name]
          +--rw name                                if:interface-ref
          +--rw te-metric?
          |       te-types:te-metric
          +--rw (admin-group-type)?
          |  +--:(value-admin-groups)
          |  |  +--rw (value-admin-group-type)?
          |  |     +--:(admin-groups)
          |  |     |  +--rw admin-group?
          |  |     |          te-types:admin-group
          |  |     +--:(extended-admin-groups)
          |  |              {te-types:extended-admin-groups}?
          |  |        +--rw extended-admin-group?
          |  |                te-types:extended-admin-group
          |  +--:(named-admin-groups)
          |     +--rw named-admin-groups* [named-admin-group]
          |             {te-types:extended-admin-groups,
          |              te-types:named-extended-admin-groups}?
          |        +--rw named-admin-group    leafref
          +--rw (srlg-type)?
          |  +--:(value-srlgs)
          |  |  +--rw values* [value]
          |  |     +--rw value    uint32
          |  +--:(named-srlgs)
          |     +--rw named-srlgs* [named-srlg]
          |             {te-types:named-srlg-groups}?
          |        +--rw named-srlg    leafref
          +--rw threshold-type?                     enumeration
          +--rw delta-percentage?
          |       rt-types:percentage
          +--rw threshold-specification?            enumeration
          +--rw up-thresholds*
          |       rt-types:percentage
          +--rw down-thresholds*
          |       rt-types:percentage
          +--rw up-down-thresholds*
          |       rt-types:percentage
          +--rw switching-capabilities* [switching-capability]
          |  +--rw switching-capability    identityref
          |  +--rw encoding?               identityref
          +--ro te-advertisements-state
             +--ro flood-interval?           uint32
             +--ro last-flooded-time?        uint32
             +--ro next-flooded-time?        uint32
             +--ro last-flooded-trigger?     enumeration
             +--ro advertised-level-areas* [level-area]
                +--ro level-area    uint32
  augment /te:te/te:globals:
    +--rw lsp-install-interval?        uint32
    +--rw lsp-cleanup-interval?        uint32
    +--rw lsp-invalidation-interval?   uint32
  augment /te:te/te:tunnels/te:tunnel:
    +--rw path-invalidation-action?    identityref
    +--rw lsp-install-interval?        uint32
    +--rw lsp-cleanup-interval?        uint32
    +--rw lsp-invalidation-interval?   uint32
  augment /te:te/te:lsps/te:lsp:
    +--ro lsp-timers
    |  +--ro uptime?            uint32
    |  +--ro time-to-install?   uint32
    |  +--ro time-to-destroy?   uint32
    +--ro downstream-info
    |  +--ro nhop?                 te-types:te-tp-id
    |  +--ro outgoing-interface?   if:interface-ref
    |  +--ro neighbor
    |  |  +--ro id?     te-gen-node-id
    |  |  +--ro type?   enumeration
    |  +--ro label?                rt-types:generalized-label
    +--ro upstream-info
       +--ro phop?       te-types:te-tp-id
       +--ro neighbor
       |  +--ro id?     te-gen-node-id
       |  +--ro type?   enumeration
       +--ro label?      rt-types:generalized-label

  rpcs:
    +---x link-state-update
       +---w input
          +---w (filter-type)
             +--:(match-all)
             |  +---w all          empty
             +--:(match-one-interface)
                +---w interface?   if:interface-ref

]]></artwork></figure>

</section>
<section anchor="yang-module-1"><name>YANG Module</name>

<t>The 'ietf-te-device' module imports the following modules:</t>

<t><list style="symbols">
  <t>ietf-interfaces defined in <xref target="RFC8343"/></t>
  <t>ietf-routing-types defined in <xref target="RFC8294"/></t>
  <t>ietf-te-types defined in <xref target="I-D.draft-ietf-teas-rfc8776-update"/></t>
  <t>ietf-te defined in this document</t>
</list></t>

<figure><artwork><![CDATA[
<CODE BEGINS> file "ietf-te-device@2025-10-27.yang"
module ietf-te-device {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-te-device";

  /* RFC Editor Note: Please replace the above line with the URN
   * assigned by IANA and remove this note.
   */

  prefix te-dev;

  /* Import TE module */

  import ietf-te {
    prefix te;
    reference
      "RFCXXXX: A YANG Data Model for Traffic Engineering
       Tunnels and Interfaces";
  }

  /* Import TE types */

  import ietf-te-types {
    prefix te-types;
    reference
      "draft-ietf-teas-rfc8776-update: Common YANG Data Types
       for Traffic Engineering.";
  }
  import ietf-interfaces {
    prefix if;
    reference
      "RFC8343: A YANG Data Model for Interface Management";
  }
  import ietf-routing-types {
    prefix rt-types;
    reference
      "RFC8294: Common YANG Data Types for the Routing Area";
  }

  organization
    "IETF Traffic Engineering Architecture and Signaling (TEAS)
     Working Group";
  contact
    "WG Web:   <https://tools.ietf.org/wg/teas/>
     WG List:  <mailto:teas@ietf.org>

     Editor:   Tarek Saad
               <mailto:tsaad.net@gmail.com>

     Editor:   Rakesh Gandhi
               <mailto:rgandhi@cisco.com>

     Editor:   Vishnu Pavan Beeram
               <mailto:vbeeram@juniper.net>

     Editor:   Himanshu Shah
               <mailto:hshah@ciena.com>

     Editor:   Xufeng Liu
               <mailto: xufeng.liu.ietf@gmail.com>

     Editor:   Igor Bryskin
               <mailto:i_bryskin@yahoo.com>";

  description
    "This module defines a data model for TE device configurations,
     state, and RPCs. The model fully conforms to the
     Network Management Datastore Architecture (NMDA).

     Copyright (c) 2025 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
     for full legal notices.";

  // RFC Ed.: replace XXXX with actual RFC number and remove this
  // note.
  // RFC Ed.: update the date below with the date of RFC publication
  // and remove this note.

  revision 2025-10-27 {
    description
      "Initial revision for the TE device YANG module.";
    reference
      "RFCXXXX: A YANG Data Model for Traffic Engineering Tunnels
       and Interfaces";
  }

  grouping lsp-device-timers {
    description
      "Device TE LSP timers configs.";
    leaf lsp-install-interval {
      type uint32;
      units "seconds";
      description
        "TE LSP installation delay time.";
    }
    leaf lsp-cleanup-interval {
      type uint32;
      units "seconds";
      description
        "TE LSP cleanup delay time.";
    }
    leaf lsp-invalidation-interval {
      type uint32;
      units "seconds";
      description
        "TE LSP path invalidation before taking action delay time.";
    }
  }

  grouping te-igp-flooding-bandwidth-config {
    description
      "Configurable items for igp flooding bandwidth
       threshold configuration.";
    leaf threshold-type {
      type enumeration {
        enum delta {
          description
            "'delta' indicates that the local
             system should flood IGP updates when a
             change in reserved bandwidth >= the specified
             delta occurs on the interface.";
        }
        enum threshold-crossed {
          description
            "THRESHOLD-CROSSED indicates that
             the local system should trigger an update (and
             hence flood) the reserved bandwidth when the
             reserved bandwidth changes such that it crosses,
             or becomes equal to one of the threshold values.";
        }
      }
      description
        "The type of threshold that should be used to specify the
         values at which bandwidth is flooded. 'delta' indicates that
         the local system should flood IGP updates when a change in
         reserved bandwidth >= the specified delta occurs on the
         interface. Where 'threshold-crossed' is specified, the local
         system should trigger an update (and hence flood) the
         reserved bandwidth when the reserved bandwidth changes such
         that it crosses, or becomes equal to one of the threshold
         values.";
    }
    leaf delta-percentage {
      when "../threshold-type = 'delta'" {
        description
          "The percentage delta can only be specified when the
           threshold type is specified to be a percentage delta of
           the reserved bandwidth.";
      }
      type rt-types:percentage;
      description
        "The percentage of the maximum-reservable-bandwidth
         considered as the delta that results in an IGP update
         being flooded.";
    }
    leaf threshold-specification {
      when "../threshold-type = 'threshold-crossed'" {
        description
          "The selection of whether mirrored or separate threshold
           values are to be used requires user-specified thresholds
           to be set.";
      }
      type enumeration {
        enum mirrored-up-down {
          description
            "mirrored-up-down indicates that a single set of
             threshold values should be used for both increasing
             and decreasing bandwidth when determining whether
             to trigger updated bandwidth values to be flooded
             in the IGP TE extensions.";
        }
        enum separate-up-down {
          description
            "separate-up-down indicates that a separate
             threshold values should be used for the increasing
             and decreasing bandwidth when determining whether
             to trigger updated bandwidth values to be flooded
             in the IGP TE extensions.";
        }
      }
      description
        "This value specifies whether a single set of threshold
         values should be used for both increasing and decreasing
         bandwidth when determining whether to trigger updated
         bandwidth values to be flooded in the IGP TE extensions.
         'mirrored-up-down' indicates that a single value (or set of
         values) should be used for both increasing and decreasing
         values, where 'separate-up-down' specifies that the
         increasing and decreasing values will be separately
         specified.";
    }
    leaf-list up-thresholds {
      when "../threshold-type = 'threshold-crossed'"
         + "and ../threshold-specification = 'separate-up-down'" {
        description
          "A list of up-thresholds can only be specified when the
           bandwidth update is triggered based on crossing a
           threshold and separate up and down thresholds are
           required.";
      }
      type rt-types:percentage;
      description
        "The thresholds (expressed as a percentage of the maximum
         reservable bandwidth) at which bandwidth updates are to be
         triggered when the bandwidth is increasing.";
    }
    leaf-list down-thresholds {
      when "../threshold-type = 'threshold-crossed'"
         + "and ../threshold-specification = 'separate-up-down'" {
        description
          "A list of down-thresholds can only be specified when the
           bandwidth update is triggered based on crossing a
           threshold and separate up and down thresholds are
           required.";
      }
      type rt-types:percentage;
      description
        "The thresholds (expressed as a percentage of the maximum
         reservable bandwidth) at which bandwidth updates are to be
         triggered when the bandwidth is decreasing.";
    }
    leaf-list up-down-thresholds {
      when "../threshold-type = 'threshold-crossed'"
         + "and ../threshold-specification = 'mirrored-up-down'" {
        description
          "A list of thresholds corresponding to both increasing
           and decreasing bandwidths can be specified only when an
           update is triggered based on crossing a threshold, and
           the same up and down thresholds are required.";
      }
      type rt-types:percentage;
      description
        "The thresholds (expressed as a percentage of the maximum
         reservable bandwidth of the interface) at which bandwidth
         updates are flooded - used both when the bandwidth is
         increasing and decreasing.";
    }
  }

  /**
   * TE device augmentations
   */
  augment "/te:te" {
    description
      "TE global container.";
    /* TE Interface Configuration Data */
    container interfaces {
      description
        "Configuration data model for TE interfaces.";
      uses te-igp-flooding-bandwidth-config;
      list interface {
        key "name";
        description
          "The list of interfaces enabled for TE.";
        leaf name {
          type if:interface-ref;
          description
            "The reference to interface enabled for TE.";
        }
        /* TE interface parameters */
        leaf te-metric {
          type te-types:te-metric;
          description
            "TE interface metric.";
        }
        choice admin-group-type {
          description
            "TE interface administrative groups
             representation type.";
          case value-admin-groups {
            choice value-admin-group-type {
              description
                "The type of admin-groups.";
              case admin-groups {
                description
                  "Administrative group/Resource
                   class/Color.";
                leaf admin-group {
                  type te-types:admin-group;
                  description
                    "TE interface administrative group.";
                }
              }
              case extended-admin-groups {
                if-feature "te-types:extended-admin-groups";
                description
                  "Extended administrative group/Resource
                   class/Color.";
                leaf extended-admin-group {
                  type te-types:extended-admin-group;
                  description
                    "TE interface extended administrative group.";
                }
              }
            }
          }
          case named-admin-groups {
            list named-admin-groups {
              if-feature "te-types:extended-admin-groups";
              if-feature "te-types:named-extended-admin-groups";
              key "named-admin-group";
              description
                "A list of named admin-group entries.";
              leaf named-admin-group {
                type leafref {
                  path "../../../../te:globals/"
                     + "te:named-admin-groups/te:named-admin-group/"
                     + "te:name";
                }
                description
                  "A named admin-group entry.";
              }
            }
          }
        }
        choice srlg-type {
          description
            "Choice of SRLG configuration.";
          case value-srlgs {
            list values {
              key "value";
              description
                "List of SRLG values that
                 this link is part of.";
              leaf value {
                type uint32 {
                  range "0..4294967295";
                }
                description
                  "Value of the SRLG";
              }
            }
          }
          case named-srlgs {
            list named-srlgs {
              if-feature "te-types:named-srlg-groups";
              key "named-srlg";
              description
                "A list of named SRLG entries.";
              leaf named-srlg {
                type leafref {
                  path "../../../../te:globals/"
                     + "te:named-srlgs/te:named-srlg/te:name";
                }
                description
                  "A named SRLG entry.";
              }
            }
          }
        }
        uses te-igp-flooding-bandwidth-config;
        list switching-capabilities {
          key "switching-capability";
          description
            "List of interface capabilities for this interface.";
          leaf switching-capability {
            type identityref {
              base te-types:switching-capabilities;
            }
            description
              "Switching Capability for this interface.";
          }
          leaf encoding {
            type identityref {
              base te-types:lsp-encoding-types;
            }
            description
              "Encoding supported by this interface.";
          }
        }
        container te-advertisements-state {
          config false;
          description
            "TE interface advertisements state container.";
          leaf flood-interval {
            type uint32;
            description
              "The periodic flooding interval.";
          }
          leaf last-flooded-time {
            type uint32;
            units "seconds";
            description
              "Time elapsed since last flooding in seconds.";
          }
          leaf next-flooded-time {
            type uint32;
            units "seconds";
            description
              "Time remained for next flooding in seconds.";
          }
          leaf last-flooded-trigger {
            type enumeration {
              enum link-up {
                description
                  "Link-up flooding trigger.";
              }
              enum link-down {
                description
                  "Link-down flooding trigger.";
              }
              enum threshold-up {
                description
                  "Bandwidth reservation up threshold.";
              }
              enum threshold-down {
                description
                  "Bandwidth reservation down threshold.";
              }
              enum bandwidth-change {
                description
                  "Bandwidth capacity change.";
              }
              enum user-initiated {
                description
                  "Initiated by user.";
              }
              enum srlg-change {
                description
                  "SRLG property change.";
              }
              enum periodic-timer {
                description
                  "Periodic timer expired.";
              }
            }
            default "periodic-timer";
            description
              "Trigger for the last flood.";
          }
          list advertised-level-areas {
            key "level-area";
            description
              "List of level-areas that the TE interface is
               advertised in.";
            leaf level-area {
              type uint32;
              description
                "The IGP area or level where the TE interface link
                 state is advertised in.";
            }
          }
        }
      }
    }
  }

  /* TE globals device augmentation */

  augment "/te:te/te:globals" {
    description
      "Global TE device specific configuration parameters.";
    uses lsp-device-timers;
  }

  /* TE tunnels device configuration augmentation */

  augment "/te:te/te:tunnels/te:tunnel" {
    description
      "Tunnel device dependent augmentation.";
    leaf path-invalidation-action {
      type identityref {
        base te-types:path-invalidation-action-type;
      }
      description
        "Tunnel path invalidation action.";
    }
    uses lsp-device-timers;
  }

  /* TE LSPs device state augmentation */

  augment "/te:te/te:lsps/te:lsp" {
    description
      "TE LSP device dependent augmentation.";
    container lsp-timers {
      when "../te:origin-type = 'ingress'" {
        description
          "Applicable to ingress LSPs only.";
      }
      description
        "Ingress LSP timers.";
      leaf uptime {
        type uint32;
        units "seconds";
        description
          "The LSP uptime.";
      }
      leaf time-to-install {
        type uint32;
        units "seconds";
        description
          "The time remaining for a new LSP to be instantiated
           in forwarding to carry traffic.";
      }
      leaf time-to-destroy {
        type uint32;
        units "seconds";
        description
          "The time remaining for an existing LSP to be torn down.";
      }
    }
    container downstream-info {
      when "../te:origin-type != 'egress'" {
        description
          "Downstream information of the LSP.";
      }
      description
        "Downstream information.";
      leaf nhop {
        type te-types:te-tp-id;
        description
          "Downstream next-hop address.";
      }
      leaf outgoing-interface {
        type if:interface-ref;
        description
          "Downstream interface.";
      }
      container neighbor {
        uses te-types:te-generic-node-id;
        description
          "Downstream neighbor address.";
      }
      leaf label {
        type rt-types:generalized-label;
        description
          "Downstream label.";
      }
    }
    container upstream-info {
      when "../te:origin-type != 'ingress'" {
        description
          "Upstream information of the LSP.";
      }
      description
        "Upstream information.";
      leaf phop {
        type te-types:te-tp-id;
        description
          "Upstream next-hop or previous-hop address.";
      }
      container neighbor {
        uses te-types:te-generic-node-id;
        description
          "Upstream neighbor address.";
      }
      leaf label {
        type rt-types:generalized-label;
        description
          "Upstream label.";
      }
    }
  }

  /* TE interfaces RPCs/execution Data */

  rpc link-state-update {
    description
      "Triggers a link state update for the specific interface.";
    input {
      choice filter-type {
        mandatory true;
        description
          "Filter choice.";
        case match-all {
          leaf all {
            type empty;
            mandatory true;
            description
              "Match all TE interfaces.";
          }
        }
        case match-one-interface {
          leaf interface {
            type if:interface-ref;
            description
              "Match a specific TE interface.";
          }
        }
      }
    }
  }
}
<CODE ENDS>
]]></artwork></figure>

</section>
</section>
<section anchor="notifications"><name>Notifications</name>

<t>Notifications are a key component of any topology data model.</t>

<t><xref target="RFC8639"/> and <xref target="RFC8641"/> define a subscription mechanism and a push
mechanism for YANG datastores.  These mechanisms currently allow the
user to:</t>

<t><list style="symbols">
  <t>Subscribe to notifications on a per-client basis.</t>
  <t>Specify subtree filters or XML Path Language (XPath) filters so
that only contents of interest will be sent.</t>
  <t>Specify either periodic or on-demand notifications.</t>
</list></t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document registers the following URIs in the IETF XML registry
<xref target="RFC3688"/>.
Following the format in <xref target="RFC3688"/>, the following registrations are
requested to be made.</t>

<figure><artwork><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-te
   Registrant Contact:  The IESG.
   XML: N/A, the requested URI is an XML namespace.

   URI: urn:ietf:params:xml:ns:yang:ietf-te-device
   Registrant Contact:  The IESG.
   XML: N/A, the requested URI is an XML namespace.
]]></artwork></figure>

<t>This document registers two YANG modules in the YANG Module Names
registry <xref target="RFC6020"/>.</t>

<figure><artwork><![CDATA[
   Name:       ietf-te
   Namespace:  urn:ietf:params:xml:ns:yang:ietf-te
   Prefix:     te
   Reference:  RFCXXXX

   Name:       ietf-te-device
   Namespace:  urn:ietf:params:xml:ns:yang:ietf-te-device
   Prefix:     te-device
   Reference:  RFCXXXX
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The YANG module specified in this document defines a schema for data that is
designed to be accessed via network management protocols such as NETCONF
<xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure
transport layer, and the mandatory-to-implement secure transport is Secure
Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the
mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>

<t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/> provides the
means to restrict access for particular NETCONF or RESTCONF users to a
preconfigured subset of all available NETCONF or RESTCONF protocol operations
and content.</t>

<t>There are a number of data nodes defined in this YANG module that are
writable/creatable/deletable (i.e., config true, which is the default). These
data nodes may be considered sensitive or vulnerable in some network
environments. Write operations (e.g., edit-config) to these data nodes without
proper protection can have a negative effect on network operations. These are
the subtrees and data nodes and their sensitivity/vulnerability:</t>

<t>"/te/globals":  This module specifies the global TE configurations on a device.
Unauthorized access to this container could cause the device to ignore packets
it should receive and process.</t>

<t>"/te/tunnels":  This list specifies the configuration and state of TE Tunnels
present on the device or controller.  Unauthorized access to this list could
cause the device to ignore packets it should receive and process. An attacker
may also use state to derive information about the network topology,
and subsequently orchestrate further attacks.</t>

<t>"/te/interfaces":  This list specifies the configuration and state TE interfaces
on a device. Unauthorized access to this list could cause the device to ignore packets it
should receive and process.</t>

<t>Some of the readable data nodes in this YANG module may be considered sensitive
or vulnerable in some network environments. It is thus important to control
read access (e.g., via get, get-config, or notification) to these data nodes.
These are the subtrees and data nodes and their sensitivity/vulnerability:</t>

<t>"/te/lsps": this list contains information state about established LSPs in the network.
An attacker can use this information to derive information about the network topology,
and subsequently orchestrate further attacks.</t>

<t>Some of the RPC operations in this YANG module may be considered sensitive or
vulnerable in some network environments. It is thus important to control access
to these operations. These are the operations and their
sensitivity/vulnerability:</t>

<t>"/te/tunnels-actions": using this RPC, an attacker can modify existing paths that
may be carrying live traffic, and hence result in interruption to services
carried over the network.</t>

<t>"/te/tunnels-path-compute": using this RPC, an attacker can retrieve sensitive
information about the network provider which can be used to orchestrate further
attacks.</t>

<t>The security considerations spelled out in the YANG 1.1 specification
<xref target="RFC7950"/> apply for this document as well.</t>

</section>
<section anchor="acknowledgement"><name>Acknowledgement</name>

<t>The authors would like to thank the  members of the multi-vendor YANG design
team who are involved in the definition of this model.</t>

<t>The authors would like to thank Tom Petch and Adrian Farrel for reviewing and
providing useful feedback about the document. The authors would also like to
thank Loa Andersson, Lou Berger, Sergio Belotti, Italo Busi, Carlo Perocchio,
Francesco Lazzeri, Aihua Guo, Dhruv Dhody, and Raqib Jones for providing
feedback on this document.</t>

</section>
<section anchor="contributors"><name>Contributors</name>

<figure><artwork><![CDATA[
   Oscar Gonzalez de Dios
   Telefonica

   Email: oscar.gonzalezdedios@telefonica.com

   Himanshu Shah
   Ciena

   Email: hshah@ciena.com


   Xia Chen
   Huawei Technologies

   Email: jescia.chenxia@huawei.com


   Bin Wen
   Comcast

   Email: Bin_Wen@cable.comcast.com

]]></artwork></figure>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC3209">
  <front>
    <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
    <author fullname="D. Awduche" initials="D." surname="Awduche"/>
    <author fullname="L. Berger" initials="L." surname="Berger"/>
    <author fullname="D. Gan" initials="D." surname="Gan"/>
    <author fullname="T. Li" initials="T." surname="Li"/>
    <author fullname="V. Srinivasan" initials="V." surname="Srinivasan"/>
    <author fullname="G. Swallow" initials="G." surname="Swallow"/>
    <date month="December" year="2001"/>
    <abstract>
      <t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching). Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels. A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3209"/>
  <seriesInfo name="DOI" value="10.17487/RFC3209"/>
</reference>
<reference anchor="RFC6020">
  <front>
    <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
    <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
    <date month="October" year="2010"/>
    <abstract>
      <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6020"/>
  <seriesInfo name="DOI" value="10.17487/RFC6020"/>
</reference>
<reference anchor="RFC6241">
  <front>
    <title>Network Configuration Protocol (NETCONF)</title>
    <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
    <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
    <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
    <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
    <date month="June" year="2011"/>
    <abstract>
      <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6241"/>
  <seriesInfo name="DOI" value="10.17487/RFC6241"/>
</reference>
<reference anchor="RFC6991">
  <front>
    <title>Common YANG Data Types</title>
    <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
    <date month="July" year="2013"/>
    <abstract>
      <t>This document introduces a collection of common data types to be used with the YANG data modeling language. This document obsoletes RFC 6021.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6991"/>
  <seriesInfo name="DOI" value="10.17487/RFC6991"/>
</reference>
<reference anchor="RFC6107">
  <front>
    <title>Procedures for Dynamically Signaled Hierarchical Label Switched Paths</title>
    <author fullname="K. Shiomoto" initials="K." role="editor" surname="Shiomoto"/>
    <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
    <date month="February" year="2011"/>
    <abstract>
      <t>Label Switched Paths (LSPs) set up in Multiprotocol Label Switching (MPLS) or Generalized MPLS (GMPLS) networks can be used to form links to carry traffic in those networks or in other (client) networks.</t>
      <t>Protocol mechanisms already exist to facilitate the establishment of such LSPs and to bundle traffic engineering (TE) links to reduce the load on routing protocols. This document defines extensions to those mechanisms to support identifying the use to which such LSPs are to be put and to enable the TE link endpoints to be assigned addresses or unnumbered identifiers during the signaling process. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6107"/>
  <seriesInfo name="DOI" value="10.17487/RFC6107"/>
</reference>
<reference anchor="RFC8040">
  <front>
    <title>RESTCONF Protocol</title>
    <author fullname="A. Bierman" initials="A." surname="Bierman"/>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <date month="January" year="2017"/>
    <abstract>
      <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8040"/>
  <seriesInfo name="DOI" value="10.17487/RFC8040"/>
</reference>

<reference anchor="ITU_G.808.1" >
  <front>
    <title>Generic protection switching - Linear trail and subnetwork protection</title>
    <author >
      <organization>ITU-T Recommendation G.808.1</organization>
    </author>
    <date year="2014" month="May"/>
  </front>
  <seriesInfo name="https://www.itu.int/rec/T-REC-G.808.1-201405-I" value=""/>
</reference>


<reference anchor="RFC7950">
  <front>
    <title>The YANG 1.1 Data Modeling Language</title>
    <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
    <date month="August" year="2016"/>
    <abstract>
      <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7950"/>
  <seriesInfo name="DOI" value="10.17487/RFC7950"/>
</reference>
<reference anchor="RFC3473">
  <front>
    <title>Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) Extensions</title>
    <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
    <date month="January" year="2003"/>
    <abstract>
      <t>This document describes extensions to Multi-Protocol Label Switching (MPLS) Resource ReserVation Protocol - Traffic Engineering (RSVP-TE) signaling required to support Generalized MPLS. Generalized MPLS extends the MPLS control plane to encompass time-division (e.g., Synchronous Optical Network and Synchronous Digital Hierarchy, SONET/SDH), wavelength (optical lambdas) and spatial switching (e.g., incoming port or fiber to outgoing port or fiber). This document presents a RSVP-TE specific description of the extensions. A generic functional description can be found in separate documents. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3473"/>
  <seriesInfo name="DOI" value="10.17487/RFC3473"/>
</reference>
<reference anchor="RFC8294">
  <front>
    <title>Common YANG Data Types for the Routing Area</title>
    <author fullname="X. Liu" initials="X." surname="Liu"/>
    <author fullname="Y. Qu" initials="Y." surname="Qu"/>
    <author fullname="A. Lindem" initials="A." surname="Lindem"/>
    <author fullname="C. Hopps" initials="C." surname="Hopps"/>
    <author fullname="L. Berger" initials="L." surname="Berger"/>
    <date month="December" year="2017"/>
    <abstract>
      <t>This document defines a collection of common data types using the YANG data modeling language. These derived common types are designed to be imported by other modules defined in the routing area.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8294"/>
  <seriesInfo name="DOI" value="10.17487/RFC8294"/>
</reference>

<reference anchor="I-D.draft-ietf-teas-rfc8776-update">
   <front>
      <title>Common YANG Data Types for Traffic Engineering</title>
      <author fullname="Italo Busi" initials="I." surname="Busi">
         <organization>Huawei</organization>
      </author>
      <author fullname="Aihua Guo" initials="A." surname="Guo">
         <organization>Futurewei Technologies</organization>
      </author>
      <author fullname="Xufeng Liu" initials="X." surname="Liu">
         <organization>Alef Edge</organization>
      </author>
      <author fullname="Tarek Saad" initials="T." surname="Saad">
         <organization>Cisco Systems Inc.</organization>
      </author>
      <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
         <organization>Individual</organization>
      </author>
      <date day="19" month="December" year="2025"/>
      <abstract>
	 <t>   This document defines a collection of common data types, identities,
   and groupings in YANG data modeling language.  These derived common
   data types, identities and groupings are intended to be imported by
   other modules, e.g., those which model the Traffic Engineering (TE)
   configuration and state capabilities.

   This document obsoletes RFC 8776.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-teas-rfc8776-update-20"/>
   
</reference>
<reference anchor="RFC8340">
  <front>
    <title>YANG Tree Diagrams</title>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
    <date month="March" year="2018"/>
    <abstract>
      <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="215"/>
  <seriesInfo name="RFC" value="8340"/>
  <seriesInfo name="DOI" value="10.17487/RFC8340"/>
</reference>
<reference anchor="RFC8342">
  <front>
    <title>Network Management Datastore Architecture (NMDA)</title>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
    <author fullname="P. Shafer" initials="P." surname="Shafer"/>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <author fullname="R. Wilton" initials="R." surname="Wilton"/>
    <date month="March" year="2018"/>
    <abstract>
      <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8342"/>
  <seriesInfo name="DOI" value="10.17487/RFC8342"/>
</reference>
<reference anchor="RFC9012">
  <front>
    <title>The BGP Tunnel Encapsulation Attribute</title>
    <author fullname="K. Patel" initials="K." surname="Patel"/>
    <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
    <author fullname="S. Sangli" initials="S." surname="Sangli"/>
    <author fullname="J. Scudder" initials="J." surname="Scudder"/>
    <date month="April" year="2021"/>
    <abstract>
      <t>This document defines a BGP path attribute known as the "Tunnel Encapsulation attribute", which can be used with BGP UPDATEs of various Subsequent Address Family Identifiers (SAFIs) to provide information needed to create tunnels and their corresponding encapsulation headers. It provides encodings for a number of tunnel types, along with procedures for choosing between alternate tunnels and routing packets into tunnels.</t>
      <t>This document obsoletes RFC 5512, which provided an earlier definition of the Tunnel Encapsulation attribute. RFC 5512 was never deployed in production. Since RFC 5566 relies on RFC 5512, it is likewise obsoleted. This document updates RFC 5640 by indicating that the Load-Balancing Block sub-TLV may be included in any Tunnel Encapsulation attribute where load balancing is desired.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9012"/>
  <seriesInfo name="DOI" value="10.17487/RFC9012"/>
</reference>
<reference anchor="RFC8345">
  <front>
    <title>A YANG Data Model for Network Topologies</title>
    <author fullname="A. Clemm" initials="A." surname="Clemm"/>
    <author fullname="J. Medved" initials="J." surname="Medved"/>
    <author fullname="R. Varga" initials="R." surname="Varga"/>
    <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
    <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
    <author fullname="X. Liu" initials="X." surname="Liu"/>
    <date month="March" year="2018"/>
    <abstract>
      <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8345"/>
  <seriesInfo name="DOI" value="10.17487/RFC8345"/>
</reference>
<reference anchor="RFC8795">
  <front>
    <title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
    <author fullname="X. Liu" initials="X." surname="Liu"/>
    <author fullname="I. Bryskin" initials="I." surname="Bryskin"/>
    <author fullname="V. Beeram" initials="V." surname="Beeram"/>
    <author fullname="T. Saad" initials="T." surname="Saad"/>
    <author fullname="H. Shah" initials="H." surname="Shah"/>
    <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
    <date month="August" year="2020"/>
    <abstract>
      <t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8795"/>
  <seriesInfo name="DOI" value="10.17487/RFC8795"/>
</reference>
<reference anchor="RFC4206">
  <front>
    <title>Label Switched Paths (LSP) Hierarchy with Generalized Multi-Protocol Label Switching (GMPLS) Traffic Engineering (TE)</title>
    <author fullname="K. Kompella" initials="K." surname="Kompella"/>
    <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
    <date month="October" year="2005"/>
    <abstract>
      <t>To improve scalability of Generalized Multi-Protocol Label Switching (GMPLS) it may be useful to aggregate Label Switched Paths (LSPs) by creating a hierarchy of such LSPs. A way to create such a hierarchy is by (a) a Label Switching Router (LSR) creating a Traffic Engineering Label Switched Path (TE LSP), (b) the LSR forming a forwarding adjacency (FA) out of that LSP (by advertising this LSP as a Traffic Engineering (TE) link into the same instance of ISIS/OSPF as the one that was used to create the LSP), (c) allowing other LSRs to use FAs for their path computation, and (d) nesting of LSPs originated by other LSRs into that LSP (by using the label stack construct).</t>
      <t>This document describes the mechanisms to accomplish this. [PROPOSED STANDARD]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4206"/>
  <seriesInfo name="DOI" value="10.17487/RFC4206"/>
</reference>
<reference anchor="RFC4872">
  <front>
    <title>RSVP-TE Extensions in Support of End-to-End Generalized Multi-Protocol Label Switching (GMPLS) Recovery</title>
    <author fullname="J.P. Lang" initials="J.P." role="editor" surname="Lang"/>
    <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
    <author fullname="D. Papadimitriou" initials="D." role="editor" surname="Papadimitriou"/>
    <date month="May" year="2007"/>
    <abstract>
      <t>This document describes protocol-specific procedures and extensions for Generalized Multi-Protocol Label Switching (GMPLS) Resource ReSerVation Protocol - Traffic Engineering (RSVP-TE) signaling to support end-to-end Label Switched Path (LSP) recovery that denotes protection and restoration. A generic functional description of GMPLS recovery can be found in a companion document, RFC 4426. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4872"/>
  <seriesInfo name="DOI" value="10.17487/RFC4872"/>
</reference>
<reference anchor="RFC6780">
  <front>
    <title>RSVP ASSOCIATION Object Extensions</title>
    <author fullname="L. Berger" initials="L." surname="Berger"/>
    <author fullname="F. Le Faucheur" initials="F." surname="Le Faucheur"/>
    <author fullname="A. Narayanan" initials="A." surname="Narayanan"/>
    <date month="October" year="2012"/>
    <abstract>
      <t>The RSVP ASSOCIATION object was defined in the context of GMPLS-controlled Label Switched Paths (LSPs). In this context, the object is used to associate recovery LSPs with the LSP they are protecting. This object also has broader applicability as a mechanism to associate RSVP state. This document defines how the ASSOCIATION object can be more generally applied. This document also defines Extended ASSOCIATION objects that, in particular, can be used in the context of the MPLS Transport Profile (MPLS-TP). This document updates RFC 2205, RFC 3209, and RFC 3473. It also generalizes the definition of the Association ID field defined in RFC 4872. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6780"/>
  <seriesInfo name="DOI" value="10.17487/RFC6780"/>
</reference>
<reference anchor="RFC7471">
  <front>
    <title>OSPF Traffic Engineering (TE) Metric Extensions</title>
    <author fullname="S. Giacalone" initials="S." surname="Giacalone"/>
    <author fullname="D. Ward" initials="D." surname="Ward"/>
    <author fullname="J. Drake" initials="J." surname="Drake"/>
    <author fullname="A. Atlas" initials="A." surname="Atlas"/>
    <author fullname="S. Previdi" initials="S." surname="Previdi"/>
    <date month="March" year="2015"/>
    <abstract>
      <t>In certain networks, such as, but not limited to, financial information networks (e.g., stock market data providers), network performance information (e.g., link propagation delay) is becoming critical to data path selection.</t>
      <t>This document describes common extensions to RFC 3630 "Traffic Engineering (TE) Extensions to OSPF Version 2" and RFC 5329 "Traffic Engineering Extensions to OSPF Version 3" to enable network performance information to be distributed in a scalable fashion. The information distributed using OSPF TE Metric Extensions can then be used to make path selection decisions based on network performance.</t>
      <t>Note that this document only covers the mechanisms by which network performance information is distributed. The mechanisms for measuring network performance information or using that information, once distributed, are outside the scope of this document.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7471"/>
  <seriesInfo name="DOI" value="10.17487/RFC7471"/>
</reference>
<reference anchor="RFC8570">
  <front>
    <title>IS-IS Traffic Engineering (TE) Metric Extensions</title>
    <author fullname="L. Ginsberg" initials="L." role="editor" surname="Ginsberg"/>
    <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
    <author fullname="S. Giacalone" initials="S." surname="Giacalone"/>
    <author fullname="D. Ward" initials="D." surname="Ward"/>
    <author fullname="J. Drake" initials="J." surname="Drake"/>
    <author fullname="Q. Wu" initials="Q." surname="Wu"/>
    <date month="March" year="2019"/>
    <abstract>
      <t>In certain networks, such as, but not limited to, financial information networks (e.g., stock market data providers), network-performance criteria (e.g., latency) are becoming as critical to data-path selection as other metrics.</t>
      <t>This document describes extensions to IS-IS Traffic Engineering Extensions (RFC 5305). These extensions provide a way to distribute and collect network-performance information in a scalable fashion. The information distributed using IS-IS TE Metric Extensions can then be used to make path-selection decisions based on network performance.</t>
      <t>Note that this document only covers the mechanisms with which network-performance information is distributed. The mechanisms for measuring network performance or acting on that information, once distributed, are outside the scope of this document.</t>
      <t>This document obsoletes RFC 7810.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8570"/>
  <seriesInfo name="DOI" value="10.17487/RFC8570"/>
</reference>
<reference anchor="RFC8232">
  <front>
    <title>Optimizations of Label Switched Path State Synchronization Procedures for a Stateful PCE</title>
    <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
    <author fullname="I. Minei" initials="I." surname="Minei"/>
    <author fullname="J. Medved" initials="J." surname="Medved"/>
    <author fullname="R. Varga" initials="R." surname="Varga"/>
    <author fullname="X. Zhang" initials="X." surname="Zhang"/>
    <author fullname="D. Dhody" initials="D." surname="Dhody"/>
    <date month="September" year="2017"/>
    <abstract>
      <t>A stateful Path Computation Element (PCE) has access to not only the information disseminated by the network's Interior Gateway Protocol (IGP) but also the set of active paths and their reserved resources for its computation. The additional Label Switched Path (LSP) state information allows the PCE to compute constrained paths while considering individual LSPs and their interactions. This requires a State Synchronization mechanism between the PCE and the network, the PCE and Path Computation Clients (PCCs), and cooperating PCEs. The basic mechanism for State Synchronization is part of the stateful PCE specification. This document presents motivations for optimizations to the base State Synchronization procedure and specifies the required Path Computation Element Communication Protocol (PCEP) extensions.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8232"/>
  <seriesInfo name="DOI" value="10.17487/RFC8232"/>
</reference>
<reference anchor="RFC7271">
  <front>
    <title>MPLS Transport Profile (MPLS-TP) Linear Protection to Match the Operational Expectations of Synchronous Digital Hierarchy, Optical Transport Network, and Ethernet Transport Network Operators</title>
    <author fullname="J. Ryoo" initials="J." role="editor" surname="Ryoo"/>
    <author fullname="E. Gray" initials="E." role="editor" surname="Gray"/>
    <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
    <author fullname="A. D'Alessandro" initials="A." surname="D'Alessandro"/>
    <author fullname="T. Cheung" initials="T." surname="Cheung"/>
    <author fullname="E. Osborne" initials="E." surname="Osborne"/>
    <date month="June" year="2014"/>
    <abstract>
      <t>This document describes alternate mechanisms to perform some of the functions of MPLS Transport Profile (MPLS-TP) linear protection defined in RFC 6378, and also defines additional mechanisms. The purpose of these alternate and additional mechanisms is to provide operator control and experience that more closely models the behavior of linear protection seen in other transport networks.</t>
      <t>This document also introduces capabilities and modes for linear protection. A capability is an individual behavior, and a mode is a particular combination of capabilities. Two modes are defined in this document: Protection State Coordination (PSC) mode and Automatic Protection Switching (APS) mode.</t>
      <t>This document describes the behavior of the PSC protocol including priority logic and state machine when all the capabilities associated with the APS mode are enabled.</t>
      <t>This document updates RFC 6378 in that the capability advertisement method defined here is an addition to that document.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7271"/>
  <seriesInfo name="DOI" value="10.17487/RFC7271"/>
</reference>
<reference anchor="RFC8234">
  <front>
    <title>Updates to MPLS Transport Profile (MPLS-TP) Linear Protection in Automatic Protection Switching (APS) Mode</title>
    <author fullname="J. Ryoo" initials="J." surname="Ryoo"/>
    <author fullname="T. Cheung" initials="T." surname="Cheung"/>
    <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
    <author fullname="I. Busi" initials="I." surname="Busi"/>
    <author fullname="G. Wen" initials="G." surname="Wen"/>
    <date month="August" year="2017"/>
    <abstract>
      <t>This document contains updates to MPLS Transport Profile (MPLS-TP) linear protection in Automatic Protection Switching (APS) mode defined in RFC 7271. The updates provide rules related to the initialization of the Protection State Coordination (PSC) Control Logic (in which the state machine resides) when operating in APS mode and clarify the operation related to state transition table lookup.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8234"/>
  <seriesInfo name="DOI" value="10.17487/RFC8234"/>
</reference>
<reference anchor="RFC7308">
  <front>
    <title>Extended Administrative Groups in MPLS Traffic Engineering (MPLS-TE)</title>
    <author fullname="E. Osborne" initials="E." surname="Osborne"/>
    <date month="July" year="2014"/>
    <abstract>
      <t>MPLS Traffic Engineering (MPLS-TE) advertises 32 administrative groups (commonly referred to as "colors" or "link colors") using the Administrative Group sub-TLV. This is defined for OSPFv2 (RFC 3630), OSPFv3 (RFC 5329) and IS-IS (RFC 5305).</t>
      <t>This document adds a sub-TLV to the IGP TE extensions, "Extended Administrative Group". This sub-TLV provides for additional administrative groups (link colors) beyond the current limit of 32.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7308"/>
  <seriesInfo name="DOI" value="10.17487/RFC7308"/>
</reference>
<reference anchor="RFC8343">
  <front>
    <title>A YANG Data Model for Interface Management</title>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <date month="March" year="2018"/>
    <abstract>
      <t>This document defines a YANG data model for the management of network interfaces. It is expected that interface-type-specific data models augment the generic interfaces data model defined in this document. The data model includes definitions for configuration and system state (status information and counters for the collection of statistics).</t>
      <t>The YANG data model in this document conforms to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
      <t>This document obsoletes RFC 7223.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8343"/>
  <seriesInfo name="DOI" value="10.17487/RFC8343"/>
</reference>
<reference anchor="RFC8639">
  <front>
    <title>Subscription to YANG Notifications</title>
    <author fullname="E. Voit" initials="E." surname="Voit"/>
    <author fullname="A. Clemm" initials="A." surname="Clemm"/>
    <author fullname="A. Gonzalez Prieto" initials="A." surname="Gonzalez Prieto"/>
    <author fullname="E. Nilsen-Nygaard" initials="E." surname="Nilsen-Nygaard"/>
    <author fullname="A. Tripathy" initials="A." surname="Tripathy"/>
    <date month="September" year="2019"/>
    <abstract>
      <t>This document defines a YANG data model and associated mechanisms enabling subscriber-specific subscriptions to a publisher's event streams. Applying these elements allows a subscriber to request and receive a continuous, customized feed of publisher-generated information.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8639"/>
  <seriesInfo name="DOI" value="10.17487/RFC8639"/>
</reference>
<reference anchor="RFC8641">
  <front>
    <title>Subscription to YANG Notifications for Datastore Updates</title>
    <author fullname="A. Clemm" initials="A." surname="Clemm"/>
    <author fullname="E. Voit" initials="E." surname="Voit"/>
    <date month="September" year="2019"/>
    <abstract>
      <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8641"/>
  <seriesInfo name="DOI" value="10.17487/RFC8641"/>
</reference>
<reference anchor="RFC3688">
  <front>
    <title>The IETF XML Registry</title>
    <author fullname="M. Mealling" initials="M." surname="Mealling"/>
    <date month="January" year="2004"/>
    <abstract>
      <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="81"/>
  <seriesInfo name="RFC" value="3688"/>
  <seriesInfo name="DOI" value="10.17487/RFC3688"/>
</reference>
<reference anchor="RFC6242">
  <front>
    <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
    <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
    <date month="June" year="2011"/>
    <abstract>
      <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6242"/>
  <seriesInfo name="DOI" value="10.17487/RFC6242"/>
</reference>
<reference anchor="RFC8446">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2018"/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8446"/>
  <seriesInfo name="DOI" value="10.17487/RFC8446"/>
</reference>
<reference anchor="RFC8341">
  <front>
    <title>Network Configuration Access Control Model</title>
    <author fullname="A. Bierman" initials="A." surname="Bierman"/>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <date month="March" year="2018"/>
    <abstract>
      <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
      <t>This document obsoletes RFC 6536.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="91"/>
  <seriesInfo name="RFC" value="8341"/>
  <seriesInfo name="DOI" value="10.17487/RFC8341"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC4875">
  <front>
    <title>Extensions to Resource Reservation Protocol - Traffic Engineering (RSVP-TE) for Point-to-Multipoint TE Label Switched Paths (LSPs)</title>
    <author fullname="R. Aggarwal" initials="R." role="editor" surname="Aggarwal"/>
    <author fullname="D. Papadimitriou" initials="D." role="editor" surname="Papadimitriou"/>
    <author fullname="S. Yasukawa" initials="S." role="editor" surname="Yasukawa"/>
    <date month="May" year="2007"/>
    <abstract>
      <t>This document describes extensions to Resource Reservation Protocol - Traffic Engineering (RSVP-TE) for the set up of Traffic Engineered (TE) point-to-multipoint (P2MP) Label Switched Paths (LSPs) in Multi- Protocol Label Switching (MPLS) and Generalized MPLS (GMPLS) networks. The solution relies on RSVP-TE without requiring a multicast routing protocol in the Service Provider core. Protocol elements and procedures for this solution are described.</t>
      <t>There can be various applications for P2MP TE LSPs such as IP multicast. Specification of how such applications will use a P2MP TE LSP is outside the scope of this document. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4875"/>
  <seriesInfo name="DOI" value="10.17487/RFC4875"/>
</reference>
<reference anchor="RFC9256">
  <front>
    <title>Segment Routing Policy Architecture</title>
    <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
    <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
    <author fullname="D. Voyer" initials="D." surname="Voyer"/>
    <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
    <author fullname="P. Mattes" initials="P." surname="Mattes"/>
    <date month="July" year="2022"/>
    <abstract>
      <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
      <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9256"/>
  <seriesInfo name="DOI" value="10.17487/RFC9256"/>
</reference>
<reference anchor="RFC4874">
  <front>
    <title>Exclude Routes - Extension to Resource ReserVation Protocol-Traffic Engineering (RSVP-TE)</title>
    <author fullname="CY. Lee" initials="CY." surname="Lee"/>
    <author fullname="A. Farrel" initials="A." surname="Farrel"/>
    <author fullname="S. De Cnodder" initials="S." surname="De Cnodder"/>
    <date month="April" year="2007"/>
    <abstract>
      <t>This document specifies ways to communicate route exclusions during path setup using Resource ReserVation Protocol-Traffic Engineering (RSVP-TE).</t>
      <t>The RSVP-TE specification, "RSVP-TE: Extensions to RSVP for LSP Tunnels" (RFC 3209) and GMPLS extensions to RSVP-TE, "Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) Extensions" (RFC 3473) allow abstract nodes and resources to be explicitly included in a path setup, but not to be explicitly excluded.</t>
      <t>In some networks where precise explicit paths are not computed at the head end, it may be useful to specify and signal abstract nodes and resources that are to be explicitly excluded from routes. These exclusions may apply to the whole path, or to parts of a path between two abstract nodes specified in an explicit path. How Shared Risk Link Groups (SRLGs) can be excluded is also specified in this document. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4874"/>
  <seriesInfo name="DOI" value="10.17487/RFC4874"/>
</reference>
<reference anchor="RFC3945">
  <front>
    <title>Generalized Multi-Protocol Label Switching (GMPLS) Architecture</title>
    <author fullname="E. Mannie" initials="E." role="editor" surname="Mannie"/>
    <date month="October" year="2004"/>
    <abstract>
      <t>Future data and transmission networks will consist of elements such as routers, switches, Dense Wavelength Division Multiplexing (DWDM) systems, Add-Drop Multiplexors (ADMs), photonic cross-connects (PXCs), optical cross-connects (OXCs), etc. that will use Generalized Multi-Protocol Label Switching (GMPLS) to dynamically provision resources and to provide network survivability using protection and restoration techniques.</t>
      <t>This document describes the architecture of GMPLS. GMPLS extends MPLS to encompass time-division (e.g., SONET/SDH, PDH, G.709), wavelength (lambdas), and spatial switching (e.g., incoming port or fiber to outgoing port or fiber). The focus of GMPLS is on the control plane of these various layers since each of them can use physically diverse data or forwarding planes. The intention is to cover both the signaling and the routing part of that control plane. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3945"/>
  <seriesInfo name="DOI" value="10.17487/RFC3945"/>
</reference>
<reference anchor="rfc3473">
  <front>
    <title>Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) Extensions</title>
    <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
    <date month="January" year="2003"/>
    <abstract>
      <t>This document describes extensions to Multi-Protocol Label Switching (MPLS) Resource ReserVation Protocol - Traffic Engineering (RSVP-TE) signaling required to support Generalized MPLS. Generalized MPLS extends the MPLS control plane to encompass time-division (e.g., Synchronous Optical Network and Synchronous Digital Hierarchy, SONET/SDH), wavelength (optical lambdas) and spatial switching (e.g., incoming port or fiber to outgoing port or fiber). This document presents a RSVP-TE specific description of the extensions. A generic functional description can be found in separate documents. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3473"/>
  <seriesInfo name="DOI" value="10.17487/RFC3473"/>
</reference>
<reference anchor="RFC4427">
  <front>
    <title>Recovery (Protection and Restoration) Terminology for Generalized Multi-Protocol Label Switching (GMPLS)</title>
    <author fullname="E. Mannie" initials="E." role="editor" surname="Mannie"/>
    <author fullname="D. Papadimitriou" initials="D." role="editor" surname="Papadimitriou"/>
    <date month="March" year="2006"/>
    <abstract>
      <t>This document defines a common terminology for Generalized Multi-Protocol Label Switching (GMPLS)-based recovery mechanisms (i.e., protection and restoration). The terminology is independent of the underlying transport technologies covered by GMPLS. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4427"/>
  <seriesInfo name="DOI" value="10.17487/RFC4427"/>
</reference>



    </references>

</references>


<?line 3698?>

<section anchor="AppendixA"><name>Data Tree Examples</name>

<t>This section contains examples of use of the model with RESTCONF <xref target="RFC8040"/> and JSON encoding.</t>

<t>For the example we will use a 4-node MPLS network were RSVP-TE MPLS Tunnels can be setup. The
loopbacks of each router are shown. The network in <xref target="AppFig-Topo"/> will be used in the examples
described in the following sections.</t>

<figure title="TE network used in data tree examples" anchor="AppFig-Topo"><artwork><![CDATA[
 192.0.2.1        192.0.2.2      192.0.2.4
 +-------+        +-------+      +-------+
 |       |        |       |      |       |
 |   A   +--------+   B   +------+   D   |
 +---+---+        +-------+      +---+---+
     |                               |
     |            +-------+          |
     |            |       |          |
     +------------+   C   +----------+
                  |       |
                  +-------+
                  192.0.2.3
]]></artwork></figure>

<section anchor="TeTunnel"><name>Basic Tunnel Setup</name>

<t>This example uses the TE Tunnel YANG data model defined in this document to create an
RSVP-TE signaled Tunnel of packet LSP encoding type. First, the TE Tunnel is created with no specific restrictions or constraints (e.g., protection or restoration).
The TE Tunnel ingresses on router A and egresses on router D.</t>

<t>In this case, the TE Tunnel is created without specifying additional information about the primary paths.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/tunnels HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_2",
      "admin-state": "ietf-te-types:tunnel-admin-state-up",
      "encoding": "ietf-te-types:lsp-encoding-packet",
      "source": {
        "te-node-id": "192.0.2.1"
      },
      "destination": {
        "te-node-id": "192.0.2.4"
      },
      "bidirectional": false,
      "signaling-type": "ietf-te-types:path-setup-rsvp"
    }
  ]
}

{
  "ietf-te:tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_2 (IPv6)",
      "admin-state": "ietf-te-types:tunnel-admin-state-up",
      "encoding": "ietf-te-types:lsp-encoding-packet",
      "source": {
        "te-node-id": "2001:db8::1"
      },
      "destination": {
        "te-node-id": "2001:db8::4"
      },
      "bidirectional": false,
      "signaling-type": "ietf-te-types:path-setup-rsvp"
    }
  ]
}

]]></artwork></figure>

</section>
<section anchor="global-named-path-constraints"><name>Global Named Path Constraints</name>

<t>This example uses the YANG data model to create a 'named path constraint' that can be referenced by TE Tunnels.
The path constraint, in this case, limits the TE Tunnel hops for the computed path.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/globals/named-path-constraints
     HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:named-path-constraint": [
    {
      "name": "max-hop-3",
      "path-metric-bounds": {
        "path-metric-bound": [
          {
            "metric-type": "ietf-te-types:path-metric-hop",
            "upper-bound": "3"
          }
        ]
      }
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="tunnel-with-global-path-constraint"><name>Tunnel with Global Path Constraint</name>

<t>In this example, the previously created 'named path constraint' is applied to the TE Tunnel created in <xref target="TeTunnel"/>.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/tunnels HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_4_1",
      "description": "Simple_LSP_with_named_path",
      "admin-state": "ietf-te-types:tunnel-admin-state-up",
      "encoding": "ietf-te-types:lsp-encoding-packet",
      "source": {
        "te-node-id": "192.0.2.1"
      },
      "destination": {
        "te-node-id": "192.0.2.4"
      },
      "signaling-type": "ietf-te-types:path-setup-rsvp",
      "primary-paths": {
        "primary-path": [
          {
            "name": "Simple_LSP_1",
            "use-path-computation": true,
            "path-scope": "ietf-te-types:path-scope-end-to-end",
            "named-path-constraint": "max-hop-3"
          }
        ]
      }
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="tunnel-with-per-tunnel-path-constraint"><name>Tunnel with Per-tunnel Path Constraint</name>

<t>In this example, the a per-tunnel path constraint is explicitly indicated under the TE Tunnel created in <xref target="TeTunnel"/> to constrain the computed path for the tunnel.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/tunnels HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_4_2",
      "admin-state": "ietf-te-types:tunnel-admin-state-up",
      "encoding": "ietf-te-types:lsp-encoding-packet",
      "source": {
        "te-node-id": "192.0.2.1"
      },
      "destination": {
        "te-node-id": "192.0.2.4"
      },
      "bidirectional": false,
      "signaling-type": "ietf-te-types:path-setup-rsvp",
      "primary-paths": {
        "primary-path": [
          {
            "name": "path1",
            "path-scope": "ietf-te-types:path-scope-end-to-end",
            "path-metric-bounds": {
              "path-metric-bound": [
                {
                  "metric-type": "ietf-te-types:path-metric-hop",
                  "upper-bound": "3"
                }
              ]
            }
          }
        ]
      }
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="tunnel-state"><name>Tunnel State</name>

<t>In this example, the 'GET' query is sent to return the state stored about the tunnel.</t>

<figure><artwork><![CDATA[
GET  /restconf/data/ietf-te:te/tunnels +
     /tunnel="Example_LSP_Tunnel_A_4_1"
     /primary-paths/ HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
]]></artwork></figure>

<t>The request, with status code 200 would include, for example, the following json:</t>

<figure><artwork><![CDATA[
{
  "ietf-te:primary-path": [
    {
      "name": "path1",
      "path-computation-method": "ietf-te-types:path-locally-computed",
      "path-scope": "ietf-te-types:path-scope-end-to-end",
      "computed-paths-properties": {
        "computed-path-properties": [
          {
            "k-index": 1,
            "path-properties": {
              "path-route-objects": {
                "path-route-object": [
                  {
                    "index": 1,
                    "numbered-node-hop": {
                      "node-id": "192.0.2.2",
                      "hop-type": "strict"
                    }
                  },
                  {
                    "index": 2,
                    "numbered-node-hop": {
                      "node-id": "192.0.2.4",
                      "hop-type": "strict"
                    }
                  }
                ]
              }
            }
          }
        ]
      },
      "lsps": {
        "lsp": [
          {
            "node": "192.0.2.1",
            "lsp-id": 25356,
            "tunnel-name": "Example_LSP_Tunnel_A_4_1"
          }
        ]
      }
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="example-te-tunnel-with-primary-and-secondary-paths"><name>Example TE Tunnel with Primary and Secondary Paths</name>

<figure title="TE network used in data tree examples" anchor="AppFig-Topo2"><artwork><![CDATA[
                       +----------+          +----------+
                     +-|192.0.2.9 |---+      |192.0.2.10|
                     | +----------+   |      +----------+
                     |                |          |   |
+----------+    +----------+     +----------+    |   |
|192.0.2.8 |----|192.0.2.3 |-----|192.0.2.4 |----+   |
+----------+    +----------+     +----------+        |
  |                  |                |              |
+----------+         |                |              |
|192.0.2.1 |---------+                |           +----------+
+----------+                          +-----------|192.0.2.5 |
      |  |                                        +----------+
      |  |              +----------+                     | |
      |  +--------------|192.0.2.2 |---------------------+ |
      |                 +----------+                       |
      |                       | |                          |
  +----------+                | |                   +----------+
  |192.0.2.6 |----------------+ +-------------------|192.0.2.7 |
  +----------+                                      +----------+

]]></artwork></figure>

<t>Below is the state retrieved for a TE tunnel from source 192.0.2.1 to 192.0.2.5
with primary, secondary, reverse, and secondary reverse paths as shown in <xref target="AppFig-Topo2"/>.</t>

<figure><artwork><![CDATA[
{
  "ietf-te:te": {
    "tunnels": {
      "tunnel": [
        {
          "name": "example-1",
          "description": "Example in slide 1",
          "source": {
            "te-node-id": "192.0.2.1"
          },
          "destination": {
            "te-node-id": "192.0.2.5"
          },
          "bidirectional": true,
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-1 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": false,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "name": "primary-2 (rev)",
                  "path-scope": "ietf-te-types:path-scope-end-to-end",
                  "explicit-route-objects": {
                    "route-object-include-exclude": [
                      {
                        "index": 1,
                        "explicit-route-usage":
                        "ietf-te-types:route-include-object",
                        "numbered-node-hop": {
                          "node-id": "192.0.2.3",
                          "hop-type": "loose"
                        }
                      }
                    ]
                  },
                  "candidate-secondary-reverse-paths": {
                    "candidate-secondary-reverse-path": [
                      {
                        "secondary-reverse-path": "secondary-3 (rev)"
                      },
                      {
                        "secondary-reverse-path": "secondary-4 (rev)"
                      },
                      {
                        "secondary-reverse-path": "secondary-5 (rev)"
                      }
                    ]
                  }
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-1 (fwd)"
                    },
                    {
                      "secondary-path": "secondary-2 (fwd)"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-1 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-2 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage": 
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          },
          "secondary-reverse-paths": {
            "secondary-reverse-path": [
              {
                "name": "secondary-3 (rev)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.4",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-4 (rev)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.4"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.3",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-5 (rev)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.3"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          }
        },
        {
          "name": "example-3",
          "description": "Example in slide 3",
          "source": {
            "te-node-id": "192.0.2.1"
          },
          "destination": {
            "te-node-id": "192.0.2.5"
          },
          "bidirectional": true,
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-1 (bidir)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "path-scope": "ietf-te-types:path-scope-end-to-end"
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-1 (bidir)"
                    },
                    {
                      "secondary-path": "secondary-2 (bidir)"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-1 (bidir)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-2 (bidir)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          }
        },
        {
          "name": "example-4",
          "description": "Example in slide 4",
          "source": {
            "te-node-id": "192.0.2.1"
          },
          "destination": {
            "te-node-id": "192.0.2.5"
          },
          "bidirectional": true,
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-1 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "name": "primary-2 (rev)",
                  "path-scope": "ietf-te-types:path-scope-end-to-end",
                  "candidate-secondary-reverse-paths": {
                    "candidate-secondary-reverse-path": [
                      {
                        "secondary-reverse-path": "secondary-3 (rev)"
                      },
                      {
                        "secondary-reverse-path": "secondary-4 (rev)"
                      }
                    ]
                  }
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-1 (fwd)"
                    },
                    {
                      "secondary-path": "secondary-2 (fwd)"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-1 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-2 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          },
          "secondary-reverse-paths": {
            "secondary-reverse-path": [
              {
                "name": "secondary-3 (rev)",
                "path-scope": "ietf-te-types:path-scope-end-to-end"
              },
              {
                "name": "secondary-4 (rev)",
                "path-scope": "ietf-te-types:path-scope-end-to-end"
              }
            ]
          }
        }
      ]
    }
  }
}
]]></artwork></figure>

</section>
<section anchor="example-multi-domain-te-tunnel-with-primary-and-secondary-paths"><name>Example Multi-domain TE Tunnel with Primary and Secondary Paths</name>

<figure title="TE network used in the multi-domain TE Tunnel example" anchor="AppFig-Topo3"><artwork><![CDATA[
                            XXXXXXX
                         XXX       XXX
                       XX             XX
                     X                  X
                     X    Domain 2      X
            XXXXXXX   X                X    XXXXXXXX
         XXX    +-----------+    +-----------+      XXX
       XX       | 192.0.2.1 |    | 192.0.2.2 |         XX
      X         +-----------+    +-----------+           X
      X                 X   XXXXXX    X                  X
+-----------+           X             X             +-----------+
|192.0.2.100| Domain 1  X             X   Domain 3  |192.0.2.200|
+-----------+           X   XXXXXX    X             +-----------+
      X         +-----------+    +-----------+           X
      X         | 192.0.2.3 |    | 192.0.2.4 |          X
       XX       +-----------+    +-----------+        XX
         XXX       X  X                  XXX       XXX
            XXXXXXX  X                    X  XXXXXXX
                     X                    X
                     X    Domain 4        X
                       XX             XX
                         XXX       XXX
                            XXXXXXX

]]></artwork></figure>

<t>The following state is retrieved for a multi-domain TE tunnel, where both the
primary and secondary paths consist of TE tunnel segments, as shown in <xref target="AppFig-Topo3"/>.
In each domain, a TE tunnel segment is established to form the complete end-to-end TE path.
The nodes (192.0.2.100) and (192.0.2.200) form the multi-domain end-to-end source and destination
respectively. The nodes (192.0.2.1), (192.0.2.2), (192.0.2.3), and (192.0.2.4) act as domain
border nodes and transit nodes for the end-to-end TE tunnel LSPs.</t>

<figure><artwork><![CDATA[
{
  "ietf-te:te": {
    "tunnels": {
      "tunnel": [
        {
          "name": "Example_Head_End_Tunnel_Segment",
          "admin-state": "ietf-te-types:tunnel-admin-state-up",
          "encoding": "ietf-te-types:lsp-encoding-packet",
          "source": {
            "te-node-id": "192.0.2.100"
          },
          "bidirectional": true,
          "signaling-type": "ietf-te-types:path-setup-rsvp",
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-path-1",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.1"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "path-scope": "ietf-te-types:path-scope-end-to-end"
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-path-1"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-path-1",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.3"
                      }
                    }
                  ]
                }
              }
            ]
          }
        },
        {
          "name": "Example_Primary_Transit_Tunnel_Segment",
          "admin-state": "ietf-te-types:tunnel-admin-state-up",
          "encoding": "ietf-te-types:lsp-encoding-packet",
          "bidirectional": true,
          "signaling-type": "ietf-te-types:path-setup-rsvp",
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-path-2",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.2"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "path-scope": "ietf-te-types:path-scope-end-to-end"
                }
              }
            ]
          }
        },
        {
          "name": "Example_Secondary_Transit_Tunnel_Segment",
          "admin-state": "ietf-te-types:tunnel-admin-state-up",
          "encoding": "ietf-te-types:lsp-encoding-packet",
          "bidirectional": true,
          "signaling-type": "ietf-te-types:path-setup-rsvp",
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-path-4",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "primary-reverse-path": {
                  "path-scope": "ietf-te-types:path-scope-end-to-end"
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-path-4"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-path-4",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.3"
                      }
                    },
                    {
                      "index": 2,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.4"
                      }
                    }
                  ]
                }
              }
            ]
          }
        },
        {
          "name": "Example_Tail_End_Tunnel_Segment",
          "admin-state": "ietf-te-types:tunnel-admin-state-up",
          "encoding": "ietf-te-types:lsp-encoding-packet",
          "destination": {
            "te-node-id": "192.0.2.200"
          },
          "bidirectional": true,
          "signaling-type": "ietf-te-types:path-setup-rsvp",
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-path-3",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.2"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "path-scope": "ietf-te-types:path-scope-end-to-end"
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-path-3"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-path-3",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.4"
                      }
                    }
                  ]
                }
              }
            ]
          }
        }
      ]
    }
  }
}
]]></artwork></figure>

</section>
</section>
<section anchor="AppendixB"><name>Full Model Tree Diagram</name>

<t>The full tree diagram of the TE YANG data model defined in
module 'ietf-te' is shown below.</t>

<figure><artwork><![CDATA[
module: ietf-te
  +--rw te
     +--rw enable?    boolean
     +--rw globals
     |  +--rw named-admin-groups
     |  |  +--rw named-admin-group* [name]
     |  |          {te-types:extended-admin-groups,
     |  |           te-types:named-extended-admin-groups}?
     |  |     +--rw name            string
     |  |     +--rw bit-position?   uint32
     |  +--rw named-srlgs
     |  |  +--rw named-srlg* [name] {te-types:named-srlg-groups}?
     |  |     +--rw name     string
     |  |     +--rw value?   te-types:srlg
     |  |     +--rw cost?    uint32
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
     |             {te-types:named-path-constraints}?
     |        +--rw name                       string
     |        +---u path-constraints-common
     +--rw tunnels
     |  +--rw tunnel* [name]
     |     +--rw name                                    string
     |     +--rw alias?                                  string
     |     +--rw identifier?                             uint32
     |     +--rw color?                                  uint32
     |     +--rw description?                            string
     |     +--rw admin-state?                            identityref
     |     +--ro operational-state?                      identityref
     |     +--rw state-change-timestamp?
     |     |       yang:date-and-time
     |     +---u te-types:encoding-and-switching-type
     |     +---u tunnel-common-attributes
     |     +--rw controller
     |     |  +--rw protocol-origin?        identityref
     |     |  +--rw controller-entity-id?   string
     |     +--rw reoptimize-timer?                       uint16
     |     +---u tunnel-associations-properties
     |     +---u protection-restoration-properties
     |     +---u te-types:tunnel-constraints
     |     +---u tunnel-hierarchy-properties
     |     +--rw primary-paths
     |     |  +--rw primary-path* [name]
     |     |     +--ro active?                      boolean
     |     |     +---u path-common-properties
     |     |     +---u path-forward-properties
     |     |     +---u k-requested-paths
     |     |     +---u path-compute-info
     |     |     +---u path-state
     |     |     +--rw primary-reverse-path
     |     |     |  +---u path-common-properties
     |     |     |  +---u path-compute-info
     |     |     |  +---u path-state
     |     |     |  +--rw candidate-secondary-reverse-paths
     |     |     |     +--rw candidate-secondary-reverse-path*
     |     |     |             [secondary-reverse-path]
     |     |     |        +--rw secondary-reverse-path    leafref
     |     |     |        +--ro active?                   boolean
     |     |     +--rw candidate-secondary-paths
     |     |        +--rw candidate-secondary-path* [secondary-path]
     |     |           +--rw secondary-path    leafref
     |     |           +--ro active?           boolean
     |     +--rw secondary-paths
     |     |  +--rw secondary-path* [name]
     |     |     +---u path-common-properties
     |     |     +--rw preference?                          uint8
     |     |     +--rw secondary-reverse-path?              leafref
     |     |     +---u path-compute-info
     |     |     +---u protection-restoration-properties
     |     |     +---u path-state
     |     +--rw secondary-reverse-paths
     |     |  +--rw secondary-reverse-path* [name]
     |     |     +---u path-common-properties
     |     |     +--rw preference?                          uint8
     |     |     +---u path-compute-info
     |     |     +---u protection-restoration-properties
     |     |     +---u path-state
     |     +---x tunnel-action
     |     |  +---w input
     |     |  |  +---w action-type?   identityref
     |     |  +--ro output
     |     |     +--ro action-result?   identityref
     |     +---x protection-external-commands
     |        +---w input
     |           +---w protection-external-command?   identityref
     |           +---w ingress-node?                  boolean
     |           +---w egress-node?                   boolean
     |           +---w path-name?                     string
     |           +---w path-type?
     |           |       te-types:path-type
     |           +---w traffic-type?                  enumeration
     |           +---w extra-traffic-tunnel-ref?      tunnel-ref
     +--ro lsps
        +--ro lsp* [tunnel-name lsp-id node]
           +--ro tunnel-name                     string
           +--ro lsp-id                          uint16
           +--ro node                            te-types:te-node-id
           +--ro source?                         te-types:te-node-id
           +--ro destination?                    te-types:te-node-id
           +--ro tunnel-id?                      uint16
           +--ro extended-tunnel-id?             yang:dotted-quad
           +--ro operational-state?              identityref
           +--ro signaling-type?                 identityref
           +--ro origin-type?                    enumeration
           +--ro lsp-resource-status?            enumeration
           +--ro lockout-of-normal?              boolean
           +--ro freeze?                         boolean
           +--ro lsp-protection-role?            enumeration
           +--ro lsp-protection-state?           identityref
           +--ro ingress-node-id?                te-types:te-node-id
           +--ro egress-node-id?                 te-types:te-node-id
           +--ro lsp-actual-route-information
              +--ro lsp-actual-route-information* [index]
                 +---u te-types:record-route-state

  rpcs:
    +---x tunnels-path-compute
    |  +---w input
    |  |  +---w path-compute-info
    |  +--ro output
    |     +--ro path-compute-result
    +---x tunnels-actions
       +---w input
       |  +---w tunnel-info
       |  |  +---w (filter-type)
       |  |     +--:(all-tunnels)
       |  |     |  +---w all       empty
       |  |     +--:(one-tunnel)
       |  |        +---w tunnel?   tunnel-ref
       |  +---w action-info
       |     +---w action?       identityref
       |     +---w disruptive?   empty
       +--ro output
          +--ro action-result?   identityref

  grouping path-common-properties:
    +-- name?                      string
    +-- path-computation-method?   identityref
    +-- path-computation-server
    |  +---u te-types:te-generic-node-id
    +-- compute-only?              empty
    +-- use-path-computation?      boolean
    +-- lockdown?                  empty
    +--ro path-scope?                identityref
  grouping path-compute-info:
    +---u tunnel-associations-properties
    +---u te-types:generic-path-optimization
    +-- named-path-constraint?                leafref
    |       {te-types:named-path-constraints}?
    +---u path-constraints-common
  grouping path-forward-properties:
    +-- preference?   uint8
    +-- co-routed?    boolean
  grouping k-requested-paths:
    +-- k-requested-paths?   uint8
  grouping path-state:
    +---u path-computation-response
    +--ro lsp-provisioning-error-infos
    |  +--ro lsp-provisioning-error-info* []
    |     +--ro error-reason?        identityref
    |     +--ro error-description?   string
    |     +--ro error-timestamp?     yang:date-and-time
    |     +--ro error-node-id?       te-types:te-node-id
    |     +--ro error-link-id?       te-types:te-tp-id
    |     +--ro lsp-id?              uint16
    +--ro lsps
       +--ro lsp* [node lsp-id]
          +--ro tunnel-name?              -> /te/lsps/lsp/tunnel-name
          +--ro node?                     leafref
          +--ro lsp-id?                   leafref
          +--ro state-change-timestamp?   yang:date-and-time
  grouping path-computation-response:
    +--ro computed-paths-properties
    |  +--ro computed-path-properties* [k-index]
    |     +--ro k-index?                            uint8
    |     +---u te-types:generic-path-properties
    +--ro computed-path-error-infos
       +--ro computed-path-error-info* []
          +--ro error-description?   string
          +--ro error-timestamp?     yang:date-and-time
          +--ro error-reason?        identityref
  grouping protection-restoration-properties:
    +-- protection
    |  +-- protection-type?                identityref
    |  +-- protection-reversion-disable?   boolean
    |  +-- hold-off-time?                  uint32
    |  +-- wait-to-revert?                 uint16
    |  +-- aps-signal-id?                  uint8
    +-- restoration
       +-- restoration-type?                identityref
       +-- restoration-scheme?              identityref
       +-- restoration-reversion-disable?   boolean
       +-- hold-off-time?                   uint32
       +-- wait-to-restore?                 uint16
       +-- wait-to-revert?                  uint16
  grouping tunnel-associations-properties:
    +-- association-objects
       +-- association-object* [association-key]
       |  +-- association-key?   string
       |  +-- type?              identityref
       |  +-- id?                uint16
       |  +-- source
       |     +---u te-types:te-generic-node-id
       +-- association-object-extended* [association-key]
          +-- association-key?   string
          +-- type?              identityref
          +-- id?                uint16
          +-- source
          |  +---u te-types:te-generic-node-id
          +-- global-source?     uint32
          +-- extended-id?       yang:hex-string
  grouping tunnel-end-point:
    +-- node-id?        nw:node-id
    +-- te-node-id?     te-types:te-node-id
    +-- tunnel-tp-id?   binary
  grouping tunnel-common-attributes:
    +-- source
    |  +---u tunnel-end-point
    +-- destination
    |  +---u tunnel-end-point
    +-- bidirectional?   boolean
  grouping tunnel-hierarchy-properties:
    +-- hierarchy
       +-- dependency-tunnels
       |  +-- dependency-tunnel* [name]
       |     +-- name?                                   tunnel-ref
       |     +---u te-types:encoding-and-switching-type
       +-- hierarchical-link
          +-- enable?                            boolean
          +-- local-node-id?                     nw:node-id
          +-- local-te-node-id?                  te-types:te-node-id
          +-- local-link-tp-id?                  nt:tp-id
          +-- local-te-link-tp-id?               te-types:te-tp-id
          +-- remote-node-id?                    nw:node-id
          +-- remote-link-tp-id?                 nt:tp-id
          +-- remote-te-link-tp-id?              te-types:te-tp-id
          +-- remote-te-node-id?                 te-types:te-node-id
          +--ro link-id?                           nt:link-id
          +-- network-id?                        nw:network-id
          +---u te-types:te-topology-identifier
  grouping path-constraints-common:
    +---u te-types:common-path-constraints-attributes
    +---u te-types:generic-path-disjointness
    +---u te-types:path-constraints-route-objects
    +-- path-in-segment!
    |  +---u te-types:label-set-info
    +-- path-out-segment!
       +---u te-types:label-set-info
]]></artwork></figure>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

