<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" submissionType="IETF" docName="draft-uttaro-idr-bgp-oad-00" category="std" ipr="trust200902" obsoletes="" updates="" xml:lang="en" symRefs="true" sortRefs="false" tocInclude="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <!-- Generated by id2xml 1.5.0 on 2023-03-10T21:56:41Z -->
	<front>
    <title abbrev="One Administrative Domain">One Administrative Domain using BGP</title>
    <seriesInfo name="Internet-Draft" value="draft-uttaro-idr-bgp-oad-00"/>
    <author fullname="Jim Uttaro" initials="J." surname="Uttaro">
      <organization>AT&amp;T</organization>
      <address>
        <email>ju1738@att.com</email>
      </address>
    </author>
    <author fullname="Avinash Lingala" initials="A." surname="Lingala">
      <organization>AT&amp;T</organization>
      <address>
        <email>ar977m@att.com</email>
      </address>
    </author>
    <author fullname="Keyur Patel" initials="K." surname="Patel">
      <organization>Arrcus, Inc.</organization>
      <address>
        <email>keyur@arrcus.com</email>
      </address>
    </author>
      <author fullname="Dhananjaya Rao" initials="D." surname="Rao">
        <organization>Cisco Systems</organization>
        <address>
          <email>dhrao@cisco.com</email>
        </address>
      </author>
    <author fullname="Bin Wen" initials="B." surname="Wen">
      <organization>Comcast</organization>
      <address>
        <email>bin_wen@comcast.com</email>
      </address>
    </author>
    <author fullname="Alvaro Retana" initials="A." surname="Retana">
      <organization>Futurewei Technologies, Inc.</organization>
      <address>
        <email>alvaro.retana@futurewei.com</email>
      </address>
    </author>
    <author fullname="Srihari Sangli" initials="S." surname="Sangli">
      <organization>Juniper Networks</organization>
      <address>
        <email>ssangli@juniper.net</email>
      </address>
    </author>
    <author fullname="Pradosh Mohapatra" initials="P." surname="Mohapatra">
      <organization>Sproute Networks</organization>
      <address>
        <email>pradosh@sproute.com</email>
      </address>
    </author>

    <date year="2023" month="March" day="10"/>
    <workgroup>Inter-Domain Routing</workgroup>
    <abstract>
      <t>
   This document defines a new External BGP (EBGP) peering type known as
   EBGP-OAD.  EBGP-OAD peering is used between two EBGP peers that
   belong to One Administrative Domain (OAD).</t>
    </abstract>
  </front>
  <middle>
    <section anchor="sect-1" numbered="true" toc="default">
      <name>Introduction</name>
      <t>
   At each EBGP boundary, BGP path attributes are modified as per
   standard BGP rules <xref target="RFC4271" format="default"/>.  This includes prepending the AS_PATH
   attribute with the autonomous-system number of the BGP speaker and
   stripping any IBGP-only attributes.</t>
      <t>
   Some networks span more than one autonomous system and require more
   flexibility in the propagation of path attributes.  These networks
   are said to belong to One Administrative Domain (OAD).  It is
   desirable to carry IBGP-only attributes across EBGP peering when the
   peers belong to OAD.  This document defines a new EBGP peering type
   known as EBGP-OAD.  EBGP-OAD peering is used between two EBGP peers
   that belong to OAD.  This document also defines rules for route
   announcement and processing for EBGP-OAD peers.</t>
      <section anchor="sect-1.1" numbered="true" toc="default">
        <name>Requirements Language</name>
        <t>
   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in BCP
   14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all
   capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="sect-2" numbered="true" toc="default">
      <name>Discussion</name>
      <t>
   Networks have traditionally been demarcated by an autonomous system/
   BGP border which correlates to an administrative boundary.  This
   paradigm no longer serves the needs of network designers or customers
   due to the decoupling of IGP from BGP, BGP-free core in the underlay
   (e.g. using BGP labeled unicast <xref target="RFC8277" format="default"/>), the use of BGP to
   facilitate multiple service overlays (e.g., L2VPN, L3VPN, etc.)
   spanning multiple regions and AS domains, and the instantiation of
   customer sites on multiple content service providers (CSPs).</t>
      <t>
   For example, sites in a BGP/MPLS VPN <xref target="RFC4364" format="default"/> may be distributed
   across different AS domains.  In some cases, the administrator of the
   VPN may prefer that some attributes are propagated to all their sites
   to influence the BGP decision process.  An example could be
   LOCAL_PREF which is ignored if received on an EBGP session <xref target="RFC4271" format="default"/>.</t>
    </section>
    <section anchor="sect-3" numbered="true" toc="default">
      <name>Operation</name>
      <t>
   <xref target="RFC4271" format="default"/> defines two types of BGP peerings used during a BGP
   protocol session.  As part of the extensions defined in this
   document, the EBGP peering is divided into two types:</t>
      <ol spacing="normal" type="1"><li>EBGP as defined in <xref target="RFC4271" format="default"/>.</li>
        <li>EBGP-OAD as defined below.</li>
      </ol>
      <t>
   The EBGP-OAD session is a BGP connection between two external peers
   in different Autonomous Systems that belong to OAD.  In general, the
   EBGP-OAD speakers follow the EBGP route advertisement, route
   processing, path attribute announcement and processing rules as
   defined in <xref target="RFC4271" format="default"/>.  However, EBGP-OAD speakers are also allowed to
   announce and receive any IBGP-only or non-transitive attributes that
   were restricted to remain within an Autonomous System <xref target="RFC4271" format="default"/>.</t>
      <t>
   Unless explicitly specified, all path attributes MAY be advertised
   over an EBGP-OAD session.  The reception of any path attribute over
   an EBGP-OAD session MUST NOT result in an error, unless it is
   malformed.  Received path attributes SHOULD NOT be ignored by the
   receiver, unless directed to by local policy.</t>
      <t>
   Unless explicitly specified, the current processes for the
   advertisement of path attributes remains unchanged when advertised
   through an EBGP-OAD peering.  The process for EBGP advertisement MUST
   take priority over the process for IBGP advertisement.  For example,
   the AS_PATH attribute is modified as specified in Section 5.1.2 of
   <xref target="RFC4271" format="default"/>, bullet b ("BGP speaker advertises the route to an external peer").</t>
      <t>
   An EBGP-OAD speaker MUST support four-octet AS numbers and avertize
   the "support for four-octet AS number capability" <xref target="RFC6793" format="default"/> .</t>
      <t>
   The following sections describe modifications to route advertisements
   and path attribute announcements that are specific to the EBGP-OAD
   peering.</t>
      <section anchor="sect-3.1" numbered="true" toc="default">
        <name>Next Hop Handling</name>
        <t>
   It is reasonable for EBGP-OAD peers to share a common Interior
   Gateway Protocol (IGP).  In such a case, NEXT_HOP attribute and the
   Next Hop in the MP_REACH_NLRI attribute <xref target="RFC4760" format="default"/> MAY be left
   unchanged.</t>
      </section>
      <section anchor="sect-3.2" numbered="true" toc="default">
        <name>MULTI_EXIT_DISC (MED) Handling</name>
        <t>
   The determination of the neighboring AS for the purpose of BGP Route
   Selection <xref target="RFC4271" format="default"/> MAY also consider the ASN of the EBGP-OAD peer.
   If so, all the peers in the receiving ASN MUST be configured to use
   the same criteria.</t>
      </section>
      <section anchor="sect-3.3" numbered="true" toc="default">
        <name>Route Reflection</name>
        <t>
   BGP Route Reflection <xref target="RFC4456" format="default"/> is an alternative to full-mesh IBGP.
   The ORIGINATOR_ID and CLUSTER_LIST attributes MUST NOT be advertised
   over an EBGP-OAD session.  If received, the procedures in <xref target="RFC7606" format="default"/>
   apply.</t>
      </section>
    </section>
    <section anchor="sect-4" numbered="true" toc="default">
      <name>Deployment and Operational Considerations</name>
      <t>
   For the EBGP-OAD session to operate as expected, both BGP speakers
   MUST be configured with the same session type.  If only one BGP
   speaker is configured that way, and the other uses an EBGP session,
   the result is that some path attributes may be ignored and others
   will be discarded, but the BGP session will remain operational.</t>
      <t>
   The default BGP peering type for a session that is across autonomous
   systems SHOULD be EBGP.  BGP implementation SHOULD provide a
   configuration-time option to enable the EBGP-OAD session type.  If
   the session type is changed once the BGP connection has been
   established, the BGP speaker MUST readvertise its entire Adj-RIB-Out
   to its peer.  Requesting a route refresh <xref target="RFC7313" format="default"/> is RECOMMENDED.</t>
      <t>
   The requirement that Import and Export Policies exist <xref target="RFC8212" format="default"/>
   SHOULD be disabled if both peers are configured with the EBGP-OAD
   session type.</t>
      <t>
   If multiple peerings exist between two autonomous systems that belong
   to OAD, all SHOULD be configured consistently.  Improper
   configuration may result in inconsistent or unexpected forwarding.
   The inconsistent use of EBGP-OAD sessions is out of scope of this
   document.</t>
      <t>
   BGP Confederations <xref target="RFC5065" format="default"/> provide similar behavior, on a session
   by session basis, as what is specified in this document.  The use of
   confederations with an EBGP-OAD peering is out of scope of this
   document.</t>
      <t>
   The consideration of the ASN of the EBGP-OAD peer to determine the
   neighboring AS for MED comparison <xref target="sect-3.2" format="default"/> may result in the
   creation persistent route oscillations, similar to the Type II Churn
   described in <xref target="RFC3345" format="default"/>.  <xref target="RFC7964" format="default"/> provides solutions and
   recommendations to address this issue.</t>
    </section>
    <section anchor="sect-5" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>
   This memo includes no request to IANA.</t>
    </section>
    <section anchor="sect-6" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>
   This extension to BGP does not change the underlying security issues
   inherent in the existing BGP protocol, such as those described in
   <xref target="RFC4271" format="default"/> and <xref target="RFC4272" format="default"/>.</t>
      <t>
   This document defines a new BGP session type which combines the path
   attribute propagation rules for EBGP and IBGP peering.  Any existing
   security considerations related to existing path attributes apply to
   the new EBGP-OAD session type.</t>
      <t>
   By combining the path attribute propagation rules, IBGP information
   may now be propagated to another autonomous system.  However, it is
   expected that the new session type will only be enabled when peering
   with a router that also belongs to OAD.  If misconfigured, the impact
   is minimal due to the fact that both <xref target="RFC4271" format="default"/> and <xref target="RFC7606" format="default"/> define
   mechanisms to deal with unexpected path attributes.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC4271" target="https://www.rfc-editor.org/info/rfc4271" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4271.xml">
          <front>
            <title>A Border Gateway Protocol 4 (BGP-4)</title>
            <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
            <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
            <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
              <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
              <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
              <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4271"/>
          <seriesInfo name="DOI" value="10.17487/RFC4271"/>
        </reference>
        <reference anchor="RFC4456" target="https://www.rfc-editor.org/info/rfc4456" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4456.xml">
          <front>
            <title>BGP Route Reflection: An Alternative to Full Mesh Internal BGP (IBGP)</title>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <author fullname="E. Chen" initials="E." surname="Chen"/>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>The Border Gateway Protocol (BGP) is an inter-autonomous system routing protocol designed for TCP/IP internets. Typically, all BGP speakers within a single AS must be fully meshed so that any external routing information must be re-distributed to all other routers within that Autonomous System (AS). This represents a serious scaling problem that has been well documented with several alternatives proposed.</t>
              <t>This document describes the use and design of a method known as "route reflection" to alleviate the need for "full mesh" Internal BGP (IBGP).</t>
              <t>This document obsoletes RFC 2796 and RFC 1966. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4456"/>
          <seriesInfo name="DOI" value="10.17487/RFC4456"/>
        </reference>
        <reference anchor="RFC5065" target="https://www.rfc-editor.org/info/rfc5065" xml:base="https://www.rfc-editor.org/refs/bibxml/reference.RFC.5065.xml">
          <front>
            <title>Autonomous System Confederations for BGP</title>
            <author initials="P." surname="Traina" fullname="P. Traina">
              <organization/>
            </author>
            <author initials="D." surname="McPherson" fullname="D. McPherson">
              <organization/>
            </author>
            <author initials="J." surname="Scudder" fullname="J. Scudder">
              <organization/>
            </author>
            <date year="2007" month="August"/>
            <abstract>
              <t>The Border Gateway Protocol (BGP) is an inter-autonomous system routing protocol designed for Transmission Control Protocol/Internet Protocol (TCP/IP) networks.  BGP requires that all BGP speakers within a single autonomous system (AS) must be fully meshed.  This represents a serious scaling problem that has been well documented in a number of proposals.</t>
              <t>This document describes an extension to BGP that may be used to create a confederation of autonomous systems that is represented as a single autonomous system to BGP peers external to the confederation, thereby removing the "full mesh" requirement.  The intention of this extension is to aid in policy administration and reduce the management complexity of maintaining a large autonomous system.</t>
              <t>This document obsoletes RFC 3065.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5065"/>
          <seriesInfo name="DOI" value="10.17487/RFC5065"/>
        </reference>
        <reference anchor="RFC6793" target="https://www.rfc-editor.org/info/rfc6793" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6793.xml">
          <front>
            <title>BGP Support for Four-Octet Autonomous System (AS) Number Space</title>
            <author fullname="Q. Vohra" initials="Q." surname="Vohra"/>
            <author fullname="E. Chen" initials="E." surname="Chen"/>
            <date month="December" year="2012"/>
            <abstract>
              <t>The Autonomous System number is encoded as a two-octet entity in the base BGP specification.  This document describes extensions to BGP to carry the Autonomous System numbers as four-octet entities.  This document obsoletes RFC 4893 and updates RFC 4271. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6793"/>
          <seriesInfo name="DOI" value="10.17487/RFC6793"/>
        </reference>
        <reference anchor="RFC7313" target="https://www.rfc-editor.org/info/rfc7313" xml:base="https://www.rfc-editor.org/refs/bibxml/reference.RFC.7313.xml">
          <front>
            <title>Enhanced Route Refresh Capability for BGP-4</title>
            <author initials="K." surname="Patel" fullname="K. Patel">
              <organization/>
            </author>
            <author initials="E." surname="Chen" fullname="E. Chen">
              <organization/>
            </author>
            <author initials="B." surname="Venkatachalapathy" fullname="B. Venkatachalapathy">
              <organization/>
            </author>
            <date year="2014" month="July"/>
            <abstract>
              <t>In this document, we enhance the existing BGP route refresh mechanisms to provide for the demarcation of the beginning and the ending of a route refresh.  The enhancement can be used to facilitate correction of BGP Routing Information Base (RIB) inconsistencies in a non-disruptive manner.  This document updates RFC 2918.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7313"/>
          <seriesInfo name="DOI" value="10.17487/RFC7313"/>
        </reference>
        <reference anchor="RFC7606" target="https://www.rfc-editor.org/info/rfc7606" xml:base="https://www.rfc-editor.org/refs/bibxml/reference.RFC.7606.xml">
          <front>
            <title>Revised Error Handling for BGP UPDATE Messages</title>
            <author initials="E." surname="Chen" fullname="E. Chen" role="editor">
              <organization/>
            </author>
            <author initials="J." surname="Scudder" fullname="J. Scudder" role="editor">
              <organization/>
            </author>
            <author initials="P." surname="Mohapatra" fullname="P. Mohapatra">
              <organization/>
            </author>
            <author initials="K." surname="Patel" fullname="K. Patel">
              <organization/>
            </author>
            <date year="2015" month="August"/>
            <abstract>
              <t>According to the base BGP specification, a BGP speaker that receives an UPDATE message containing a malformed attribute is required to reset the session over which the offending attribute was received. This behavior is undesirable because a session reset would impact not only routes with the offending attribute but also other valid routes exchanged over the session.  This document partially revises the error handling for UPDATE messages and provides guidelines for the authors of documents defining new attributes.  Finally, it revises the error handling procedures for a number of existing attributes.</t>
              <t>This document updates error handling for RFCs 1997, 4271, 4360, 4456, 4760, 5543, 5701, and 6368.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7606"/>
          <seriesInfo name="DOI" value="10.17487/RFC7606"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8212" target="https://www.rfc-editor.org/info/rfc8212" xml:base="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8212.xml">
          <front>
            <title>Default External BGP (EBGP) Route Propagation Behavior without Policies</title>
            <author initials="J." surname="Mauch" fullname="J. Mauch">
              <organization/>
            </author>
            <author initials="J." surname="Snijders" fullname="J. Snijders">
              <organization/>
            </author>
            <author initials="G." surname="Hankins" fullname="G. Hankins">
              <organization/>
            </author>
            <date year="2017" month="July"/>
            <abstract>
              <t>This document updates RFC 4271 by defining the default behavior of a BGP speaker when there is no Import or Export Policy associated with an External BGP session.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8212"/>
          <seriesInfo name="DOI" value="10.17487/RFC8212"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC3345" target="https://www.rfc-editor.org/info/rfc3345" xml:base="https://www.rfc-editor.org/refs/bibxml/reference.RFC.3345.xml">
          <front>
            <title>Border Gateway Protocol (BGP) Persistent Route Oscillation Condition</title>
            <author initials="D." surname="McPherson" fullname="D. McPherson">
              <organization/>
            </author>
            <author initials="V." surname="Gill" fullname="V. Gill">
              <organization/>
            </author>
            <author initials="D." surname="Walton" fullname="D. Walton">
              <organization/>
            </author>
            <author initials="A." surname="Retana" fullname="A. Retana">
              <organization/>
            </author>
            <date year="2002" month="August"/>
          </front>
          <seriesInfo name="RFC" value="3345"/>
          <seriesInfo name="DOI" value="10.17487/RFC3345"/>
        </reference>
        <reference anchor="RFC4272" target="https://www.rfc-editor.org/info/rfc4272" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4272.xml">
          <front>
            <title>BGP Security Vulnerabilities Analysis</title>
            <author fullname="S. Murphy" initials="S." surname="Murphy"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>Border Gateway Protocol 4 (BGP-4), along with a host of other infrastructure protocols designed before the Internet environment became perilous, was originally designed with little consideration for protection of the information it carries. There are no mechanisms internal to BGP that protect against attacks that modify, delete, forge, or replay data, any of which has the potential to disrupt overall network routing behavior.</t>
              <t>This document discusses some of the security issues with BGP routing data dissemination. This document does not discuss security issues with forwarding of packets. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4272"/>
          <seriesInfo name="DOI" value="10.17487/RFC4272"/>
        </reference>
        <reference anchor="RFC4364" target="https://www.rfc-editor.org/info/rfc4364" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4364.xml">
          <front>
            <title>BGP/MPLS IP Virtual Private Networks (VPNs)</title>
            <author fullname="E. Rosen" initials="E." surname="Rosen"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>This document describes a method by which a Service Provider may use an IP backbone to provide IP Virtual Private Networks (VPNs) for its customers.  This method uses a "peer model", in which the customers' edge routers (CE routers) send their routes to the Service Provider's edge routers (PE routers); there is no "overlay" visible to the customer's routing algorithm, and CE routers at different sites do not peer with each other.  Data packets are tunneled through the backbone, so that the core routers do not need to know the VPN routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4364"/>
          <seriesInfo name="DOI" value="10.17487/RFC4364"/>
        </reference>
        <reference anchor="RFC4760" target="https://www.rfc-editor.org/info/rfc4760" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4760.xml">
          <front>
            <title>Multiprotocol Extensions for BGP-4</title>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="D. Katz" initials="D." surname="Katz"/>
            <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document defines extensions to BGP-4 to enable it to carry routing information for multiple Network Layer protocols (e.g., IPv6, IPX, L3VPN, etc.).  The extensions are backward compatible - a router that supports the extensions can interoperate with a router that doesn't support the extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4760"/>
          <seriesInfo name="DOI" value="10.17487/RFC4760"/>
        </reference>
        <reference anchor="RFC7964" target="https://www.rfc-editor.org/info/rfc7964" xml:base="https://www.rfc-editor.org/refs/bibxml/reference.RFC.7964.xml">
          <front>
            <title>Solutions for BGP Persistent Route Oscillation</title>
            <author initials="D." surname="Walton" fullname="D. Walton">
              <organization/>
            </author>
            <author initials="A." surname="Retana" fullname="A. Retana">
              <organization/>
            </author>
            <author initials="E." surname="Chen" fullname="E. Chen">
              <organization/>
            </author>
            <author initials="J." surname="Scudder" fullname="J. Scudder">
              <organization/>
            </author>
            <date year="2016" month="September"/>
            <abstract>
              <t>Routing information reduction by BGP Route Reflection or Confederation can result in persistent internal BGP route oscillations with certain routing setups and network topologies. This document specifies two sets of additional paths that can be used to eliminate these route oscillations in a network.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7964"/>
          <seriesInfo name="DOI" value="10.17487/RFC7964"/>
        </reference>
        <reference anchor="RFC8277" target="https://www.rfc-editor.org/info/rfc8277" xml:base="https://www.rfc-editor.org/refs/bibxml/reference.RFC.8277.xml">
          <front>
            <title>Using BGP to Bind MPLS Labels to Address Prefixes</title>
            <author initials="E." surname="Rosen" fullname="E. Rosen">
              <organization/>
            </author>
            <date year="2017" month="October"/>
            <abstract>
              <t>This document specifies a set of procedures for using BGP to advertise that a specified router has bound a specified MPLS label (or a specified sequence of MPLS labels organized as a contiguous part of a label stack) to a specified address prefix.  This can be done by sending a BGP UPDATE message whose Network Layer Reachability Information field contains both the prefix and the MPLS label(s) and whose Next Hop field identifies the node at which said prefix is bound to said label(s).  This document obsoletes RFC 3107.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8277"/>
          <seriesInfo name="DOI" value="10.17487/RFC8277"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgements" toc="default">
      <name>Acknowledgements</name>
      <t>
   TBD</t>
    </section>
  </back>
</rfc>
