<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc comments="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-teas-yang-te-33" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="TE YANG Data Model">A YANG Data Model for Traffic Engineering Tunnels, Label Switched Paths and Interfaces</title>

    <author initials="T." surname="Saad" fullname="Tarek Saad">
      <organization>Cisco Systems Inc</organization>
      <address>
        <email>tsaad.net@gmail.com</email>
      </address>
    </author>
    <author initials="R." surname="Gandhi" fullname="Rakesh Gandhi">
      <organization>Cisco Systems Inc</organization>
      <address>
        <email>rgandhi@cisco.com</email>
      </address>
    </author>
    <author initials="X." surname="Liu" fullname="Xufeng Liu">
      <organization>Alef Edge</organization>
      <address>
        <email>xufeng.liu.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="V. P." surname="Beeram" fullname="Vishnu Pavan Beeram">
      <organization>Juniper Networks</organization>
      <address>
        <email>vbeeram@juniper.net</email>
      </address>
    </author>
    <author initials="I." surname="Bryskin" fullname="Igor Bryskin">
      <organization>Individual</organization>
      <address>
        <email>i_bryskin@yahoo.com</email>
      </address>
    </author>
    <author initials="O." surname="Gonzalez de Dios" fullname="Oscar Gonzalez de Dios">
      <organization>Telefonica</organization>
      <address>
        <email>oscar.gonzalezdedios@telefonica.com</email>
      </address>
    </author>

    <date year="2023" month="July" day="04"/>

    
    <workgroup>TEAS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document defines a YANG data model for the provisioning and management of
Traffic Engineering (TE) tunnels, Label Switched Paths (LSPs), and interfaces.
The model covers data that is independent of any technology or dataplane encapsulation
and is divided into two YANG modules that cover device-specific, and device independent
data.</t>

<t>This model covers data for configuration, operational state, remote procedural
calls, and event notifications.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>YANG <xref target="RFC6020"/> and <xref target="RFC7950"/> is a data modeling language that was
introduced to define the contents of a conceptual data store that allows
networked devices to be managed using NETCONF <xref target="RFC6241"/>. YANG has proved
relevant beyond its initial confines, as bindings to other interfaces (e.g.
RESTCONF <xref target="RFC8040"/>) and encoding other than XML (e.g. JSON) are being defined.
Furthermore, YANG data models can be used as the basis of implementation for
other interfaces, such as CLI and programmatic APIs.</t>

<t>This document describes a YANG data model for Traffic Engineering (TE) tunnels,
Label Switched Paths (LSPs), and interfaces. The data model is divided into two
YANG modules. The module 'ietf-te.yang' includes data that is generic and
device-independent, while the module 'ietf-te-device.yang' includes data that is
device-specific.</t>

<t>The document describes a high-level relationship between the modules defined in
this document, as well as other external protocol YANG modules.  The TE generic
YANG data model does not include any data specific to a signaling protocol.  It
is expected other data plane technology model(s) will augment the TE generic
YANG data model.</t>

<t>Also, it is expected other YANG modules that model TE signaling protocols,
such as RSVP-TE (<xref target="RFC3209"/>, <xref target="RFC3473"/>), or Segment-Routing TE (SR-TE) 
<xref target="RFC9256"/> will augment the generic TE YANG  module.</t>

</section>
<section anchor="terms-and-conventions"><name>Terms and Conventions</name>

<section anchor="requirements-language"><name>Requirements Language</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The following terms are defined in <xref target="RFC6241"/> and are used in this specification:</t>

<t><list style="symbols">
  <t>client</t>
  <t>configuration data</t>
  <t>state data</t>
</list></t>

<t>This document also makes use of the following terminology introduced in the
YANG Data Modeling Language <xref target="RFC7950"/>:</t>

<t><list style="symbols">
  <t>augment</t>
  <t>data model</t>
  <t>data node</t>
</list></t>

</section>
<section anchor="prefixes-in-data-node-names"><name>Prefixes in Data Node Names</name>

<t>In this document, names of data nodes and other data model objects are prefixed
using the standard prefix associated with the corresponding YANG imported
modules, as shown in <xref target="tab1"/>.</t>

<texttable title="Prefixes and corresponding YANG modules" anchor="tab1">
      <ttcol align='left'>Prefix</ttcol>
      <ttcol align='left'>YANG module</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>yang</c>
      <c>ietf-yang-types</c>
      <c><xref target="RFC6991"/></c>
      <c>inet</c>
      <c>ietf-inet-types</c>
      <c><xref target="RFC6991"/></c>
      <c>rt-types</c>
      <c>ietf-routing-types</c>
      <c><xref target="RFC8294"/></c>
      <c>te-types</c>
      <c>ietf-te-types</c>
      <c><xref target="RFC8776"/></c>
      <c>te-packet-types</c>
      <c>ietf-te-packet-types</c>
      <c><xref target="RFC8776"/></c>
      <c>te</c>
      <c>ietf-te</c>
      <c>this document</c>
      <c>te-dev</c>
      <c>ietf-te-device</c>
      <c>this document</c>
</texttable>

</section>
<section anchor="model-tree-diagrams"><name>Model Tree Diagrams</name>

<t>The tree diagrams extracted from the module(s) defined in this document are given in
subsequent sections as per the syntax defined in <xref target="RFC8340"/>.</t>

</section>
</section>
<section anchor="design-considerations"><name>Design Considerations</name>

<t>This document describes a generic TE YANG data model that is independent of
any dataplane technology.  One of the design objectives is to allow specific
data plane technology models to reuse the TE generic data model and possibly
augment it with technology specific data.</t>

<t>The elements of the generic TE YANG data model, including TE Tunnels, LSPs, and
interfaces have leaf(s) that identify the technology layer where they reside.
For example, the LSP encoding type can identify the technology associated with a
TE Tunnel or LSP.</t>

<t>Also, the generic TE YANG data model does not cover signaling protocol data.
The signaling protocol used to instantiate TE LSPs are outside the scope of this
document and expected to be covered by augmentations defined in other document(s).</t>

<t>The following other design considerations are taken into account with respect to data
organization:</t>

<t><list style="symbols">
  <t>The generic TE YANG data model 'ietf-te' contains device independent data and
can be used to model data off a device (e.g. on a TE controller). When the
model is used to manage a specific device, the model contains the TE Tunnels
originating from the specific device.  When the model is used to manage a TE
controller, the 'tunnels' list contains all TE Tunnels and TE tunnel segments
originating from device(s) that the TE controller manages.</t>
  <t>The device-specific TE data is defined in module 'ietf-te-device' as
shown in <xref target="figctrl"/>.</t>
  <t>In general, minimal elements in the model are designated as "mandatory" to
allow freedom to vendors to adapt the data model to their specific product
implementation.</t>
  <t>Suitable defaults are specified for all configurable elements.</t>
  <t>The model declares a number of TE functions as features that can be
optionally supported.</t>
</list></t>

<section anchor="state-data-organization"><name>State Data Organization</name>

<t>The Network Management Datastore Architecture (NMDA) <xref target="RFC8342"/> addresses
modeling state data for ephemeral objects.  This document adopts the NMDA model
for configuration and state data representation as per IETF guidelines for new
IETF YANG models.</t>

</section>
</section>
<section anchor="model-overview"><name>Model Overview</name>

<t>The data models defined in this document cover the core TE features that are
commonly supported by different vendor implementations. The support of extended
or vendor specific TE feature(s) is expected to either be in augmentations, or
deviations to this model that are defined in separate documents.</t>

<section anchor="module-relationship"><name>Module Relationship</name>

<t>The generic TE YANG data model that is defined in "ietf-te.yang" covers the
building blocks that are device independent and agnostic of any specific
technology or control plane instances. The TE device model defined in
"ietf-te-device.yang" augments the generic TE YANG data model and covers data
that is specific to a device --  for example, attributes of TE interfaces, or
TE timers that are local to a TE node.</t>

<t>The TE data models for specific instances of data plane technology exist in
separate YANG modules that augment the generic TE YANG data model.  The TE
data models for specific instances of signaling protocols are outside the scope
of this document and are defined in other documents. For example, the RSVP-TE
YANG model augmentation of the TE model is covered in a separate document.</t>

<figure title="Relationship of TE module(s) with signaling protocol modules" anchor="figctrl"><artwork><![CDATA[
  TE generic     +---------+         o: augment
  module         | ietf-te |o-------------+
                 +---------+               \
                        o                   \
                        |\                   \
                        | \ TE device module  \
                        |  +----------------+  \
                        |  | ietf-te-device |   \
                        |  +----------------+    \
                        |       o                 \
                        |     /                    \
                        |   /                       \
                 +---------------+           +---------------+
  RSVP-TE module | ietf-rsvp-te^ |o .       | ietf-te-mpls^ |
                 +---------------+  \       +---------------+
                    |                \
                    |                 \
                    |                  \
                    |                   \
                    |                    \
                    o                 +-------------------+
                 +------------+       | ietf-rsvp-otn-te^ |
  RSVP module    | ietf-rsvp^ |       +-------------------+
                 +------------+          RSVP-TE with OTN
                                         extensions

                X---oY indicates that module X augments module Y
                ^ indicates a module defined in other documents
]]></artwork></figure>

</section>
</section>
<section anchor="te-yang-model"><name>TE YANG Model</name>

<t>The generic TE YANG module ('ietf-te') is meant for the management and
operation of a TE network. This includes creating, modifying and retrieving
information about TE Tunnels, LSPs, and interfaces and their associated
attributes (e.g.  Administrative-Groups, SRLGs, etc.).</t>

<t>A full tree diagram of the TE model is shown in the Appendix in
<xref target="fig-te-tree-full"/>.</t>

<section anchor="module-structure"><name>Module Structure</name>

<t>The 'te' container is the top level container in the 'ietf-te' module. The
presence of the 'te' container enables TE function system wide.  Below provides
further descriptions of containers that exist under the 'te' top level
container.</t>

<t>There are three further containers grouped under the 'te'
container as shown in <xref target="fig-highlevel"/> and described below.</t>

<t>globals:</t>

<ul empty="true"><li>
  <t>The 'globals' container maintains the set of global TE attributes that can be
applicable to TE Tunnels and interfaces.</t>
</li></ul>

<t>tunnels:</t>

<ul empty="true"><li>
  <t>The 'tunnels' container includes the list of TE Tunnels that are instantiated.
Refer to <xref target="TE_TUNNELS"/> for further details on the properties of a TE Tunnel.</t>
</li></ul>

<t>lsps:</t>

<ul empty="true"><li>
  <t>The 'lsps' container includes the list of TE LSP(s) that are instantiated for
TE Tunnels. Refer to <xref target="TE_LSPS"/> for further details on the properties of a TE LSP.</t>
</li></ul>

<t>The model also contains two Remote Procedure Calls (RPCs) as shown
in <xref target="fig-te-tree-full"/> and described below.</t>

<t>tunnels-path-compute:</t>

<ul empty="true"><li>
  <t>A RPC to request path computation for a specific TE Tunnel.
The RPC allows requesting path computation using atomic and stateless operation.
A tunnel may also be configured in 'compute-only' mode to provide stateful path updates
- see <xref target="TE_TUNNELS"/> for further details.</t>
</li></ul>

<t>tunnels-action:</t>

<ul empty="true"><li>
  <t>An RPC to request a specific action (e.g. reoptimize, or tear-and-setup) to be taken
on a specific tunnel or all tunnels.</t>
</li></ul>

<t><xref target="fig-te-tree-full"/> shows the relationships of these containers and RPCs within
the 'ietf-te' module.</t>

<figure title="TE Tunnel model high-level YANG tree view" anchor="fig-highlevel"><artwork><![CDATA[
module: ietf-te
  +--rw te!
     +--rw globals
     |     ...
     +--rw tunnels
     |     ...
     +--ro lsps
           ...

  rpcs:
    +---x tunnels-path-compute
    |  +---w input
    |  |     ...
    |  +--ro output
    |        ...
    +---x tunnels-actions
       +---w input
       |     ...
       +--ro output
             ...

]]></artwork></figure>

<section anchor="TeGlobals"><name>TE Globals</name>

<t>The 'globals' container covers properties that control a TE feature's
behavior system-wide, and its respective state as shown in <xref target="fig-globals"/>
and described in the text that follows.</t>

<figure title="TE globals YANG subtree high-level structure" anchor="fig-globals"><artwork><![CDATA[
     +--rw globals
     |  +--rw named-admin-groups
     |  |  +--rw named-admin-group* [name]
     |  |        ...
     |  +--rw named-srlgs
     |  |  +--rw named-srlg* [name]
     |  |        ...
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
]]></artwork></figure>

<t>named-admin-groups:</t>

<ul empty="true"><li>
  <t>A YANG container for the list of named (extended) administrative groups that may be applied
to TE links.</t>
</li></ul>

<t>named-srlgs:</t>

<ul empty="true"><li>
  <t>A YANG container for the list of named Shared Risk Link Groups (SRLGs) that may be
applied to TE links.</t>
</li></ul>

<t>named-path-constraints:</t>

<ul empty="true"><li>
  <t>A YANG container for a list of named path constraints. Each named path constraint is
composed of a set of constraints that can be applied during path computation.
A named path constraint can be applied to multiple TE Tunnels. Path constraints may also
be specified directly under the TE Tunnel. The path constraints specified under
the TE Tunnel take precedence over the path constraints 
derived from the referenced named path constraint. A named path constraint entry can be
formed of the path constraints shown in <xref target="fig-named-constraints"/>:</t>
</li></ul>

<figure title="Named path constraints YANG subtree" anchor="fig-named-constraints"><artwork><![CDATA[
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
     |             {te-types:named-path-constraints}?
     |        +--rw name                             string
     |        +--rw te-bandwidth
     |        |     ...
     |        +--rw link-protection?                 identityref
     |        +--rw setup-priority?                  uint8
     |        +--rw hold-priority?                   uint8
     |        +--rw signaling-type?                  identityref
     |        +--rw path-metric-bounds
     |        |     ...
     |        +--rw path-affinities-values
     |        |     ...
     |        +--rw path-affinity-names
     |        |     ...
     |        +--rw path-srlgs-lists
     |        |     ...
     |        +--rw path-srlgs-names
     |        |     ...
     |        +--rw disjointness?
     |        |       te-path-disjointness
     |        +--rw explicit-route-objects-always
     |        |     ...
     |        +--rw path-in-segment!
     |        |     ...
     |        +--rw path-out-segment!
     |              ...

]]></artwork></figure>

<ul empty="true"><li>
  <ul empty="true"><li>

    <t><list style="symbols">
      <t>name: A YANG leaf that holds the named path constraint entry. This is unique in the list
and used as a key.</t>
      <t>te-bandwidth: A YANG container that holds the technology agnostic TE bandwidth constraint.</t>
      <t>link-protection: A YANG leaf that holds the link protection type constraint required for the links to be included in the computed path.</t>
      <t>setup/hold priority: YANG leafs that hold the LSP setup and hold admission priority as defined in <xref target="RFC3209"/>.</t>
      <t>signaling-type: A YANG leaf that holds the LSP setup type, such as RSVP-TE or SR.</t>
      <t>path-metric-bounds: A YANG container that holds the set of metric bounds applicable on the
computed TE tunnel path.</t>
      <t>path-affinities-values: A YANG container that holds the set of affinity values and
mask to be used during path computation.</t>
      <t>path-affinity-names: A YANG container that holds the set of named affinity constraints and
corresponding inclusion or exclusion instructions for each to be used during path computation.</t>
      <t>path-srlgs-lists: A YANG container that holds the set of SRLG values and
corresponding inclusion or exclusion instructions to be used during path computation.</t>
      <t>path-srlgs-names: A YANG container that holds the set of named SRLG constraints and
corresponding inclusion or exclusion instructions for each to be used during path computation.</t>
      <t>disjointness: The level of resource disjointness constraint that the secondary path
of a TE tunnel has to adhere to.</t>
      <t>explicit-route-objects-always: A YANG container that contains two route objects lists:      <list style="symbols">
          <t>'route-object-exclude-always': a list of route entries to always exclude from the path computation.</t>
          <t>'route-object-include-exclude': a list of route entries to include or exclude in the path computation.</t>
        </list></t>
    </list></t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>The 'route-object-include-exclude' is used to configure constraints on which route objects (e.g., nodes, links) are included or excluded in the path computation.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>The interpretation of an empty 'route-object-include-exclude' list depends on the TE Tunnel (end-to-end or Tunnel Segment) and on the specific path, according to the following rules:</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t><list style="numbers">
        <t>An empty 'route-object-include-exclude' list for the primary path of an end-to-end TE Tunnel indicates that there are no route objects to be included or excluded in the path computation.</t>
        <t>An empty 'route-object-include-exclude' list for the primary path of a TE Tunnel Segment indicates that no primary LSP is required for that TE Tunnel.</t>
        <t>An empty 'route-object-include-exclude' list for a reverse path means it always follows the forward path (i.e., the TE Tunnel is co-routed). When the 'route-object-include-exclude' list is not empty, the reverse path is routed independently of the forward path.</t>
        <t>An empty 'route-object-include-exclude' list for the secondary (forward) path indicates that the secondary path has the same endpoints as the primary path.</t>
      </list></t>
    </li></ul>

    <t><list style="symbols">
      <t>path-in-segment: A YANG container that contains a list of label restrictions
that have to be taken into considerations when crossing domains. This TE
tunnel segment in this case is being stitched to the upstream TE tunnel segment.</t>
      <t>path-out-segment: A YANG container that contains a list of label restrictions
that have to be taken into considerations when crossing domains. The TE
tunnel segment in this case is being stitched to the downstream TE tunnel segment.</t>
    </list></t>
  </li></ul>
</li></ul>

</section>
<section anchor="TE_TUNNELS"><name>TE Tunnels</name>

<t>The 'tunnels' container holds the list of TE Tunnels that are provisioned on
ingress LER devices in the network as shown in <xref target="fig-te-tunnel"/>.</t>

<figure title="TE Tunnel list YANG subtree structure" anchor="fig-te-tunnel"><artwork><![CDATA[
     +--rw tunnels
     |  +--rw tunnel* [name]
     |     +--rw name                            string
     |     +--rw alias?                          string
     |     +--rw identifier?                     uint32
     |     +--rw color?                          uint32
     |     +--rw description?                    string
     |     +--rw admin-state?                    identityref
     |     +--ro operational-state?              identityref
     |     +--rw encoding?                       identityref
     |     +--rw switching-type?                 identityref
     |     +--rw source?                         te-types:te-node-id
     |     +--rw destination?                    te-types:te-node-id
     |     +--rw src-tunnel-tp-id?               binary
     |     +--rw dst-tunnel-tp-id?               binary
     |     +--rw bidirectional?                  boolean
     |     +--rw controller
     |     |  +--rw protocol-origin?        identityref
     |     |  +--rw controller-entity-id?   string
     |     +--rw reoptimize-timer?               uint16
     |     +--rw association-objects
     |     |  +--rw association-object* [association-key]
     |     |  |     ...
     |     |  +--rw association-object-extended* [association-key]
     |     |        ...
     |     +--rw protection
     |     |  +--rw enable?                         boolean
     |     |  +--rw protection-type?                identityref
     |     |  +--rw protection-reversion-disable?   boolean
     |     |  +--rw hold-off-time?                  uint32
     |     |  +--rw wait-to-revert?                 uint16
     |     |  +--rw aps-signal-id?                  uint8
     |     +--rw restoration
     |     |  +--rw enable?                          boolean
     |     |  +--rw restoration-type?                identityref
     |     |  +--rw restoration-scheme?              identityref
     |     |  +--rw restoration-reversion-disable?   boolean
     |     |  +--rw hold-off-time?                   uint32
     |     |  +--rw wait-to-restore?                 uint16
     |     |  +--rw wait-to-revert?                  uint16
     |     +--rw te-topology-identifier
     |     |  +--rw provider-id?   te-global-id
     |     |  +--rw client-id?     te-global-id
     |     |  +--rw topology-id?   te-topology-id
     |     +--rw te-bandwidth
     |     |  +--rw (technology)?
     |     |        ...
     |     +--rw link-protection?                identityref
     |     +--rw setup-priority?                 uint8
     |     +--rw hold-priority?                  uint8
     |     +--rw signaling-type?                 identityref
     |     +--rw hierarchy
     |     |  +--rw dependency-tunnels
     |     |  |     ...
     |     |  +--rw hierarchical-link
     |     |        ...
     |     +--rw primary-paths
     |     |  +--rw primary-path* [name]
     |     |        ...
     |     +--rw secondary-paths
     |     |  +--rw secondary-path* [name]
     |     |        ...
     |     +--rw secondary-reverse-paths
     |     |  +--rw secondary-reverse-path* [name]
     |     |        ...
     |     +---x tunnel-action
     |     |  +---w input
     |     |  |     ...
     |     |  +--ro output
     |     |        ...
     |     +---x protection-external-commands
     |        +---w input
     |              ...
]]></artwork></figure>

<t>When the model is used to manage a specific device, the 'tunnels' list contains
the TE Tunnels originating from the specific device. When the model is used to
manage a TE controller, the 'tunnels' list contains all TE Tunnels and TE
tunnel segments originating from device(s) that the TE controller manages.</t>

<t>The TE Tunnel model allows the configuration and management of the following TE
tunnel objects:</t>

<t>TE Tunnel:</t>

<ul empty="true"><li>
  <t>A YANG container of one or more TE LSPs established between the source and destination
TE Tunnel termination points.</t>
</li></ul>

<t>TE Path:</t>

<ul empty="true"><li>
  <t>An engineered path that once instantiated in the forwarding plane can be used
to forward traffic from the source to the destination TE Tunnel termination points.</t>
</li></ul>

<t>TE LSP:</t>

<ul empty="true"><li>
  <t>A TE LSP is a connection-oriented service established over a TE Path
and that allows the delivery of traffic between the TE Tunnel source and
destination termination points.</t>
</li></ul>

<t>TE Tunnel Segment:</t>

<ul empty="true"><li>
  <t>A part of a multi-domain TE Tunnel that is within a specific network domain.</t>
</li></ul>

<t>The TE Tunnel has a number of attributes that are set directly under the
tunnel (as shown in <xref target="fig-te-tunnel"/>). The main attributes of a TE Tunnel are described below:</t>

<t>operational-state:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the operational state of the tunnel.</t>
</li></ul>

<t>name:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the name of a TE Tunnel.  The name of the
TE Tunnel uniquely identifies the tunnel within the TE tunnel list.  The name
of the TE Tunnel can be formatted as a Uniform Resource Indicator (URI) by
including the namespace to ensure uniqueness of the name amongst all the TE
Tunnels present on devices and controllers. The configured TE Tunnels can
be reported with the name of the device embedded within the TE Tunnel name.
For initiated TE Tunnels from the controller, the controller is responsible
to ensures that TE Tunnel names are unique.</t>
</li></ul>

<t>alias:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds an alternate name to the TE tunnel. Unlike the TE tunnel
name, the alias can be modified at any time during the lifetime of the TE tunnel.</t>
</li></ul>

<t>identifier:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds an identifier of the tunnel. This identifier is unique amongst tunnels
originated from the same ingress device.</t>
</li></ul>

<t>color:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the color associated with the TE tunnel. The color is used
to map or steer services that carry matching color on to the TE tunnel as described in
<xref target="RFC9012"/>.</t>
</li></ul>

<t>admin-state:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the tunnel administrative state. The administrative
status in state datastore transitions to 'tunnel-admin-up' when the tunnel used
by the client layer, and to 'tunnel-admin-down' when it is not used by the
client layer.</t>
</li></ul>

<t>operational-state:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the tunnel operational state.</t>
</li></ul>

<t>encoding/switching:</t>

<ul empty="true"><li>
  <t>The 'encoding' and 'switching-type' are YANG leafs that define the specific
technology in which the tunnel operates in as described in <xref target="RFC3945"/>.</t>
</li></ul>

<t>source/destination:</t>

<ul empty="true"><li>
  <t>YANG containers that hold the tunnel source and destination node endpoints identities, including:</t>
</li></ul>

<ul empty="true"><li>
  <t><list style="symbols">
    <t>te-node-id: A YANG leaf that holds the identifier of the source or destination of the TE Tunnel
TE node identifiers as defined in <xref target="RFC8776"/>.</t>
    <t>node-id: A YANG leaf that holds the identifier of the source or destination of the TE Tunnel
node identifiers as defined in <xref target="RFC8345"/>.</t>
    <t>tunnel-tp-id: A YANG leaf that holds the identifier of the source or destination of the TE Tunnel
Termination Points (TTPs) as defined in <xref target="RFC8795"/>. The TTP identifiers are optional
on nodes that have a single TTP per node. For example, TTP identifiers are optional for packet
(IP/MPLS) routers.</t>
  </list></t>
</li></ul>

<t>bidirectional:</t>

<ul empty="true"><li>
  <t>A YANG leaf that when present indicates the LSP of a TE Tunnel is bidirectional
as defined in <xref target="rfc3473"/>.</t>
</li></ul>

<t>controller:</t>

<ul empty="true"><li>
  <t>A YANG container that holds tunnel data relevant to an optional external TE controller that
may initiate or control a tunnel. This target node may be augmented by external module(s), for example, to add data for PCEP initiated and/or
delegated tunnels.</t>
</li></ul>

<t>reoptimize-timer:</t>

<ul empty="true"><li>
  <t>A YANG leaf to set the interval period for tunnel reoptimization.</t>
</li></ul>

<t>association-objects:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the set of associations of the TE Tunnel to other
TE Tunnels. Associations at the TE Tunnel level apply to all paths of the TE
Tunnel. The TE tunnel associations can be overridden by associations
configured directly under the TE Tunnel path.</t>
</li></ul>

<t>protection:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the TE Tunnel protection properties.</t>
</li></ul>

<t>restoration:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the TE Tunnel restoration properties.</t>
</li></ul>

<t>te-topology-identifier:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the topology identifier associated with the topology where paths for the TE tunnel are computed as defined in <xref target="RFC8795"/>.</t>
</li></ul>

<t>network-id:</t>

<ul empty="true"><li>
  <t>A YANG leaf that can optionally be used to identify the network topology where paths for the TE tunnel are computed as defined in <xref target="RFC8345"/>.</t>
</li></ul>

<t>hierarchy:</t>

<ul empty="true"><li>
  <t>A YANG container that holds hierarchy related properties of the TE Tunnel. A TE LSP
  can be set up in MPLS or Generalized MPLS (GMPLS) networks to be used as
  a TE link to carry traffic in other (client) networks <xref target="RFC6107"/>.  In this
  case, the model introduces the TE Tunnel hierarchical link endpoint parameters
  to identify the specific link in the client layer that the underlying TE Tunnel is
  associated with. The hierarchy container includes the following:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>

    <t><list style="symbols">
      <t>dependency-tunnels: A set of hierarchical TE Tunnels provisioned or to be
provisioned in the immediate lower layer that this TE tunnel depends on for
multi-layer path computation. A dependency TE Tunnel is provisioned if and
only if it is used (selected by path computation) at least by one client
layer TE Tunnel. The TE link in the client layer network topology supported
by a dependent TE Tunnel is dynamically created only when the dependency TE
Tunnel is actually provisioned.</t>
      <t>hierarchical-link: A YANG container that holds the identity of the
hierarchical link (in the client layer) that is supported by this TE Tunnel.
The endpoints of the hierarchical link are defined by TE tunnel source and
destination node endpoints. The hierarchical link can be identified by its source
and destination link termination point identifiers.</t>
    </list></t>
  </li></ul>
</li></ul>

<t>primary-paths:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the list of primary paths.
A primary path is identified by 'name'. A primary path is selected from the list
to instantiate a primary forwarding LSP for the tunnel.  The list of primary
paths is visited by order of preference. A primary path has the following
attributes:</t>
</li></ul>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>primary-reverse-path: A YANG container that holds properties of the
primary reverse path. The reverse path is applicable to
bidirectional TE Tunnels.</t>
  </list></t>
</li></ul>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>candidate-secondary-paths: A YANG container that holds a list of candidate
secondary paths which may be used for the primary path to support path
protection. The candidate secondary path(s) reference path(s)  from the
tunnel secondary paths list.  The preference of the secondary paths is
specified within the list and dictates the order of visiting the secondary
path from the list. The attributes of a secondary path can be defined
separately from the primary path. The attributes of a secondary path will be
inherited from the associated 'active' primary when not explicitly defined
for the secondary path.</t>
  </list></t>
</li></ul>

<ul empty="true"><li>

</li></ul>

<t>secondary-paths:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the set of secondary paths. A secondary path is
 identified by 'name'. A secondary path can be referenced from the TE Tunnel's
'candidate-secondary-path' list.</t>
</li></ul>

<t>secondary-reverse-paths:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the set of secondary reverse paths. A secondary reverse
path is identified by 'name'. A secondary reverse path can be referenced from the
TE Tunnel's 'candidate-secondary-reverse-paths' list. A secondary reverse path contains
attributes similar to a primary path.</t>
</li></ul>

<t>The following set of common path attributes are shared for primary (forward and reverse) and secondary paths:</t>

<t>path-computation-method:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the method used for computing the TE path.</t>
</li></ul>

<t>path-computation-server:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the path computation server properties when the path is
 externally queried.</t>
</li></ul>

<t>compute-only:</t>

<ul empty="true"><li>
  <t>A path of a TE Tunnel is, by default, provisioned so that it can be instantiated
  in the forwarding plane so that it can carry traffic as soon as a valid path
  is computed. In some cases, a TE path may be configured only for the
  purpose of computing a path and reporting it without the need to instantiate
  the LSP or commit any resources. In such a case, the path is configured in
  'compute-only' mode to distinguish it from the default behavior. A
  'compute-only' path is configured as a usual with the associated per path
  constraint(s) and properties on a device or TE controller. The device or TE
  controller computes the feasible path(s) subject to configured constraints.
  A client may query the 'compute-only' computed path properties 'on-demand',
  or alternatively, can subscribe to be notified of computed path(s) and
  whenever the path properties change.</t>
</li></ul>

<t>use-path-computation:</t>

<ul empty="true"><li>
  <t>A YANG leaf that indicates whether or not path computation is to
  be used for a specified path.</t>
</li></ul>

<t>lockdown:</t>

<ul empty="true"><li>
  <t>A YANG leaf that when set indicates the existing path should not be reoptimized
  after a failure on any of its traversed links.</t>
</li></ul>

<t>path-scope:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the path scope if segment or an end-to-end path.</t>
</li></ul>

<t>preference:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the preference for the path. The lower the number
 higher the preference.</t>
</li></ul>

<t>k-requested-paths:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the number of k-shortest-paths requested from the path
computation server and returned sorted by its optimization
objective.</t>
</li></ul>

<t>association-objects:</t>

<ul empty="true"><li>
  <t>A YANG container that holds a list of tunnel association properties.</t>
</li></ul>

<t>optimizations:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the optimization objectives
  that path computation will use to select a path.</t>
</li></ul>

<t>named-path-constraint:</t>

<ul empty="true"><li>
  <t>A YANG leafref that references an entry from the global list of named path constraints.</t>
</li></ul>

<t>te-bandwidth:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the path bandwidth (see <xref target="RFC8776"/>).</t>
</li></ul>

<t>link-protection:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the link protection type required for the links to
be included the computed path (see <xref target="RFC8776"/>).</t>
</li></ul>

<t>setup/hold-priority:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>signaling-type:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. This value overrides
the provided one in the referenced named-path-constraint.</t>
</li></ul>

<t>path-metric-bounds:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-affinities-values:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-affinity-names:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-srlgs-lists:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-srlgs-names:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>disjointness:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>explicit-route-objects-always:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-in-segment:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-out-segment:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>computed-paths-properties:</t>

<ul empty="true"><li>
  <t>A YANG container that holds properties for the list of computed paths.</t>
</li></ul>

<t>computed-path-error-infos:</t>

<ul empty="true"><li>
  <t>A YANG container that holds a list of errors related to the path.</t>
</li></ul>

<t>lsp-provisioning-error-infos:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the list of LSP provisioning error information.</t>
</li></ul>

<t>lsps:</t>

<ul empty="true"><li>
  <t>A YANG container that holds a list of LSPs that have been instantiated for this specific path.</t>
</li></ul>

<t>In addition to the path common attributes, the primary path has the following
attributes that are not present in the secondary path:</t>

<t><list style="symbols">
  <t>Only the primary path contains the list of 'candidate-secondary-paths' that
can protect the primary path.</t>
  <t>Only the primary path can contain a primary-reverse-path associated with the
primary path (and its associated list of
'candidate-secondary-reverse-path').</t>
</list></t>

</section>
<section anchor="TE_LSPS"><name>TE LSPs</name>

<t>The 'lsps' container includes the set of TE LSP(s) that have been instantiated.
A TE LSP is identified by a 3-tuple ('tunnel-name', 'lsp-id', 'node').</t>

<t>When the model is used to manage a specific device, the 'lsps' list contains all TE
LSP(s) that traverse the device (including ingressing, transiting and egressing the device).</t>

<t>When the model is used to manage a TE controller, the 'lsps' list
contains the TE LSP(s) on devices managed by the controller that act as ingress, and may optionally include
TE LSPs on devices managed by the controller that act as transit or egress role.</t>

</section>
</section>
<section anchor="tree-diagram"><name>Tree Diagram</name>

<t><xref target="fig-te-tree"/> shows the tree diagram of depth=4 for the generic TE YANG model defined in
modules 'ietf-te.yang'. The full tree diagram is shown in <xref target="AppendixB"/>.</t>

<figure title="Tree diagram of depth-4 of TE Tunnel YANG data model" anchor="fig-te-tree"><artwork><![CDATA[
module: ietf-te
  +--rw te
     +--rw enable?    boolean
     +--rw globals
     |  +--rw named-admin-groups
     |  |  +--rw named-admin-group* [name]
     |  |          {te-types:extended-admin-groups,
     |  |           te-types:named-extended-admin-groups}?
     |  |        ...
     |  +--rw named-srlgs
     |  |  +--rw named-srlg* [name] {te-types:named-srlg-groups}?
     |  |        ...
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
     |             {te-types:named-path-constraints}?
     |           ...
     +--rw tunnels
     |  +--rw tunnel* [name]
     |     +--rw name                            string
     |     +--rw alias?                          string
     |     +--rw identifier?                     uint32
     |     +--rw color?                          uint32
     |     +--rw description?                    string
     |     +--rw admin-state?                    identityref
     |     +--ro operational-state?              identityref
     |     +--rw encoding?                       identityref
     |     +--rw switching-type?                 identityref
     |     +--rw source
     |     |     ...
     |     +--rw destination
     |     |     ...
     |     +--rw bidirectional?                  boolean
     |     +--rw controller
     |     |     ...
     |     +--rw reoptimize-timer?               uint16
     |     +--rw association-objects
     |     |     ...
     |     +--rw protection
     |     |     ...
     |     +--rw restoration
     |     |     ...
     |     +--rw network-id?                     nw:network-id
     |     +--rw te-topology-identifier
     |     |     ...
     |     +--rw te-bandwidth
     |     |     ...
     |     +--rw link-protection?                identityref
     |     +--rw setup-priority?                 uint8
     |     +--rw hold-priority?                  uint8
     |     +--rw signaling-type?                 identityref
     |     +--rw hierarchy
     |     |     ...
     |     +--rw primary-paths
     |     |     ...
     |     +--rw secondary-paths
     |     |     ...
     |     +--rw secondary-reverse-paths
     |     |     ...
     |     +---x tunnel-action
     |     |     ...
     |     +---x protection-external-commands
     |           ...
     +--ro lsps
        +--ro lsp* [tunnel-name lsp-id node]
           +--ro tunnel-name                         string
           +--ro lsp-id                              uint16
           +--ro node
           |       te-types:te-node-id
           +--ro source?
           |       te-types:te-node-id
           +--ro destination?
           |       te-types:te-node-id
           +--ro tunnel-id?                          uint16
           +--ro extended-tunnel-id?
           |       yang:dotted-quad
           +--ro operational-state?                  identityref
           +--ro signaling-type?                     identityref
           +--ro origin-type?                        enumeration
           +--ro lsp-resource-status?                enumeration
           +--ro lockout-of-normal?                  boolean
           +--ro freeze?                             boolean
           +--ro lsp-protection-role?                enumeration
           +--ro lsp-protection-state?               identityref
           +--ro protection-group-ingress-node-id?
           |       te-types:te-node-id
           +--ro protection-group-egress-node-id?
           |       te-types:te-node-id
           +--ro lsp-actual-route-information
                 ...

  rpcs:
    +---x tunnels-path-compute
    |  +---w input
    |  |  +---w path-compute-info
    |  +--ro output
    |     +--ro path-compute-result
    +---x tunnels-actions
       +---w input
       |  +---w tunnel-info
       |  |  +---w (filter-type)
       |  |        ...
       |  +---w action-info
       |     +---w action?       identityref
       |     +---w disruptive?   empty
       +--ro output
          +--ro action-result?   identityref

]]></artwork></figure>

</section>
<section anchor="yang-module"><name>YANG Module</name>

<t>The generic TE YANG module 'ietf-te' imports the following modules:</t>

<t><list style="symbols">
  <t>ietf-te-types defined in <xref target="RFC8776"/></t>
  <t>ietf-yang-types and ietf-inet-types defined in <xref target="RFC6991"/></t>
  <t>ietf-network and ietf-network-topology defined in <xref target="RFC8345"/></t>
</list></t>

<t>This module references the following documents:
<xref target="RFC4206"/>, <xref target="RFC4427"/>,
<xref target="RFC4872"/>, <xref target="RFC3209"/>, <xref target="RFC6780"/>,
<xref target="RFC7471"/>, <xref target="RFC9012"/>, <xref target="RFC8570"/>,
<xref target="RFC8232"/>, <xref target="RFC7271"/>, <xref target="RFC8234"/>, <xref target="RFC7308"/>, and <xref target="ITU_G.808.1"/>.</t>

<figure title="TE Tunnel data model YANG module" anchor="fig-basic-te"><artwork><![CDATA[
<CODE BEGINS> file "ietf-te@2023-06-16.yang"
module ietf-te {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-te";

  /* Replace with IANA when assigned */

  prefix te;

  /* Import TE generic types */

  import ietf-te-types {
    prefix te-types;
    reference
      "RFC8776: Common YANG Data Types for Traffic Engineering.";
  }
  import ietf-inet-types {
    prefix inet;
    reference
      "RFC6991: Common YANG Data Types.";
  }
  import ietf-yang-types {
    prefix yang;
    reference
      "RFC6991: Common YANG Data Types.";
  }

  import ietf-network {
    prefix "nw";
    reference "RFC 8345: A YANG Data Model for Network Topologies";
  }

  import ietf-network-topology {
    prefix "nt";
    reference "RFC 8345: A YANG Data Model for Network Topologies";
  }

  organization
    "IETF Traffic Engineering Architecture and Signaling (TEAS)
     Working Group.";
  contact
    "WG Web:   <https://tools.ietf.org/wg/teas/>
     WG List:  <mailto:teas@ietf.org>

     Editor:   Tarek Saad
               <mailto:tsaad.net@gmail.com>

     Editor:   Rakesh Gandhi
               <mailto:rgandhi@cisco.com>

     Editor:   Vishnu Pavan Beeram
               <mailto:vbeeram@juniper.net>

     Editor:   Himanshu Shah
               <mailto:hshah@ciena.com>

     Editor:   Xufeng Liu
               <mailto: xufeng.liu.ietf@gmail.com>

     Editor:   Igor Bryskin
               <mailto:i_bryskin@yahoo.com>

     Editor:   Oscar Gonzalez de Dios
               <mailto: oscar.gonzalezdedios@telefonica.com>";

  description
    "YANG data module for TE configuration, state, and RPCs.
     The model fully conforms to the Network Management
     Datastore Architecture (NMDA).

     Copyright (c) 2023 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
     for full legal notices.";

  // RFC Ed.: replace XXXX with actual RFC number and remove this
  // note.
  // RFC Ed.: update the date below with the date of RFC publication
  // and remove this note.

  revision 2023-06-16 {
    description
      "Initial revision for the TE generic YANG module.";
    reference
      "RFCXXXX: A YANG Data Model for Traffic Engineering Tunnels
       and Interfaces.";
  }

  typedef tunnel-ref {
    type leafref {
      path "/te:te/te:tunnels/te:tunnel/te:name";
    }
    description
      "This type is used by data models that need to reference
       configured TE tunnel.";
  }

  typedef te-gen-node-id {
    type union {
      type te-types:te-node-id;
      type inet:ip-address;
      type nw:node-id;
    }
    description
      "Generic type that identifies a node in a TE topology.";
  }

  /**
   * TE tunnel generic groupings
   */

  grouping te-generic-node-id {
    description
      "A reusable grouping for a TE generic node identifier.";
    leaf id {
      type te-gen-node-id;
      description
        "The identifier of the node. Can be represented as IP
         address or dotted quad address or as an URI.";
    }
    leaf type {
      type enumeration {
        enum ip {
          description
            "IP address representation of the node identifier.";
        }
        enum dotted-quad {
          description
            "Dotted quad address representation of the node
             identifier.";
        }
        enum node-id {
          description
            "URI representation of the node identifier.";
        }
      }
      description
        "Type of node identifier representation.";
    }
  }

  grouping path-common-properties {
    description
      "Common path attributes.";
    leaf name {
      type string;
      description
        "TE path name.";
    }
    leaf path-computation-method {
      type identityref {
        base te-types:path-computation-method;
      }
      default "te-types:path-locally-computed";
      description
        "The method used for computing the path, either
         locally computed, queried from a server or not
         computed at all (explicitly configured).";
    }
    container path-computation-server {
      when "derived-from-or-self(../path-computation-method, "
         + "'te-types:path-externally-queried')" {
        description
          "The path-computation server when the path is
           externally queried.";
      }
      uses te-generic-node-id;
      description
        "Address of the external path computation
         server.";
    }
    leaf compute-only {
      type empty;
      description
        "When present, the path is computed and updated whenever
         the topology is updated. No resources are committed
         or reserved in the network.";
    }
    leaf use-path-computation {
      when "derived-from-or-self(../path-computation-method, "
         + "'te-types:path-locally-computed')";
      type boolean;
      default "true";
      description
        "When 'true' indicates the path is dynamically computed
         and/or validated against the Traffic-Engineering Database
         (TED), and when 'false' indicates no path expansion or
         validation against the TED is required.";
    }
    leaf lockdown {
      type empty;
      description
        "When present, indicates no reoptimization to be attempted
         for this path.";
    }
    leaf path-scope {
      type identityref {
        base te-types:path-scope-type;
      }
      default "te-types:path-scope-end-to-end";
      config false;
      description
        "Indicates whether the path is a segment or portion of
         of the full path., or is the an end-to-end path for
         the TE Tunnel.";
    }
  }

  /* This grouping is re-used in path-computation rpc */
  grouping path-compute-info {
    description
      "Attributes used for path computation request.";
    uses tunnel-associations-properties;
    uses te-types:generic-path-optimization;
    leaf named-path-constraint {
      if-feature "te-types:named-path-constraints";
      type leafref {
        path "/te:te/te:globals/te:named-path-constraints/"
           + "te:named-path-constraint/te:name";
      }
      description
        "Reference to a globally defined named path constraint set.";
    }
    uses path-constraints-common;
  }

  /* This grouping is re-used in path-computation rpc */
  grouping path-forward-properties {
    description
      "The path preference.";
    leaf preference {
      type uint8 {
        range "1..255";
      }
      default "1";
      description
        "Specifies a preference for this path. The lower the number
         higher the preference.";
    }
    leaf co-routed {
      when "/te:te/te:tunnels/te:tunnel/te:bidirectional = 'true'" {
        description
          "Applicable to bidirectional tunnels only.";
      }
      type boolean;
      default "false";
      description
        "Indicates whether the reverse path must to be co-routed
         with the primary.";
    }
  }

  /* This grouping is re-used in path-computation rpc */
  grouping k-requested-paths {
    description
      "The k-shortest paths requests.";
    leaf k-requested-paths {
      type uint8;
      default "1";
      description
        "The number of k-shortest-paths requested from the path
         computation server and returned sorted by its optimization
         objective.";
    }
  }

  grouping path-state {
    description
      "TE per path state parameters.";
    uses path-computation-response;
    container lsp-provisioning-error-infos {
      config false;
      description
        "LSP provisioning error information.";
      list lsp-provisioning-error-info {
        description
          "List of LSP provisioning error info entries.";
        leaf error-reason {
          type identityref {
            base te-types:lsp-provisioning-error-reason;
          }
          description
            "LSP provision error type.";
        }
        leaf error-description {
          type string;
          description
            "The textual representation of the error occurred during
             path computation.";
        }
        leaf error-timestamp {
          type yang:date-and-time;
          description
            "Timestamp of when the reported error occurred.";
        }
        leaf error-node-id {
          type te-types:te-node-id;
          description
            "Node identifier of node where error occurred.";
        }
        leaf error-link-id {
          type te-types:te-tp-id;
          description
            "Link ID where the error occurred.";
        }
        leaf lsp-id {
          type uint16;
          description
            "The LSP-ID for which path computation was performed.";
        }
      }
    }
    container lsps {
      config false;
      description
        "The TE LSPs container.";
      list lsp {
        key "node lsp-id";
        description
          "List of LSPs associated with the tunnel.";
        leaf tunnel-name {
          type leafref {
            path "/te:te/te:lsps/te:lsp/te:tunnel-name";
          }
          description "TE tunnel name.";
        }
        leaf node {
          type leafref {
            path "/te:te/te:lsps/te:lsp[tunnel-name="
               + "current()/../te:tunnel-name][lsp-id="
               + "current()/../te:lsp-id]/te:node";
          }
          description "The node where the LSP state resides on.";
        }
        leaf lsp-id {
          type leafref {
            path "/te:te/te:lsps/te:lsp[tunnel-name="
                           + "current()/../tunnel-name]/te:lsp-id";
          }
          description "The TE LSP identifier.";
        }
      }
    }
  }

  /* This grouping is re-used in path-computation rpc */
  grouping path-computation-response {
    description
      "Attributes reported by path computation response.";
    container computed-paths-properties {
      config false;
      description
        "Computed path properties container.";
      list computed-path-properties {
        key "k-index";
        description
          "List of computed paths.";
        leaf k-index {
          type uint8;
          description
            "The k-th path returned from the computation server.
             A lower k value path is more optimal than higher k
             value path(s)";
        }
        uses te-types:generic-path-properties {
          augment "path-properties" {
            description
              "additional path properties returned by path
               computation.";
            uses te-types:te-bandwidth;
            leaf disjointness-type {
              type te-types:te-path-disjointness;
              config false;
              description
                "The type of resource disjointness.
                 When reported for a primary path, it represents the
                 minimum level of disjointness of all the secondary
                 paths. When reported for a secondary path, it
                 represents the disjointness of the secondary path.";
            }
          }
        }
      }
    }
    container computed-path-error-infos {
      config false;
      description
        "Path computation information container.";
      list computed-path-error-info {
        description
          "List of path computation info entries.";
        leaf error-description {
          type string;
          description
            "Textual representation of the error that occurred
             during path computation.";
        }
        leaf error-timestamp {
          type yang:date-and-time;
          description
            "Timestamp of last path computation attempt.";
        }
        leaf error-reason {
          type identityref {
            base te-types:path-computation-error-reason;
          }
          description
            "Reason for the path computation error.";
        }
      }
    }
  }

  grouping protection-restoration-properties {
    description
      "Protection and restoration parameters.";
    container protection {
      description
        "Protection parameters.";
      leaf protection-type {
        type identityref {
          base te-types:lsp-protection-type;
        }
        default "te-types:lsp-protection-unprotected";
        description
          "LSP protection type.";
      }
      leaf protection-reversion-disable {
        type boolean;
        default "false";
        description
          "Disable protection reversion to working path.";
      }
      leaf hold-off-time {
        type uint32;
        units "milli-seconds";
        description
          "The time between the declaration of an SF or SD condition
           and the initialization of the protection switching
           algorithm.";
        reference
          "RFC4427";
      }
      leaf wait-to-revert {
        type uint16;
        units "seconds";
        description
          "Time to wait before attempting LSP reversion.";
        reference
          "RFC4427";
      }
      leaf aps-signal-id {
        type uint8 {
          range "1..255";
        }
        default "1";
        description
          "The APS signal number used to reference the traffic of
           this tunnel. The default value for normal traffic is 1.
           The default value for extra-traffic is 255. If not
           specified, non-default values can be assigned by the
           server, if and only if, the server controls both
            endpoints.";
        reference
          "ITU_G.808.1";
      }
    }
    container restoration {
      description
        "Restoration parameters.";
      leaf restoration-type {
        type identityref {
          base te-types:lsp-restoration-type;
        }
        default "te-types:lsp-restoration-restore-none";
        description
          "LSP restoration type.";
      }
      leaf restoration-scheme {
        type identityref {
          base te-types:restoration-scheme-type;
        }
        default "te-types:restoration-scheme-preconfigured";
        description
          "LSP restoration scheme.";
      }
      leaf restoration-reversion-disable {
        type boolean;
        default "false";
        description
          "Disable restoration reversion to working path.";
      }
      leaf hold-off-time {
        type uint32;
        units "milli-seconds";
        description
          "The time between the declaration of an SF or SD condition
           and the initialization of the protection switching
           algorithm.";
        reference
          "RFC4427";
      }
      leaf wait-to-restore {
        type uint16;
        units "seconds";
        description
          "Time to wait before attempting LSP restoration.";
        reference
          "RFC4427";
      }
      leaf wait-to-revert {
        type uint16;
        units "seconds";
        description
          "Time to wait before attempting LSP reversion.";
        reference
          "RFC4427";
      }
    }
  }

  grouping tunnel-associations-properties {
    description
      "TE tunnel association grouping.";
    container association-objects {
      description
        "TE tunnel associations.";
      list association-object {
        key "association-key";
        unique "type id source/id source/type";
        description
          "List of association base objects.";
        reference
          "RFC4872";
        leaf association-key {
          type string;
          description
            "Association key used to identify a specific
             association in the list";
        }
        leaf type {
          type identityref {
            base te-types:association-type;
          }
          description
            "Association type.";
          reference
            "RFC4872";
        }
        leaf id {
          type uint16;
          description
            "Association identifier.";
          reference
            "RFC4872";
        }
        container source {
          uses te-generic-node-id;
          description
            "Association source.";
          reference
            "RFC4872";
        }
      }
      list association-object-extended {
        key "association-key";
        unique
          "type id source/id source/type global-source extended-id";
        description
          "List of extended association objects.";
        reference
          "RFC6780";
        leaf association-key {
          type string;
          description
            "Association key used to identify a specific
             association in the list";
        }
        leaf type {
          type identityref {
            base te-types:association-type;
          }
          description
            "Association type.";
          reference
            "RFC4872, RFC6780";
        }
        leaf id {
          type uint16;
          description
            "Association identifier.";
          reference
            "RFC4872, RFC6780";
        }
        container source {
          uses te-generic-node-id;
          description
            "Association source.";
          reference
            "RFC4872, RFC6780";
        }
        leaf global-source {
          type uint32;
          description
            "Association global source.";
          reference
            "RFC6780";
        }
        leaf extended-id {
          type yang:hex-string;
          description
            "Association extended identifier.";
          reference
            "RFC6780";
        }
      }
    }
  }

  grouping tunnel-end-point {
    description
      "Common grouping used to specify the tunnel source and 
      destination end-points.";
    leaf node-id {
      type nw:node-id;
      description
        "The TE tunnel end-point node identifier";
    }
    leaf te-node-id {
      type te-types:te-node-id;
      description
        "The TE tunnel end-point TE node identifier";
    }
    leaf tunnel-tp-id {
      when "../node-id or ../te-node-id" {
        description
          "The TE tunnel termination point identifier is local to 
          a node";
      }
      type binary;
      description
        "The TE tunnel end-point TE tunnel termination point 
        identifier";
    }
  }

  /* This grouping is re-used in path-computation rpc */
  grouping tunnel-common-attributes {
    description
      "Common grouping to define the TE tunnel parameters";
    container source {
      description
        "TE tunnel source end-point.";
      uses tunnel-end-point;
    }
    container destination {
      description
        "TE tunnel destination end-point.";
      uses tunnel-end-point;
    }
    leaf bidirectional {
      type boolean;
      default "false";
      description
        "Indicates a bidirectional tunnel";
    }
  }

  /* This grouping is re-used in path-computation rpc */
  grouping tunnel-hierarchy-properties {
    description
      "A grouping for TE tunnel hierarchy information.";
    container hierarchy {
      description
        "Container for TE hierarchy related information.";
      container dependency-tunnels {
        description
          "List of tunnels that this tunnel can be potentially
           dependent on.";
        list dependency-tunnel {
          key "name";
          description
            "A tunnel entry that this tunnel can potentially depend
             on.";
          leaf name {
            type leafref {
              path "/te:te/te:tunnels/te:tunnel/te:name";
              require-instance false;
            }
            description
              "Dependency tunnel name. The tunnel may not have been
               instantiated yet.";
          }
          uses te-types:encoding-and-switching-type;
        }
      }
      container hierarchical-link {
        description
          "Identifies a hierarchical link (in client layer)
           that this tunnel is associated with. By default, the
           topology of the hierarchical link is the same topology of
           the tunnel;";
        reference
          "RFC4206";
        leaf enable {
          type boolean;
          default "false";
          description
            "Enables the hierarchical link properties supported by
             this tunnel";
        }
        leaf local-node-id {
          type nw:node-id;
          description
            "The local node identifier.";
        }
        leaf local-te-node-id {
          type te-types:te-node-id;
          description
            "The local TE node identifier.";
        }
        leaf local-link-tp-id {
          type nt:tp-id;
          description
            "The local link termination point identifier.";
        }
        leaf local-te-link-tp-id {
          type te-types:te-tp-id;
          description
            "The local TE link termination point identifier.";
        }
        leaf remote-link-tp-id {
          type nt:tp-id;
          description
            "The remote link termination point identifier.";
        }
        leaf remote-te-node-id {
          type te-types:te-node-id;
          description
            "Remote TE node identifier.";
        }
        leaf network-id {
          type nw:network-id;
          description
            "The network topology identifier where the hierarchical 
            link supported by this TE tunnel is instantiated.";
        }
        uses te-types:te-topology-identifier {
          description
            "The TE topology identifier where the hierarchical link
             supported by this TE tunnel is instantiated.";
        }
      }
    }
  }

  grouping path-constraints-common {
    description
      "Global named path constraints configuration
       grouping.";
    uses te-types:common-path-constraints-attributes {
      description
        "The constraints applicable to the path. This includes:
         - The path bandwidth constraint
         - The path link protection type constraint
         - The path setup/hold priority constraint
         - path signaling type constraint
         - path metric bounds constraint. The unit of path metric
           bound is interpreted in the context of the metric-type.
           For example for metric-type 'path-metric-loss', the bound
           is multiples of the basic unit 0.000003% as described
           in RFC7471 for OSPF, and RFC8570 for ISIS.
         - path affinity constraints
         - path SRLG constraints";

    }
    uses te-types:generic-path-disjointness;
    uses te-types:path-constraints-route-objects;
    container path-in-segment {
      presence "The end-to-end tunnel starts in a previous domain;
                this tunnel is a segment in the current domain.";
      description
        "If an end-to-end tunnel crosses multiple domains using
         the same technology, some additional constraints have to be
         taken in consideration in each domain.
         This TE tunnel segment is stitched to the upstream TE tunnel
         segment.";
      uses te-types:label-set-info;
    }
    container path-out-segment {
      presence
        "The end-to-end tunnel is not terminated in this domain;
         this tunnel is a segment in the current domain.";
      description
        "If an end-to-end tunnel crosses multiple domains using
         the same technology, some additional constraints have to be
         taken in consideration in each domain.
         This TE tunnel segment is stitched to the downstream TE
         tunnel segment.";
      uses te-types:label-set-info;
    }
  }

  /**
   * TE container
   */

  container te {
    description
      "TE global container.";
    leaf enable {
      type boolean;
      description
        "Enables the TE component features.";
    }

    /* TE Global Data */
    container globals {
      description
        "Globals TE system-wide configuration data container.";
      container named-admin-groups {
        description
          "TE named admin groups container.";
        list named-admin-group {
          if-feature "te-types:extended-admin-groups";
          if-feature "te-types:named-extended-admin-groups";
          key "name";
          description
            "List of named TE admin-groups.";
          leaf name {
            type string;
            description
              "A string name that uniquely identifies a TE
               interface named admin-group.";
          }
          leaf bit-position {
            type uint32;
            description
              "Bit position representing the administrative group.";
            reference
              "RFC3209 and RFC7308";
          }


        }
      }
      container named-srlgs {
        description
          "TE named SRLGs container.";
        list named-srlg {
          if-feature "te-types:named-srlg-groups";
          key "name";
          description
            "A list of named SRLG groups.";
          leaf name {
            type string;
            description
              "A string name that uniquely identifies a TE
               interface named SRLG.";
          }
          leaf value {
            type te-types:srlg;
            description
              "An SRLG value.";
          }
          leaf cost {
            type uint32;
            description
              "SRLG associated cost. Used during path to append
               the path cost when traversing a link with this SRLG.";
          }
        }
      }
      container named-path-constraints {
        description
          "TE named path constraints container.";
        list named-path-constraint {
          if-feature "te-types:named-path-constraints";
          key "name";
          leaf name {
            type string;
            description
              "A string name that uniquely identifies a
               path constraint set.";
          }
          uses path-constraints-common;
          description
            "A list of named path constraints.";
        }
      }
    }

    /* TE Tunnel Data */
    container tunnels {
      description
        "Tunnels TE configuration data container.";
      list tunnel {
        key "name";
        description
          "The list of TE tunnels.";
        leaf name {
          type string;
          description
            "TE tunnel name.";
        }
        leaf alias {
          type string;
          description
            "An alternate name of the TE tunnel that can be modified
             anytime during its lifetime.";
        }
        leaf identifier {
          type uint32;
          description
            "TE tunnel Identifier.";
          reference
            "RFC3209";
        }
        leaf color {
          type uint32;
          description "The color associated with the TE tunnel.";
          reference "RFC9012";
        }
        leaf description {
          type string;
          default "None";
          description
            "Textual description for this TE tunnel.";
        }
        leaf admin-state {
          type identityref {
            base te-types:tunnel-admin-state-type;
          }
          default "te-types:tunnel-admin-state-up";
          description
            "TE tunnel administrative state.";
        }
        leaf operational-state {
          type identityref {
            base te-types:tunnel-state-type;
          }
          config false;
          description
            "TE tunnel operational state.";
        }
        uses te-types:encoding-and-switching-type;
        uses tunnel-common-attributes;
        container controller {
          description
            "Contains tunnel data relevant to external controller(s).
             This target node may be augmented by external module(s),
             for example, to add data for PCEP initiated and/or
             delegated tunnels.";
          leaf protocol-origin {
            type identityref {
              base te-types:protocol-origin-type;
            }
            description
              "The protocol origin for instantiating the tunnel."; 
          }
          leaf controller-entity-id {
            type string;
            description
              "An identifier unique within the scope of visibility
               that associated with the entity that controls the
               tunnel.";
            reference "RFC8232";
          }
        }
        leaf reoptimize-timer {
          type uint16;
          units "seconds";
          description
            "Frequency of reoptimization of a traffic engineered
             LSP.";
        }
        uses tunnel-associations-properties;
        uses protection-restoration-properties;
        uses te-types:tunnel-constraints;
        uses tunnel-hierarchy-properties;
        container primary-paths {
          description
            "The set of primary paths.";
          reference "RFC4872";
          list primary-path {
            key "name";
            description
              "List of primary paths for this tunnel.";
            leaf active {
              type boolean;
              config false;
              description
                "Indicates an active path that
                 has been selected from the primary paths list.";
            }
            uses path-common-properties;
            uses path-forward-properties;
            uses k-requested-paths;
            uses path-compute-info;
            uses path-state;
            container primary-reverse-path {
              when "../../../te:bidirectional = 'true'";
              description
                "The reverse primary path properties.";
              uses path-common-properties;
              uses path-compute-info;
              uses path-state;
              container candidate-secondary-reverse-paths {
                description
                  "The set of referenced candidate reverse secondary
                   paths from the full set of secondary reverse paths
                   which may be used for this primary path.";
                list candidate-secondary-reverse-path {
                  key "secondary-reverse-path";
                  ordered-by user;
                  description
                    "List of candidate secondary reverse path(s)";
                  leaf secondary-reverse-path {
                    type leafref {
                      path "../../../../../../"
                         + "te:secondary-reverse-paths/"
                         + "te:secondary-reverse-path/te:name";
                    }
                    description
                      "A reference to the reverse secondary path when
                       co-routed with the secondary path.";
                  }
                  leaf active {
                    type boolean;
                    config false;
                    description
                      "Indicates an active path that has been
                       selected from the secondary reverse paths
                       list.";
                  }
                }
              }
            }
            container candidate-secondary-paths {
              description
                "The set of candidate secondary paths which may be
                 used for this primary path. When secondary paths are
                 specified in the list the path of the secondary LSP
                 in use must be restricted to those paths
                 referenced.
                 The priority of the secondary paths is specified
                 within the list. Higher priority values are less
                 preferred - that is to say that a path with priority
                 0 is the most preferred path. In the case that the
                 list is empty, any secondary path may be
                 utilised when the current primary path is in use.";
              list candidate-secondary-path {
                key "secondary-path";
                ordered-by user;
                description
                  "List of candidate secondary paths for this
                   tunnel.";
                leaf secondary-path {
                  type leafref {
                    path "../../../../../te:secondary-paths/"
                       + "te:secondary-path/te:name";
                  }
                  description
                    "A reference to the secondary path that may be
                     utilised when the containing primary path is
                     in use.";
                }
                leaf active {
                  type boolean;
                  config false;
                  description
                    "Indicates an active path that has been selected
                     from the candidate secondary paths.";
                }
              }
            }
          }
        }
        container secondary-paths {
          description
            "The set of secondary paths.";
          reference "RFC4872";
          list secondary-path {
            key "name";
            description
              "List of secondary paths for this tunnel.";
            uses path-common-properties;
            leaf preference {
              type uint8 {
                range "1..255";
              }
              default "1";
              description
                "Specifies a preference for this path. The lower the
                 number higher the preference.";
            }
            leaf secondary-reverse-path {
              type leafref {
                path "../../../"
                   + "te:secondary-reverse-paths/"
                   + "te:secondary-reverse-path/te:name";
              }
              description
                "A reference to the secondary reverse path that
                 may be utilised when the secondary path is in use.";
            }
            uses path-compute-info;
            uses protection-restoration-properties;
            uses path-state;
          }
        }
        container secondary-reverse-paths {
          description
            "The set of secondary reverse paths.";
          list secondary-reverse-path {
            key "name";
            description
              "List of secondary paths for this tunnel.";
            uses path-common-properties;
            leaf preference {
              type uint8 {
                range "1..255";
              }
              default "1";
              description
                "Specifies a preference for this path. The lower the
                 number higher the preference. Paths that have the
                 same preference will be activated together.";
            }
            uses path-compute-info;
            uses protection-restoration-properties;
            uses path-state;
          }
        }
        action tunnel-action {
          description
            "Tunnel action.";
          input {
            leaf action-type {
              type identityref {
                base te-types:tunnel-action-type;
              }
              description
                "Tunnel action type.";
            }
          }
          output {
            leaf action-result {
              type identityref {
                base te-types:te-action-result;
              }
              description
                "The result of the tunnel action operation.";
            }
          }
        }
        action protection-external-commands {
          input {
            leaf protection-external-command {
              type identityref {
                base te-types:protection-external-commands;
              }
              description
                "Protection external command.";
            }
            leaf protection-group-ingress-node {
              type boolean;
              default "true";
              description
                "When 'true', indicates that the action is
                 applied on ingress node.
                 By default, the action applies to the ingress node
                 only.";
            }
            leaf protection-group-egress-node {
              type boolean;
              default "false";
              description
                "When set to 'true', indicates that the action is
                 applied on egress node.
                 By default, the action applies to the ingress node
                 only.";
            }
            leaf path-name {
              type string;
              description
                "The name of the path that the external command
                applies to.";
            }
            leaf path-type {
              type te-types:path-type;
              description
                "The type of the path that the external command
                applies to.";
            }
            leaf traffic-type {
              type enumeration {
                enum normal-traffic {
                  description
                    "The manual-switch or forced-switch command
                     applies to the normal traffic (this Tunnel).";
                }
                enum null-traffic {
                  description
                    "The manual-switch or forced-switch command
                     applies to the null traffic.";
                }
                enum extra-traffic {
                  description
                    "The manual-switch or forced-switch command
                     applies to the extra traffic (the extra-traffic
                     Tunnel sharing protection bandwidth with this
                     Tunnel).";
                }
              }
              description
                "Indicates whether the manual-switch or forced-switch
                 commands applies to the normal traffic, the null
                 traffic or the extra-traffic.";
              reference
                "RFC4427";
            }
            leaf extra-traffic-tunnel-ref {
              type tunnel-ref;
              description
                "In case there are multiple extra-traffic tunnels
                 sharing protection bandwidth with this Tunnel
                 (m:n protection), represents which extra-traffic
                 Tunnel the manual-switch or forced-switch to
                 extra-traffic command applies to.";
            }
          }
        }
      }
    }

    /* TE LSPs Data */
    container lsps {
      config false;
      description
        "TE LSPs state container.";
      list lsp {
        key "tunnel-name lsp-id node";
        unique "source destination tunnel-id lsp-id "
          + "extended-tunnel-id";
        description
          "List of LSPs associated with the tunnel.";
        leaf tunnel-name {
          type string;
          description "The TE tunnel name.";
        }
        leaf lsp-id {
          type uint16;
          description
            "Identifier used in the SENDER_TEMPLATE and the
             FILTER_SPEC that can be changed to allow a sender to
             share resources with itself.";
          reference
            "RFC3209";
        }
        leaf node {
          type te-types:te-node-id;
          description
            "The node where the TE LSP state resides on.";
        }
        leaf source {
          type te-types:te-node-id;
          description
            "Tunnel sender address extracted from
             SENDER_TEMPLATE  object.";
          reference
            "RFC3209";
        }
        leaf destination {
          type te-types:te-node-id;
          description
            "The tunnel endpoint address.";
          reference
            "RFC3209";
        }
        leaf tunnel-id {
          type uint16;
          description
            "The tunnel identifier that remains
             constant over the life of the tunnel.";
          reference
            "RFC3209";
        }
        leaf extended-tunnel-id {
          type yang:dotted-quad;
          description
            "The LSP Extended Tunnel ID.";
          reference
            "RFC3209";
        }
        leaf operational-state {
          type identityref {
            base te-types:lsp-state-type;
          }
          description
            "The LSP operational state.";
        }
        leaf signaling-type {
          type identityref {
            base te-types:path-signaling-type;
          }
          description
            "The signaling protocol used to set up this LSP.";
        }
        leaf origin-type {
          type enumeration {
            enum ingress {
              description
                "Origin ingress.";
            }
            enum egress {
              description
                "Origin egress.";
            }
            enum transit {
              description
                "Origin transit.";
            }
          }
          description
            "The origin of the LSP relative to the location of the
             local switch in the path.";
        }
        leaf lsp-resource-status {
          type enumeration {
            enum primary {
              description
                "A primary LSP is a fully established LSP for which
                 the resource allocation has been committed at the
                 data plane.";
            }
            enum secondary {
              description
                "A secondary LSP is an LSP that has been provisioned
                 in the control plane only; e.g. resource allocation
                 has not been committed at the data plane.";
            }
          }
          description
            "LSP resource allocation state.";
          reference
            "RFC4872, section 4.2.1";
        }
        leaf lockout-of-normal {
          type boolean;
          description
            "When set to 'true', it represents a lockout of normal
             traffic external command. When set to 'false', it
             represents a clear lockout of normal traffic external
             command. The lockout of normal traffic command applies
             to this Tunnel.";
          reference
            "RFC4427";
        }
        leaf freeze {
          type boolean;
          description
            "When set to 'true', it represents a freeze external
             command.  When set to 'false', it represents a clear
             freeze external command. The freeze command applies to
             all the Tunnels which are sharing the protection
             resources with this Tunnel.";
          reference
            "RFC4427";
        }
        leaf lsp-protection-role {
          type enumeration {
            enum working {
              description
                "A working LSP must be a primary LSP whilst a
                 protecting LSP can be either a primary or a
                 secondary LSP. Also, known as protected LSPs when
                 working LSPs are associated with protecting LSPs.";
            }
            enum protecting {
              description
                "A secondary LSP is an LSP that has been provisioned
                 in the control plane only; e.g. resource allocation
                 has not been committed at the data plane.";
            }
          }
          description
            "LSP role type.";
          reference
            "RFC4872, section 4.2.1";
        }
        leaf lsp-protection-state {
          type identityref {
            base te-types:lsp-protection-state;
          }
          config false;
          description
            "The reported protection state controlling which
             tunnel is using the resources of the protecting LSP.";
        }
        leaf protection-group-ingress-node-id {
          type te-types:te-node-id;
          description
            "Indicates the te-node-id of the protection group
             ingress node when the APS state represents an external
             command (LoP, SF, MS) applied to it or a WTR timer
             running on it. If the external command is not applied to
             the ingress node or the WTR timer is not running on it,
             this attribute is not specified. A value 0.0.0.0 is used
             when the te-node-id of the protection group ingress node
             is unknown (e.g., because the ingress node is outside
             the scope of control of the server)";
        }
        leaf protection-group-egress-node-id {
          type te-types:te-node-id;
          description
            "Indicates the te-node-id of the protection group egress
             node when the APS state represents an external command
             (LoP, SF, MS) applied to it or a WTR timer running on
             it. If the external command is not applied to the
             ingress node or the WTR timer is not running on it, this
             attribute is not specified. A value 0.0.0.0 is used when
             the te-node-id of the protection group ingress node is
             unknown (e.g., because the ingress node is outside the
             scope of control of the server)";
        }
        container lsp-actual-route-information {
          description
            "RSVP recorded route object information.";
          list lsp-actual-route-information {
            when "../../origin-type = 'ingress'" {
              description
                "Applicable on ingress LSPs only.";
            }
            key "index";
            description
              "Record route list entry.";
            uses te-types:record-route-state;
          }
        }
      }
    }
  }

  /* TE Tunnel RPCs/execution Data */

  rpc tunnels-path-compute {
    description
      "TE tunnels RPC nodes.";
    input {
      container path-compute-info {
        /* 
         * An external path compute module may augment this
         * target.
         */
        description
          "RPC input information.";
      }
    }
    output {
      container path-compute-result {
        /* 
         * An external path compute module may augment this
         * target.
         */
        description
          "RPC output information.";
      }
    }
  }

  rpc tunnels-actions {
    description
      "TE tunnels actions RPC";
    input {
      container tunnel-info {
        description
          "TE tunnel information.";
        choice filter-type {
          mandatory true;
          description
            "Filter choice.";
          case all-tunnels {
            leaf all {
              type empty;
              mandatory true;
              description
                "When present, applies the action on all TE
                 tunnels.";
            }
          }
          case one-tunnel {
            leaf tunnel {
              type tunnel-ref;
              description
                "Apply action on the specific TE tunnel.";
            }
          }
        }
      }
      container action-info {
        description
          "TE tunnel action information.";
        leaf action {
          type identityref {
            base te-types:tunnel-action-type;
          }
          description
            "The action type.";
        }
        leaf disruptive {
          when "derived-from-or-self(../action, "
             + "'te-types:tunnel-action-reoptimize')";
          type empty;
          description
            "When present, specifies whether or not the
             reoptimization
             action is allowed to be disruptive.";
        }
      }
    }
    output {
      leaf action-result {
        type identityref {
          base te-types:te-action-result;
        }
        description
          "The result of the tunnel action operation.";
      }
    }
  }
}
<CODE ENDS>
]]></artwork></figure>

</section>
</section>
<section anchor="te-device-yang-model"><name>TE Device YANG Model</name>

<t>The device TE YANG module ('ietf-te-device') models data that is specific to
managing a TE device.  This module augments the generic TE YANG module.</t>

<section anchor="module-structure-1"><name>Module Structure</name>

<section anchor="te-interfaces"><name>TE Interfaces</name>

<t>This branch of the model manages TE interfaces that are present on a device. 
Examples of TE interface properties are:</t>

<t><list style="symbols">
  <t>Maximum reservable bandwidth, bandwidth constraints (BC)</t>
  <t>Flooding parameters
  <list style="symbols">
      <t>Flooding intervals and threshold values</t>
    </list></t>
  <t>Interface attributes
  <list style="symbols">
      <t>(Extended) administrative groups</t>
      <t>SRLG values</t>
      <t>TE metric value</t>
    </list></t>
  <t>Fast reroute backup tunnel properties (such as static, auto-tunnel)</t>
</list></t>

<t>The derived state associated with interfaces is grouped under the interface
"state" sub-container as shown in <xref target="fig-if-te-state"/>.  This covers state data
such as:</t>

<t><list style="symbols">
  <t>Bandwidth information: maximum bandwidth, available bandwidth at different
priorities and for each class-type (CT)</t>
  <t>List of admitted LSPs
  <list style="symbols">
      <t>Name, bandwidth value and pool, time, priority</t>
    </list></t>
  <t>Statistics: state counters, flooding counters, admission counters
(accepted/rejected), preemption counters</t>
  <t>Adjacency information
  <list style="symbols">
      <t>Neighbor address</t>
      <t>Metric value</t>
    </list></t>
</list></t>

<figure title="TE interface state YANG subtree" anchor="fig-if-te-state"><artwork><![CDATA[
module: ietf-te-device
  augment /te:te:
      +--rw interfaces
         .
         +-- rw te-dev:te-attributes
                <<intended configuration>>
             .
             +-- ro state
                <<derived state associated with the TE interface>>
]]></artwork></figure>

</section>
</section>
<section anchor="tree-diagram-1"><name>Tree Diagram</name>

<t><xref target="fig-te-dev-tree"/> shows the tree diagram of the device TE YANG model defined in
modules 'ietf-te-device.yang'.</t>

<figure title="TE Tunnel device model YANG tree diagram" anchor="fig-te-dev-tree"><artwork><![CDATA[
module: ietf-te-device

  augment /te:te:
    +--rw interfaces
       +--rw threshold-type?            enumeration
       +--rw delta-percentage?          rt-types:percentage
       +--rw threshold-specification?   enumeration
       +--rw up-thresholds*             rt-types:percentage
       +--rw down-thresholds*           rt-types:percentage
       +--rw up-down-thresholds*        rt-types:percentage
       +--rw interface* [interface]
          +--rw interface                           if:interface-ref
          +--rw te-metric?
          |       te-types:te-metric
          +--rw (admin-group-type)?
          |  +--:(value-admin-groups)
          |  |  +--rw (value-admin-group-type)?
          |  |     +--:(admin-groups)
          |  |     |  +--rw admin-group?
          |  |     |          te-types:admin-group
          |  |     +--:(extended-admin-groups)
          |  |              {te-types:extended-admin-groups}?
          |  |        +--rw extended-admin-group?
          |  |                te-types:extended-admin-group
          |  +--:(named-admin-groups)
          |     +--rw named-admin-groups* [named-admin-group]
          |             {te-types:extended-admin-groups,
          |              te-types:named-extended-admin-groups}?
          |        +--rw named-admin-group    leafref
          +--rw (srlg-type)?
          |  +--:(value-srlgs)
          |  |  +--rw values* [value]
          |  |     +--rw value    uint32
          |  +--:(named-srlgs)
          |     +--rw named-srlgs* [named-srlg]
          |             {te-types:named-srlg-groups}?
          |        +--rw named-srlg    leafref
          +--rw threshold-type?                     enumeration
          +--rw delta-percentage?
          |       rt-types:percentage
          +--rw threshold-specification?            enumeration
          +--rw up-thresholds*
          |       rt-types:percentage
          +--rw down-thresholds*
          |       rt-types:percentage
          +--rw up-down-thresholds*
          |       rt-types:percentage
          +--rw switching-capabilities* [switching-capability]
          |  +--rw switching-capability    identityref
          |  +--rw encoding?               identityref
          +--ro te-advertisements-state
             +--ro flood-interval?           uint32
             +--ro last-flooded-time?        uint32
             +--ro next-flooded-time?        uint32
             +--ro last-flooded-trigger?     enumeration
             +--ro advertised-level-areas* [level-area]
                +--ro level-area    uint32
  augment /te:te/te:globals:
    +--rw lsp-install-interval?        uint32
    +--rw lsp-cleanup-interval?        uint32
    +--rw lsp-invalidation-interval?   uint32
  augment /te:te/te:tunnels/te:tunnel:
    +--rw path-invalidation-action?    identityref
    +--rw lsp-install-interval?        uint32
    +--rw lsp-cleanup-interval?        uint32
    +--rw lsp-invalidation-interval?   uint32
  augment /te:te/te:lsps/te:lsp:
    +--ro lsp-timers
    |  +--ro uptime?            uint32
    |  +--ro time-to-install?   uint32
    |  +--ro time-to-destroy?   uint32
    +--ro downstream-info
    |  +--ro nhop?                 te-types:te-tp-id
    |  +--ro outgoing-interface?   if:interface-ref
    |  +--ro neighbor
    |  |  +--ro id?     te-gen-node-id
    |  |  +--ro type?   enumeration
    |  +--ro label?                rt-types:generalized-label
    +--ro upstream-info
       +--ro phop?       te-types:te-tp-id
       +--ro neighbor
       |  +--ro id?     te-gen-node-id
       |  +--ro type?   enumeration
       +--ro label?      rt-types:generalized-label

  rpcs:
    +---x link-state-update
       +---w input
          +---w (filter-type)
             +--:(match-all)
             |  +---w all          empty
             +--:(match-one-interface)
                +---w interface?   if:interface-ref

]]></artwork></figure>

</section>
<section anchor="yang-module-1"><name>YANG Module</name>

<t>The device TE YANG module 'ietf-te-device' imports the following module(s):</t>

<t><list style="symbols">
  <t>ietf-interfaces defined in <xref target="RFC8343"/></t>
  <t>ietf-routing-types defined in <xref target="RFC8294"/></t>
  <t>ietf-te-types defined in <xref target="RFC8776"/></t>
  <t>ietf-te defined in this document</t>
</list></t>

<figure title="TE device data model YANG module" anchor="fig-te-device-types"><artwork><![CDATA[
<CODE BEGINS> file "ietf-te-device@2023-06-16.yang"
module ietf-te-device {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-te-device";

  /* Replace with IANA when assigned */

  prefix te-dev;

  /* Import TE module */

  import ietf-te {
    prefix te;
    reference
      "RFCXXXX: A YANG Data Model for Traffic Engineering
       Tunnels and Interfaces";
  }

  /* Import TE types */

  import ietf-te-types {
    prefix te-types;
    reference
      "RFC8776: Common YANG Data Types for Traffic Engineering.";
  }
  import ietf-interfaces {
    prefix if;
    reference
      "RFC8343: A YANG Data Model for Interface Management";
  }
  import ietf-routing-types {
    prefix rt-types;
    reference
      "RFC8294: Common YANG Data Types for the Routing Area";
  }

  organization
    "IETF Traffic Engineering Architecture and Signaling (TEAS)
     Working Group";
  contact
    "WG Web:   <https://tools.ietf.org/wg/teas/>
     WG List:  <mailto:teas@ietf.org>

     Editor:   Tarek Saad
               <mailto:tsaad.net@gmail.com>

     Editor:   Rakesh Gandhi
               <mailto:rgandhi@cisco.com>

     Editor:   Vishnu Pavan Beeram
               <mailto:vbeeram@juniper.net>

     Editor:   Himanshu Shah
               <mailto:hshah@ciena.com>

     Editor:   Xufeng Liu
               <mailto: xufeng.liu.ietf@gmail.com>

     Editor:   Igor Bryskin
               <mailto:i_bryskin@yahoo.com>

     Editor:   Oscar Gonzalez de Dios
               <mailto: oscar.gonzalezdedios@telefonica.com>";

  description
    "This module defines a data model for TE device configurations,
     state, and RPCs. The model fully conforms to the
     Network Management Datastore Architecture (NMDA).

     Copyright (c) 2023 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
     for full legal notices.";

  // RFC Ed.: replace XXXX with actual RFC number and remove this
  // note.
  // RFC Ed.: update the date below with the date of RFC publication
  // and remove this note.

  revision 2023-06-16 {
    description
      "Initial revision for the TE device YANG module.";
    reference
      "RFCXXXX: A YANG Data Model for Traffic Engineering Tunnels
       and Interfaces";
  }

  grouping lsp-device-timers {
    description
      "Device TE LSP timers configs.";
    leaf lsp-install-interval {
      type uint32;
      units "seconds";
      description
        "TE LSP installation delay time.";
    }
    leaf lsp-cleanup-interval {
      type uint32;
      units "seconds";
      description
        "TE LSP cleanup delay time.";
    }
    leaf lsp-invalidation-interval {
      type uint32;
      units "seconds";
      description
        "TE LSP path invalidation before taking action delay time.";
    }
  }

  grouping te-igp-flooding-bandwidth-config {
    description
      "Configurable items for igp flooding bandwidth
       threshold configuration.";
    leaf threshold-type {
      type enumeration {
        enum delta {
          description
            "'delta' indicates that the local
             system should flood IGP updates when a
             change in reserved bandwidth >= the specified
             delta occurs on the interface.";
        }
        enum threshold-crossed {
          description
            "THRESHOLD-CROSSED indicates that
             the local system should trigger an update (and
             hence flood) the reserved bandwidth when the
             reserved bandwidth changes such that it crosses,
             or becomes equal to one of the threshold values.";
        }
      }
      description
        "The type of threshold that should be used to specify the
         values at which bandwidth is flooded. 'delta' indicates that
         the local system should flood IGP updates when a change in
         reserved bandwidth >= the specified delta occurs on the
         interface. Where 'threshold-crossed' is specified, the local
         system should trigger an update (and hence flood) the
         reserved bandwidth when the reserved bandwidth changes such
         that it crosses, or becomes equal to one of the threshold
         values.";
    }
    leaf delta-percentage {
      when "../threshold-type = 'delta'" {
        description
          "The percentage delta can only be specified when the
           threshold type is specified to be a percentage delta of
           the reserved bandwidth.";
      }
      type rt-types:percentage;
      description
        "The percentage of the maximum-reservable-bandwidth
         considered as the delta that results in an IGP update
         being flooded.";
    }
    leaf threshold-specification {
      when "../threshold-type = 'threshold-crossed'" {
        description
          "The selection of whether mirrored or separate threshold
           values are to be used requires user specified thresholds
           to be set.";
      }
      type enumeration {
        enum mirrored-up-down {
          description
            "mirrored-up-down indicates that a single set of
             threshold values should be used for both increasing
             and decreasing bandwidth when determining whether
             to trigger updated bandwidth values to be flooded
             in the IGP TE extensions.";
        }
        enum separate-up-down {
          description
            "separate-up-down indicates that a separate
             threshold values should be used for the increasing
             and decreasing bandwidth when determining whether
             to trigger updated bandwidth values to be flooded
             in the IGP TE extensions.";
        }
      }
      description
        "This value specifies whether a single set of threshold
         values should be used for both increasing and decreasing
         bandwidth when determining whether to trigger updated
         bandwidth values to be flooded in the IGP TE extensions.
         'mirrored-up-down' indicates that a single value (or set of
         values) should be used for both increasing and decreasing
         values, where 'separate-up-down' specifies that the
         increasing and decreasing values will be separately
         specified.";
    }
    leaf-list up-thresholds {
      when "../threshold-type = 'threshold-crossed'"
         + "and ../threshold-specification = 'separate-up-down'" {
        description
          "A list of up-thresholds can only be specified when the
           bandwidth update is triggered based on crossing a
           threshold and separate up and down thresholds are
           required.";
      }
      type rt-types:percentage;
      description
        "The thresholds (expressed as a percentage of the maximum
         reservable bandwidth) at which bandwidth updates are to be
         triggered when the bandwidth is increasing.";
    }
    leaf-list down-thresholds {
      when "../threshold-type = 'threshold-crossed'"
         + "and ../threshold-specification = 'separate-up-down'" {
        description
          "A list of down-thresholds can only be specified when the
           bandwidth update is triggered based on crossing a
           threshold and separate up and down thresholds are
           required.";
      }
      type rt-types:percentage;
      description
        "The thresholds (expressed as a percentage of the maximum
         reservable bandwidth) at which bandwidth updates are to be
         triggered when the bandwidth is decreasing.";
    }
    leaf-list up-down-thresholds {
      when "../threshold-type = 'threshold-crossed'"
         + "and ../threshold-specification = 'mirrored-up-down'" {
        description
          "A list of thresholds corresponding to both increasing
           and decreasing bandwidths can be specified only when an
           update is triggered based on crossing a threshold, and
           the same up and down thresholds are required.";
      }
      type rt-types:percentage;
      description
        "The thresholds (expressed as a percentage of the maximum
         reservable bandwidth of the interface) at which bandwidth
         updates are flooded - used both when the bandwidth is
         increasing and decreasing.";
    }
  }

  /**
   * TE device augmentations
   */
  augment "/te:te" {
    description
      "TE global container.";
    /* TE Interface Configuration Data */
    container interfaces {
      description
        "Configuration data model for TE interfaces.";
      uses te-igp-flooding-bandwidth-config;
      list interface {
        key "interface";
        description
          "TE interfaces.";
        leaf interface {
          type if:interface-ref;
          description
            "TE interface name.";
        }
        /* TE interface parameters */
        leaf te-metric {
          type te-types:te-metric;
          description
            "TE interface metric.";
        }
        choice admin-group-type {
          description
            "TE interface administrative groups
             representation type.";
          case value-admin-groups {
            choice value-admin-group-type {
              description
                "choice of admin-groups.";
              case admin-groups {
                description
                  "Administrative group/Resource
                   class/Color.";
                leaf admin-group {
                  type te-types:admin-group;
                  description
                    "TE interface administrative group.";
                }
              }
              case extended-admin-groups {
                if-feature "te-types:extended-admin-groups";
                description
                  "Extended administrative group/Resource
                   class/Color.";
                leaf extended-admin-group {
                  type te-types:extended-admin-group;
                  description
                    "TE interface extended administrative group.";
                }
              }
            }
          }
          case named-admin-groups {
            list named-admin-groups {
              if-feature "te-types:extended-admin-groups";
              if-feature "te-types:named-extended-admin-groups";
              key "named-admin-group";
              description
                "A list of named admin-group entries.";
              leaf named-admin-group {
                type leafref {
                  path "../../../../te:globals/"
                     + "te:named-admin-groups/te:named-admin-group/"
                     + "te:name";
                }
                description
                  "A named admin-group entry.";
              }
            }
          }
        }
        choice srlg-type {
          description
            "Choice of SRLG configuration.";
          case value-srlgs {
            list values {
              key "value";
              description
                "List of SRLG values that
                 this link is part of.";
              leaf value {
                type uint32 {
                  range "0..4294967295";
                }
                description
                  "Value of the SRLG";
              }
            }
          }
          case named-srlgs {
            list named-srlgs {
              if-feature "te-types:named-srlg-groups";
              key "named-srlg";
              description
                "A list of named SRLG entries.";
              leaf named-srlg {
                type leafref {
                  path "../../../../te:globals/"
                     + "te:named-srlgs/te:named-srlg/te:name";
                }
                description
                  "A named SRLG entry.";
              }
            }
          }
        }
        uses te-igp-flooding-bandwidth-config;
        list switching-capabilities {
          key "switching-capability";
          description
            "List of interface capabilities for this interface.";
          leaf switching-capability {
            type identityref {
              base te-types:switching-capabilities;
            }
            description
              "Switching Capability for this interface.";
          }
          leaf encoding {
            type identityref {
              base te-types:lsp-encoding-types;
            }
            description
              "Encoding supported by this interface.";
          }
        }
        container te-advertisements-state {
          config false;
          description
            "TE interface advertisements state container.";
          leaf flood-interval {
            type uint32;
            description
              "The periodic flooding interval.";
          }
          leaf last-flooded-time {
            type uint32;
            units "seconds";
            description
              "Time elapsed since last flooding in seconds.";
          }
          leaf next-flooded-time {
            type uint32;
            units "seconds";
            description
              "Time remained for next flooding in seconds.";
          }
          leaf last-flooded-trigger {
            type enumeration {
              enum link-up {
                description
                  "Link-up flooding trigger.";
              }
              enum link-down {
                description
                  "Link-down flooding trigger.";
              }
              enum threshold-up {
                description
                  "Bandwidth reservation up threshold.";
              }
              enum threshold-down {
                description
                  "Bandwidth reservation down threshold.";
              }
              enum bandwidth-change {
                description
                  "Bandwidth capacity change.";
              }
              enum user-initiated {
                description
                  "Initiated by user.";
              }
              enum srlg-change {
                description
                  "SRLG property change.";
              }
              enum periodic-timer {
                description
                  "Periodic timer expired.";
              }
            }
            default "periodic-timer";
            description
              "Trigger for the last flood.";
          }
          list advertised-level-areas {
            key "level-area";
            description
              "List of level-areas that the TE interface is
               advertised in.";
            leaf level-area {
              type uint32;
              description
                "The IGP area or level where the TE interface link
                 state is advertised in.";
            }
          }
        }
      }
    }
  }

  /* TE globals device augmentation */

  augment "/te:te/te:globals" {
    description
      "Global TE device specific configuration parameters.";
    uses lsp-device-timers;
  }

  /* TE tunnels device configuration augmentation */

  augment "/te:te/te:tunnels/te:tunnel" {
    description
      "Tunnel device dependent augmentation.";
    leaf path-invalidation-action {
      type identityref {
        base te-types:path-invalidation-action-type;
      }
      description
        "Tunnel path invalidation action.";
    }
    uses lsp-device-timers;
  }

  /* TE LSPs device state augmentation */

  augment "/te:te/te:lsps/te:lsp" {
    description
      "TE LSP device dependent augmentation.";
    container lsp-timers {
      when "../te:origin-type = 'ingress'" {
        description
          "Applicable to ingress LSPs only.";
      }
      description
        "Ingress LSP timers.";
      leaf uptime {
        type uint32;
        units "seconds";
        description
          "The LSP uptime.";
      }
      leaf time-to-install {
        type uint32;
        units "seconds";
        description
          "The time remaining for a new LSP to be instantiated
           in forwarding to carry traffic.";
      }
      leaf time-to-destroy {
        type uint32;
        units "seconds";
        description
          "The time remaining for a existing LSP to be deleted
           from forwarding.";
      }
    }
    container downstream-info {
      when "../te:origin-type != 'egress'" {
        description
          "Downstream information of the LSP.";
      }
      description
        "downstream information.";
      leaf nhop {
        type te-types:te-tp-id;
        description
          "downstream next-hop address.";
      }
      leaf outgoing-interface {
        type if:interface-ref;
        description
          "downstream interface.";
      }
      container neighbor {
        uses te:te-generic-node-id;
        description
          "downstream neighbor address.";
      }
      leaf label {
        type rt-types:generalized-label;
        description
          "downstream label.";
      }
    }
    container upstream-info {
      when "../te:origin-type != 'ingress'" {
        description
          "Upstream information of the LSP.";
      }
      description
        "upstream information.";
      leaf phop {
        type te-types:te-tp-id;
        description
          "upstream next-hop or previous-hop address.";
      }
      container neighbor {
        uses te:te-generic-node-id;
        description
          "upstream neighbor address.";
      }
      leaf label {
        type rt-types:generalized-label;
        description
          "upstream label.";
      }
    }
  }

  /* TE interfaces RPCs/execution Data */

  rpc link-state-update {
    description
      "Triggers a link state update for the specific interface.";
    input {
      choice filter-type {
        mandatory true;
        description
          "Filter choice.";
        case match-all {
          leaf all {
            type empty;
            mandatory true;
            description
              "Match all TE interfaces.";
          }
        }
        case match-one-interface {
          leaf interface {
            type if:interface-ref;
            description
              "Match a specific TE interface.";
          }
        }
      }
    }
  }
}
<CODE ENDS>
]]></artwork></figure>

</section>
</section>
<section anchor="notifications"><name>Notifications</name>

<t>Notifications are a key component of any topology data model.</t>

<t><xref target="RFC8639"/> and <xref target="RFC8641"/> define a subscription mechanism and a push
mechanism for YANG datastores.  These mechanisms currently allow the
user to:</t>

<t><list style="symbols">
  <t>Subscribe to notifications on a per-client basis.</t>
  <t>Specify subtree filters or XML Path Language (XPath) filters so
that only contents of interest will be sent.</t>
  <t>Specify either periodic or on-demand notifications.</t>
</list></t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document registers the following URIs in the IETF XML registry
<xref target="RFC3688"/>.
Following the format in <xref target="RFC3688"/>, the following registrations are
requested to be made.</t>

<figure><artwork><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-te
   Registrant Contact:  The IESG.
   XML: N/A, the requested URI is an XML namespace.

   URI: urn:ietf:params:xml:ns:yang:ietf-te-device
   Registrant Contact:  The IESG.
   XML: N/A, the requested URI is an XML namespace.
]]></artwork></figure>

<t>This document registers two YANG modules in the YANG Module Names
registry <xref target="RFC6020"/>.</t>

<figure><artwork><![CDATA[
   Name:       ietf-te
   Namespace:  urn:ietf:params:xml:ns:yang:ietf-te
   Prefix:     te
   Reference:  RFCXXXX

   Name:       ietf-te-device
   Namespace:  urn:ietf:params:xml:ns:yang:ietf-te-device
   Prefix:     te-device
   Reference:  RFCXXXX
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The YANG module specified in this document defines a schema for data that is
designed to be accessed via network management protocols such as NETCONF
<xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure
transport layer, and the mandatory-to-implement secure transport is Secure
Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the
mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>

<t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/> provides the
means to restrict access for particular NETCONF or RESTCONF users to a
preconfigured subset of all available NETCONF or RESTCONF protocol operations
and content.</t>

<t>There are a number of data nodes defined in this YANG module that are
writable/creatable/deletable (i.e., config true, which is the default). These
data nodes may be considered sensitive or vulnerable in some network
environments. Write operations (e.g., edit-config) to these data nodes without
proper protection can have a negative effect on network operations. These are
the subtrees and data nodes and their sensitivity/vulnerability:</t>

<t>"/te/globals":  This module specifies the global TE configurations on a device.
Unauthorized access to this container could cause the device to ignore packets
it should receive and process.</t>

<t>"/te/tunnels":  This list specifies the configuration and state of TE Tunnels
present on the device or controller.  Unauthorized access to this list could
cause the device to ignore packets it should receive and process. An attacker
may also use state to derive information about the network topology,
and subsequently orchestrate further attacks.</t>

<t>"/te/interfaces":  This list specifies the configuration and state TE interfaces
on a device. Unauthorized access to this list could cause the device to ignore packets it
should receive and process.</t>

<t>Some of the readable data nodes in this YANG module may be considered sensitive
or vulnerable in some network environments. It is thus important to control
read access (e.g., via get, get-config, or notification) to these data nodes.
These are the subtrees and data nodes and their sensitivity/vulnerability:</t>

<t>"/te/lsps": this list contains information state about established LSPs in the network.
An attacker can use this information to derive information about the network topology,
and subsequently orchestrate further attacks.</t>

<t>Some of the RPC operations in this YANG module may be considered sensitive or
vulnerable in some network environments. It is thus important to control access
to these operations. These are the operations and their
sensitivity/vulnerability:</t>

<t>"/te/tunnels-actions": using this RPC, an attacker can modify existing paths that
may be carrying live traffic, and hence result to interruption to services
carried over the network.</t>

<t>"/te/tunnels-path-compute": using this RPC, an attacker can retrieve secured
information about the network provider which can be used to orchestrate further
attacks.</t>

<t>The security considerations spelled out in the YANG 1.1 specification
<xref target="RFC7950"/> apply for this document as well.</t>

</section>
<section anchor="acknowledgement"><name>Acknowledgement</name>

<t>The authors would like to thank the  members of the multi-vendor YANG design
team who are involved in the definition of this model.</t>

<t>The authors would like to thank Tom Petch and Adrian Farrel for reviewing and
providing useful feedback about the document. The authors would also like to
thank Loa Andersson, Lou Berger, Sergio Belotti, Italo Busi, Carlo Perocchio,
Francesco Lazzeri, Aihua Guo, Dhruv Dhody, and Raqib Jones for providing
feedback on this document.</t>

</section>
<section anchor="contributors"><name>Contributors</name>

<figure><artwork><![CDATA[
   Himanshu Shah
   Ciena

   Email: hshah@ciena.com


   Xia Chen
   Huawei Technologies

   Email: jescia.chenxia@huawei.com


   Bin Wen
   Comcast

   Email: Bin_Wen@cable.comcast.com

]]></artwork></figure>

</section>
<section anchor="AppendixA"><name>Appendix A: Data Tree Examples</name>

<t>This section contains examples of use of the model with RESTCONF <xref target="RFC8040"/> and JSON encoding.</t>

<t>For the example we will use a 4 node MPLS network were RSVP-TE MPLS Tunnels can be setup. The
loopbacks of each router are shown. The network in <xref target="AppFig-Topo"/> will be used in the examples
described in the following sections.</t>

<figure title="TE network used in data tree examples" anchor="AppFig-Topo"><artwork><![CDATA[
 192.0.2.1        192.0.2.2      192.0.2.4
 +-------+        +-------+      +-------+
 |       |        |       |      |       |
 |   A   +--------+   B   +------+   D   |
 +---+---+        +-------+      +---+---+
     |                               |
     |            +-------+          |
     |            |       |          |
     +------------+   C   +----------+
                  |       |
                  +-------+
                  192.0.2.3
]]></artwork></figure>

<section anchor="TeTunnel"><name>Basic Tunnel Setup</name>

<t>This example uses the TE Tunnel YANG data model defined in this document to create an
RSVP-TE signaled Tunnel of packet LSP encoding type. First, the TE Tunnel is created with no specific restrictions or constraints (e.g., protection or restoration).
The TE Tunnel ingresses on router A and egresses on router D.</t>

<t>In this case, the TE Tunnel is created without specifying additional information about the primary paths.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/tunnels HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_2",
      "encoding": "te-types:lsp-encoding-packet",
      "admin-state": "te-types:tunnel-state-up",
      "source": "192.0.2.1",
      "destination": "192.0.2.4",
      "bidirectional": "false",
      "signaling-type": "te-types:path-setup-rsvp"
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="global-named-path-constraints"><name>Global Named Path Constraints</name>

<t>This example uses the YANG data model to create a 'named path constraint' that can be reference by TE Tunnels.
The path constraint, in this case, limits the TE Tunnel hops for the computed path.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/globals/named-path-constraints
     HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json


  "ietf-te:named-path-constraint": {
          "name": "max-hop-3",
          "path-metric-bounds": {
            "path-metric-bound": {
              "metric-type": "te-types:path-metric-hop",
              "upper-bound": "3"
    }
   }
  }
}
]]></artwork></figure>

</section>
<section anchor="tunnel-with-global-path-constraint"><name>Tunnel with Global Path Constraint</name>

<t>In this example, the previously created 'named path constraint' is applied to the TE Tunnel created in <xref target="TeTunnel"/>.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/tunnels HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:ietf-tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_4_1",
      "encoding": "te-types:lsp-encoding-packet",
      "description": "Simple_LSP_with_named_path",
      "admin-state": "te-types:tunnel-state-up",
      "source": "192.0.2.1",
      "destination": "192.0.2.4",
      "signaling-type": "path-setup-rsvp",
      "primary-paths": [
        {
          "primary-path": {
            "name": "Simple_LSP_1",
            "use-path-computation": "true",
            "named-path-constraint": "max-hop-3"
          }
        }
      ]
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="tunnel-with-per-tunnel-path-constraint"><name>Tunnel with Per-tunnel Path Constraint</name>

<t>In this example, the a per tunnel path constraint is explicitly indicated under the TE Tunnel created in <xref target="TeTunnel"/> to constrain the computed path for the tunnel.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/tunnels HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_4_2",
      "encoding": "te-types:lsp-encoding-packet",
      "admin-state": "te-types:tunnel-state-up",
      "source": "192.0.2.1",
      "destination": "192.0.2.4",
      "signaling-type": "te-types:path-setup-rsvp",
      "primary-paths": {
        "primary-path": [
          {
            "name": "path1",
            "path-metric-bounds": {
              "path-metric-bound": [ 
                {
                  "metric-type": "te-types:path-metric-hop",
                  "upper-bound": "3"
                }
              ]
            }
          }
        ]
      }
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="tunnel-state"><name>Tunnel State</name>

<t>In this example, the 'GET' query is sent to return the state stored about the tunnel.</t>

<figure><artwork><![CDATA[
GET  /restconf/data/ietf-te:te/tunnels +
     /tunnel="Example_LSP_Tunnel_A_4_1"
     /p2p-primary-paths/ HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
]]></artwork></figure>

<t>The request, with status code 200 would include, for example, the following json:</t>

<figure><artwork><![CDATA[
{
  "ietf-te:primary-paths": {
    "primary-path": [
      {
        "name": "path1",
        "path-computation-method": "te-types:path-locally-computed",
        "computed-paths-properties": {
          "computed-path-properties": [
            {
              "k-index": "1",
              "path-properties": {
                "path-route-objects": {
                  "path-route-object": [
                    {
                      "index": "1",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": "2",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.4"
                      }
                    }
                  ]
                }
              }
            }
          ]
        },
        "lsps": {
          "lsp": [
            {
              "tunnel-name": "Example_LSP_Tunnel_A_4_1",
              "node": "192.0.2.1 ",
              "lsp-id": "25356"
            }
          ]
        }
      }
    ]
  }
}
]]></artwork></figure>

</section>
<section anchor="example-te-tunnel-with-primary-and-secondary-paths"><name>Example TE Tunnel with Primary and Secondary Paths</name>

<figure title="TE network used in data tree examples" anchor="AppFig-Topo2"><artwork><![CDATA[
                       +----------+          +----------+
                     +-|192.0.2.9 |---+      |192.0.2.10|
                     | +----------+   |      +----------+
                     |                |          |   |
+----------+    +----------+     +----------+    |   |
|192.0.2.8 |----|192.0.2.3 |-----|192.0.2.4 |----+   |
+----------+    +----------+     +----------+        |
  |                  |                |              |
+----------+         |                |              |
|192.0.2.1 |---------+                |           +----------+
+----------+                          +-----------|192.0.2.5 |
      |  |                                        +----------+
      |  |              +----------+                     | |
      |  +--------------|192.0.2.2 |---------------------+ |
      |                 +----------+                       |
      |                       | |                          |
  +----------+                | |                   +----------+
  |192.0.2.6 |----------------+ +-------------------|192.0.2.7 |
  +----------+                                      +----------+

]]></artwork></figure>

<t>Below is the state retrieved for a TE tunnel from source 192.0.2.1 to 192.0.2.5
with primary, secondary, reverse, and secondary reverse paths as shown in <xref target="AppFig-Topo2"/>.</t>

<figure><artwork><![CDATA[
{
  "ietf-te:te": {
    "tunnels": {
      "tunnel": [
        {
          "name": "example-1",
          "description": "Example in slide 1",
          "source": "192.0.2.1",
          "destination": "192.0.2.5",
          "bidirectional": false,
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-1 (fwd)",
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "name": "primary-2 (rev)",
                  "explicit-route-objects-always": {
                    "route-object-include-exclude": [
                      {
                        "index": 1,
                        "numbered-node-hop": {
                          "node-id": "192.0.2.3",
                          "hop-type": "loose"
                        }
                      }
                    ]
                  },
                  "candidate-secondary-reverse-paths": {
                    "candidate-secondary-reverse-path": [
                      "secondary-3 (rev)",
                      "secondary-4 (rev)",
                      "secondary-5 (rev)"
                    ]
                  }
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    "secondary-1 (fwd)",
                    "secondary-2 (fwd)"
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-1 (fwd)",
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-2 (fwd)",
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          },
          "secondary-reverse-paths": {
            "secondary-reverse-path": [
              {
                "name": "secondary-3 (rev)",
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.4",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-4 (rev)",
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.4"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.3",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-5 (rev)",
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.3"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1",
                        "hop-type":"loose"
                      }
                    }
                  ]
                }
              }
            ]
          }
        },
        {
          "name": "example-3",
          "description": "Example in slide 3",
          "source": "192.0.2.1",
          "destination": "192.0.2.5",
          "bidirectional": true,
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-1 (bidir)",
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    "secondary-1 (bidir)",
                    "secondary-2 (bidir)"
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-1 (bidir)",
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-2 (bidir)",
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          }
        },
        {
          "name": "example-4",
          "description": "Example in slide 4",
          "source": "192.0.2.1",
          "destination": "192.0.2.5",
          "bidirectional": false,
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-1 (fwd)",
                "co-routed": [null],
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "name": "primary-2 (rev)",
                  "candidate-secondary-reverse-paths": {
                    "candidate-secondary-reverse-path": [
                      "secondary-3 (rev)",
                      "secondary-4 (rev)"
                    ]
                  }
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    "secondary-1 (fwd)",
                    "secondary-2 (fwd)"
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-1 (fwd)",
                "co-routed": [null],
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-2 (fwd)",
                "co-routed": [null],
                "explicit-route-objects-always": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          },
          "secondary-reverse-paths": {
            "secondary-reverse-path": [
              {
                "name": "secondary-3 (rev)"
              },
              {
                "name": "secondary-4 (rev)"
              }
            ]
          }
        }
      ]
    }
  }
}
]]></artwork></figure>

</section>
</section>
<section anchor="AppendixB"><name>Appendix B: Full Model Tree Diagram</name>

<t><xref target="fig-te-tree-full"/> shows the full tree diagram of the TE YANG model defined in
module 'ietf-te.yang'.</t>

<figure title="Full tree diagram of TE Tunnel YANG data model" anchor="fig-te-tree-full"><artwork><![CDATA[
module: ietf-te
  +--rw te
     +--rw enable?    boolean
     +--rw globals
     |  +--rw named-admin-groups
     |  |  +--rw named-admin-group* [name]
     |  |          {te-types:extended-admin-groups,
     |  |           te-types:named-extended-admin-groups}?
     |  |     +--rw name            string
     |  |     +--rw bit-position?   uint32
     |  +--rw named-srlgs
     |  |  +--rw named-srlg* [name] {te-types:named-srlg-groups}?
     |  |     +--rw name     string
     |  |     +--rw value?   te-types:srlg
     |  |     +--rw cost?    uint32
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
     |             {te-types:named-path-constraints}?
     |        +--rw name                       string
     |        +---u path-constraints-common
     +--rw tunnels
     |  +--rw tunnel* [name]
     |     +--rw name                                    string
     |     +--rw alias?                                  string
     |     +--rw identifier?                             uint32
     |     +--rw color?                                  uint32
     |     +--rw description?                            string
     |     +--rw admin-state?                            identityref
     |     +--ro operational-state?                      identityref
     |     +---u te-types:encoding-and-switching-type
     |     +---u tunnel-common-attributes
     |     +--rw controller
     |     |  +--rw protocol-origin?        identityref
     |     |  +--rw controller-entity-id?   string
     |     +--rw reoptimize-timer?                       uint16
     |     +---u tunnel-associations-properties
     |     +---u protection-restoration-properties
     |     +---u te-types:tunnel-constraints
     |     +---u tunnel-hierarchy-properties
     |     +--rw primary-paths
     |     |  +--rw primary-path* [name]
     |     |     +--ro active?                      boolean
     |     |     +---u path-common-properties
     |     |     +---u path-forward-properties
     |     |     +---u k-requested-paths
     |     |     +---u path-compute-info
     |     |     +---u path-state
     |     |     +--rw primary-reverse-path
     |     |     |  +---u path-common-properties
     |     |     |  +---u path-compute-info
     |     |     |  +---u path-state
     |     |     |  +--rw candidate-secondary-reverse-paths
     |     |     |     +--rw candidate-secondary-reverse-path*
     |     |     |             [secondary-reverse-path]
     |     |     |        +--rw secondary-reverse-path    leafref
     |     |     |        +--ro active?                   boolean
     |     |     +--rw candidate-secondary-paths
     |     |        +--rw candidate-secondary-path* [secondary-path]
     |     |           +--rw secondary-path    leafref
     |     |           +--ro active?           boolean
     |     +--rw secondary-paths
     |     |  +--rw secondary-path* [name]
     |     |     +---u path-common-properties
     |     |     +--rw preference?                          uint8
     |     |     +--rw secondary-reverse-path?              leafref
     |     |     +---u path-compute-info
     |     |     +---u protection-restoration-properties
     |     |     +---u path-state
     |     +--rw secondary-reverse-paths
     |     |  +--rw secondary-reverse-path* [name]
     |     |     +---u path-common-properties
     |     |     +--rw preference?                          uint8
     |     |     +---u path-compute-info
     |     |     +---u protection-restoration-properties
     |     |     +---u path-state
     |     +---x tunnel-action
     |     |  +---w input
     |     |  |  +---w action-type?   identityref
     |     |  +--ro output
     |     |     +--ro action-result?   identityref
     |     +---x protection-external-commands
     |        +---w input
     |           +---w protection-external-command?     identityref
     |           +---w protection-group-ingress-node?   boolean
     |           +---w protection-group-egress-node?    boolean
     |           +---w path-name?                       string
     |           +---w path-type?
     |           |       te-types:path-type
     |           +---w traffic-type?                    enumeration
     |           +---w extra-traffic-tunnel-ref?        tunnel-ref
     +--ro lsps
        +--ro lsp* [tunnel-name lsp-id node]
           +--ro tunnel-name                         string
           +--ro lsp-id                              uint16
           +--ro node
           |       te-types:te-node-id
           +--ro source?
           |       te-types:te-node-id
           +--ro destination?
           |       te-types:te-node-id
           +--ro tunnel-id?                          uint16
           +--ro extended-tunnel-id?                 yang:dotted-quad
           +--ro operational-state?                  identityref
           +--ro signaling-type?                     identityref
           +--ro origin-type?                        enumeration
           +--ro lsp-resource-status?                enumeration
           +--ro lockout-of-normal?                  boolean
           +--ro freeze?                             boolean
           +--ro lsp-protection-role?                enumeration
           +--ro lsp-protection-state?               identityref
           +--ro protection-group-ingress-node-id?
           |       te-types:te-node-id
           +--ro protection-group-egress-node-id?
           |       te-types:te-node-id
           +--ro lsp-actual-route-information
              +--ro lsp-actual-route-information* [index]
                 +---u te-types:record-route-state

  rpcs:
    +---x tunnels-path-compute
    |  +---w input
    |  |  +---w path-compute-info
    |  +--ro output
    |     +--ro path-compute-result
    +---x tunnels-actions
       +---w input
       |  +---w tunnel-info
       |  |  +---w (filter-type)
       |  |     +--:(all-tunnels)
       |  |     |  +---w all       empty
       |  |     +--:(one-tunnel)
       |  |        +---w tunnel?   tunnel-ref
       |  +---w action-info
       |     +---w action?       identityref
       |     +---w disruptive?   empty
       +--ro output
          +--ro action-result?   identityref

  grouping te-generic-node-id:
    +-- id?     te-gen-node-id
    +-- type?   enumeration
  grouping path-common-properties:
    +-- name?                      string
    +-- path-computation-method?   identityref
    +-- path-computation-server
    |  +---u te-generic-node-id
    +-- compute-only?              empty
    +-- use-path-computation?      boolean
    +-- lockdown?                  empty
    +--ro path-scope?                identityref
  grouping path-compute-info:
    +---u tunnel-associations-properties
    +---u te-types:generic-path-optimization
    +-- named-path-constraint?                leafref
    |       {te-types:named-path-constraints}?
    +---u path-constraints-common
  grouping path-forward-properties:
    +-- preference?   uint8
    +-- co-routed?    boolean
  grouping k-requested-paths:
    +-- k-requested-paths?   uint8
  grouping path-state:
    +---u path-computation-response
    +--ro lsp-provisioning-error-infos
    |  +--ro lsp-provisioning-error-info* []
    |     +--ro error-reason?        identityref
    |     +--ro error-description?   string
    |     +--ro error-timestamp?     yang:date-and-time
    |     +--ro error-node-id?       te-types:te-node-id
    |     +--ro error-link-id?       te-types:te-tp-id
    |     +--ro lsp-id?              uint16
    +--ro lsps
       +--ro lsp* [node lsp-id]
          +--ro tunnel-name?   -> /te/lsps/lsp/tunnel-name
          +--ro node?          leafref
          +--ro lsp-id?        leafref
  grouping path-computation-response:
    +--ro computed-paths-properties
    |  +--ro computed-path-properties* [k-index]
    |     +--ro k-index?                            uint8
    |     +---u te-types:generic-path-properties
    +--ro computed-path-error-infos
       +--ro computed-path-error-info* []
          +--ro error-description?   string
          +--ro error-timestamp?     yang:date-and-time
          +--ro error-reason?        identityref
  grouping protection-restoration-properties:
    +-- protection
    |  +-- protection-type?                identityref
    |  +-- protection-reversion-disable?   boolean
    |  +-- hold-off-time?                  uint32
    |  +-- wait-to-revert?                 uint16
    |  +-- aps-signal-id?                  uint8
    +-- restoration
       +-- restoration-type?                identityref
       +-- restoration-scheme?              identityref
       +-- restoration-reversion-disable?   boolean
       +-- hold-off-time?                   uint32
       +-- wait-to-restore?                 uint16
       +-- wait-to-revert?                  uint16
  grouping tunnel-associations-properties:
    +-- association-objects
       +-- association-object* [association-key]
       |  +-- association-key?   string
       |  +-- type?              identityref
       |  +-- id?                uint16
       |  +-- source
       |     +---u te-generic-node-id
       +-- association-object-extended* [association-key]
          +-- association-key?   string
          +-- type?              identityref
          +-- id?                uint16
          +-- source
          |  +---u te-generic-node-id
          +-- global-source?     uint32
          +-- extended-id?       yang:hex-string
  grouping tunnel-end-point:
    +-- node-id?        nw:node-id
    +-- te-node-id?     te-types:te-node-id
    +-- tunnel-tp-id?   binary
  grouping tunnel-common-attributes:
    +-- source
    |  +---u tunnel-end-point
    +-- destination
    |  +---u tunnel-end-point
    +-- bidirectional?   boolean
  grouping tunnel-hierarchy-properties:
    +-- hierarchy
       +-- dependency-tunnels
       |  +-- dependency-tunnel* [name]
       |     +-- name?
       |     |       -> /te/tunnels/tunnel/name
       |     +---u te-types:encoding-and-switching-type
       +-- hierarchical-link
          +-- enable?                            boolean
          +-- local-node-id?                     nw:node-id
          +-- local-te-node-id?                  te-types:te-node-id
          +-- local-link-tp-id?                  nt:tp-id
          +-- local-te-link-tp-id?               te-types:te-tp-id
          +-- remote-link-tp-id?                 nt:tp-id
          +-- remote-te-node-id?                 te-types:te-node-id
          +-- network-id?                        nw:network-id
          +---u te-types:te-topology-identifier
  grouping path-constraints-common:
    +---u te-types:common-path-constraints-attributes
    +---u te-types:generic-path-disjointness
    +---u te-types:path-constraints-route-objects
    +-- path-in-segment!
    |  +---u te-types:label-set-info
    +-- path-out-segment!
       +---u te-types:label-set-info
]]></artwork></figure>

</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor='RFC3209' target='https://www.rfc-editor.org/info/rfc3209'>
  <front>
    <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
    <author fullname='D. Awduche' initials='D.' surname='Awduche'/>
    <author fullname='L. Berger' initials='L.' surname='Berger'/>
    <author fullname='D. Gan' initials='D.' surname='Gan'/>
    <author fullname='T. Li' initials='T.' surname='Li'/>
    <author fullname='V. Srinivasan' initials='V.' surname='Srinivasan'/>
    <author fullname='G. Swallow' initials='G.' surname='Swallow'/>
    <date month='December' year='2001'/>
    <abstract>
      <t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching). Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels. A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='3209'/>
  <seriesInfo name='DOI' value='10.17487/RFC3209'/>
</reference>

<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname='S. Bradner' initials='S.' surname='Bradner'/>
    <date month='March' year='1997'/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='2119'/>
  <seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>

<reference anchor='RFC6020' target='https://www.rfc-editor.org/info/rfc6020'>
  <front>
    <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
    <author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'/>
    <date month='October' year='2010'/>
    <abstract>
      <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6020'/>
  <seriesInfo name='DOI' value='10.17487/RFC6020'/>
</reference>

<reference anchor='RFC6241' target='https://www.rfc-editor.org/info/rfc6241'>
  <front>
    <title>Network Configuration Protocol (NETCONF)</title>
    <author fullname='R. Enns' initials='R.' role='editor' surname='Enns'/>
    <author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'/>
    <author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'/>
    <author fullname='A. Bierman' initials='A.' role='editor' surname='Bierman'/>
    <date month='June' year='2011'/>
    <abstract>
      <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6241'/>
  <seriesInfo name='DOI' value='10.17487/RFC6241'/>
</reference>

<reference anchor='RFC6991' target='https://www.rfc-editor.org/info/rfc6991'>
  <front>
    <title>Common YANG Data Types</title>
    <author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'/>
    <date month='July' year='2013'/>
    <abstract>
      <t>This document introduces a collection of common data types to be used with the YANG data modeling language. This document obsoletes RFC 6021.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6991'/>
  <seriesInfo name='DOI' value='10.17487/RFC6991'/>
</reference>

<reference anchor='RFC6107' target='https://www.rfc-editor.org/info/rfc6107'>
  <front>
    <title>Procedures for Dynamically Signaled Hierarchical Label Switched Paths</title>
    <author fullname='K. Shiomoto' initials='K.' role='editor' surname='Shiomoto'/>
    <author fullname='A. Farrel' initials='A.' role='editor' surname='Farrel'/>
    <date month='February' year='2011'/>
    <abstract>
      <t>Label Switched Paths (LSPs) set up in Multiprotocol Label Switching (MPLS) or Generalized MPLS (GMPLS) networks can be used to form links to carry traffic in those networks or in other (client) networks.</t>
      <t>Protocol mechanisms already exist to facilitate the establishment of such LSPs and to bundle traffic engineering (TE) links to reduce the load on routing protocols. This document defines extensions to those mechanisms to support identifying the use to which such LSPs are to be put and to enable the TE link endpoints to be assigned addresses or unnumbered identifiers during the signaling process. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6107'/>
  <seriesInfo name='DOI' value='10.17487/RFC6107'/>
</reference>

<reference anchor='RFC8040' target='https://www.rfc-editor.org/info/rfc8040'>
  <front>
    <title>RESTCONF Protocol</title>
    <author fullname='A. Bierman' initials='A.' surname='Bierman'/>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <author fullname='K. Watsen' initials='K.' surname='Watsen'/>
    <date month='January' year='2017'/>
    <abstract>
      <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8040'/>
  <seriesInfo name='DOI' value='10.17487/RFC8040'/>
</reference>


<reference anchor="ITU_G.808.1" >
  <front>
    <title>Generic protection switching - Linear trail and subnetwork protection</title>
    <author >
      <organization>ITU-T Recommendation G.808.1</organization>
    </author>
    <date year="2014" month="May"/>
  </front>
  <seriesInfo name="ITU-T G.808.1" value=""/>
</reference>


<reference anchor='RFC7950' target='https://www.rfc-editor.org/info/rfc7950'>
  <front>
    <title>The YANG 1.1 Data Modeling Language</title>
    <author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'/>
    <date month='August' year='2016'/>
    <abstract>
      <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7950'/>
  <seriesInfo name='DOI' value='10.17487/RFC7950'/>
</reference>

<reference anchor='RFC3473' target='https://www.rfc-editor.org/info/rfc3473'>
  <front>
    <title>Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) Extensions</title>
    <author fullname='L. Berger' initials='L.' role='editor' surname='Berger'/>
    <date month='January' year='2003'/>
    <abstract>
      <t>This document describes extensions to Multi-Protocol Label Switching (MPLS) Resource ReserVation Protocol - Traffic Engineering (RSVP-TE) signaling required to support Generalized MPLS. Generalized MPLS extends the MPLS control plane to encompass time-division (e.g., Synchronous Optical Network and Synchronous Digital Hierarchy, SONET/SDH), wavelength (optical lambdas) and spatial switching (e.g., incoming port or fiber to outgoing port or fiber). This document presents a RSVP-TE specific description of the extensions. A generic functional description can be found in separate documents. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='3473'/>
  <seriesInfo name='DOI' value='10.17487/RFC3473'/>
</reference>

<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='8174'/>
  <seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>

<reference anchor='RFC8294' target='https://www.rfc-editor.org/info/rfc8294'>
  <front>
    <title>Common YANG Data Types for the Routing Area</title>
    <author fullname='X. Liu' initials='X.' surname='Liu'/>
    <author fullname='Y. Qu' initials='Y.' surname='Qu'/>
    <author fullname='A. Lindem' initials='A.' surname='Lindem'/>
    <author fullname='C. Hopps' initials='C.' surname='Hopps'/>
    <author fullname='L. Berger' initials='L.' surname='Berger'/>
    <date month='December' year='2017'/>
    <abstract>
      <t>This document defines a collection of common data types using the YANG data modeling language. These derived common types are designed to be imported by other modules defined in the routing area.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8294'/>
  <seriesInfo name='DOI' value='10.17487/RFC8294'/>
</reference>

<reference anchor='RFC8776' target='https://www.rfc-editor.org/info/rfc8776'>
  <front>
    <title>Common YANG Data Types for Traffic Engineering</title>
    <author fullname='T. Saad' initials='T.' surname='Saad'/>
    <author fullname='R. Gandhi' initials='R.' surname='Gandhi'/>
    <author fullname='X. Liu' initials='X.' surname='Liu'/>
    <author fullname='V. Beeram' initials='V.' surname='Beeram'/>
    <author fullname='I. Bryskin' initials='I.' surname='Bryskin'/>
    <date month='June' year='2020'/>
    <abstract>
      <t>This document defines a collection of common data types and groupings in YANG data modeling language. These derived common types and groupings are intended to be imported by modules that model Traffic Engineering (TE) configuration and state capabilities.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8776'/>
  <seriesInfo name='DOI' value='10.17487/RFC8776'/>
</reference>

<reference anchor='RFC8340' target='https://www.rfc-editor.org/info/rfc8340'>
  <front>
    <title>YANG Tree Diagrams</title>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <author fullname='L. Berger' initials='L.' role='editor' surname='Berger'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='215'/>
  <seriesInfo name='RFC' value='8340'/>
  <seriesInfo name='DOI' value='10.17487/RFC8340'/>
</reference>

<reference anchor='RFC8342' target='https://www.rfc-editor.org/info/rfc8342'>
  <front>
    <title>Network Management Datastore Architecture (NMDA)</title>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <author fullname='J. Schoenwaelder' initials='J.' surname='Schoenwaelder'/>
    <author fullname='P. Shafer' initials='P.' surname='Shafer'/>
    <author fullname='K. Watsen' initials='K.' surname='Watsen'/>
    <author fullname='R. Wilton' initials='R.' surname='Wilton'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8342'/>
  <seriesInfo name='DOI' value='10.17487/RFC8342'/>
</reference>

<reference anchor='RFC9012' target='https://www.rfc-editor.org/info/rfc9012'>
  <front>
    <title>The BGP Tunnel Encapsulation Attribute</title>
    <author fullname='K. Patel' initials='K.' surname='Patel'/>
    <author fullname='G. Van de Velde' initials='G.' surname='Van de Velde'/>
    <author fullname='S. Sangli' initials='S.' surname='Sangli'/>
    <author fullname='J. Scudder' initials='J.' surname='Scudder'/>
    <date month='April' year='2021'/>
    <abstract>
      <t>This document defines a BGP path attribute known as the "Tunnel Encapsulation attribute", which can be used with BGP UPDATEs of various Subsequent Address Family Identifiers (SAFIs) to provide information needed to create tunnels and their corresponding encapsulation headers. It provides encodings for a number of tunnel types, along with procedures for choosing between alternate tunnels and routing packets into tunnels.</t>
      <t>This document obsoletes RFC 5512, which provided an earlier definition of the Tunnel Encapsulation attribute. RFC 5512 was never deployed in production. Since RFC 5566 relies on RFC 5512, it is likewise obsoleted. This document updates RFC 5640 by indicating that the Load-Balancing Block sub-TLV may be included in any Tunnel Encapsulation attribute where load balancing is desired.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9012'/>
  <seriesInfo name='DOI' value='10.17487/RFC9012'/>
</reference>

<reference anchor='RFC8345' target='https://www.rfc-editor.org/info/rfc8345'>
  <front>
    <title>A YANG Data Model for Network Topologies</title>
    <author fullname='A. Clemm' initials='A.' surname='Clemm'/>
    <author fullname='J. Medved' initials='J.' surname='Medved'/>
    <author fullname='R. Varga' initials='R.' surname='Varga'/>
    <author fullname='N. Bahadur' initials='N.' surname='Bahadur'/>
    <author fullname='H. Ananthakrishnan' initials='H.' surname='Ananthakrishnan'/>
    <author fullname='X. Liu' initials='X.' surname='Liu'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8345'/>
  <seriesInfo name='DOI' value='10.17487/RFC8345'/>
</reference>

<reference anchor='RFC8795' target='https://www.rfc-editor.org/info/rfc8795'>
  <front>
    <title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
    <author fullname='X. Liu' initials='X.' surname='Liu'/>
    <author fullname='I. Bryskin' initials='I.' surname='Bryskin'/>
    <author fullname='V. Beeram' initials='V.' surname='Beeram'/>
    <author fullname='T. Saad' initials='T.' surname='Saad'/>
    <author fullname='H. Shah' initials='H.' surname='Shah'/>
    <author fullname='O. Gonzalez de Dios' initials='O.' surname='Gonzalez de Dios'/>
    <date month='August' year='2020'/>
    <abstract>
      <t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8795'/>
  <seriesInfo name='DOI' value='10.17487/RFC8795'/>
</reference>

<reference anchor='RFC4206' target='https://www.rfc-editor.org/info/rfc4206'>
  <front>
    <title>Label Switched Paths (LSP) Hierarchy with Generalized Multi-Protocol Label Switching (GMPLS) Traffic Engineering (TE)</title>
    <author fullname='K. Kompella' initials='K.' surname='Kompella'/>
    <author fullname='Y. Rekhter' initials='Y.' surname='Rekhter'/>
    <date month='October' year='2005'/>
    <abstract>
      <t>To improve scalability of Generalized Multi-Protocol Label Switching (GMPLS) it may be useful to aggregate Label Switched Paths (LSPs) by creating a hierarchy of such LSPs. A way to create such a hierarchy is by (a) a Label Switching Router (LSR) creating a Traffic Engineering Label Switched Path (TE LSP), (b) the LSR forming a forwarding adjacency (FA) out of that LSP (by advertising this LSP as a Traffic Engineering (TE) link into the same instance of ISIS/OSPF as the one that was used to create the LSP), (c) allowing other LSRs to use FAs for their path computation, and (d) nesting of LSPs originated by other LSRs into that LSP (by using the label stack construct).</t>
      <t>This document describes the mechanisms to accomplish this. [PROPOSED STANDARD]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4206'/>
  <seriesInfo name='DOI' value='10.17487/RFC4206'/>
</reference>

<reference anchor='RFC4427' target='https://www.rfc-editor.org/info/rfc4427'>
  <front>
    <title>Recovery (Protection and Restoration) Terminology for Generalized Multi-Protocol Label Switching (GMPLS)</title>
    <author fullname='E. Mannie' initials='E.' role='editor' surname='Mannie'/>
    <author fullname='D. Papadimitriou' initials='D.' role='editor' surname='Papadimitriou'/>
    <date month='March' year='2006'/>
    <abstract>
      <t>This document defines a common terminology for Generalized Multi-Protocol Label Switching (GMPLS)-based recovery mechanisms (i.e., protection and restoration). The terminology is independent of the underlying transport technologies covered by GMPLS. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4427'/>
  <seriesInfo name='DOI' value='10.17487/RFC4427'/>
</reference>

<reference anchor='RFC4872' target='https://www.rfc-editor.org/info/rfc4872'>
  <front>
    <title>RSVP-TE Extensions in Support of End-to-End Generalized Multi-Protocol Label Switching (GMPLS) Recovery</title>
    <author fullname='J.P. Lang' initials='J.P.' role='editor' surname='Lang'/>
    <author fullname='Y. Rekhter' initials='Y.' role='editor' surname='Rekhter'/>
    <author fullname='D. Papadimitriou' initials='D.' role='editor' surname='Papadimitriou'/>
    <date month='May' year='2007'/>
    <abstract>
      <t>This document describes protocol-specific procedures and extensions for Generalized Multi-Protocol Label Switching (GMPLS) Resource ReSerVation Protocol - Traffic Engineering (RSVP-TE) signaling to support end-to-end Label Switched Path (LSP) recovery that denotes protection and restoration. A generic functional description of GMPLS recovery can be found in a companion document, RFC 4426. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4872'/>
  <seriesInfo name='DOI' value='10.17487/RFC4872'/>
</reference>

<reference anchor='RFC6780' target='https://www.rfc-editor.org/info/rfc6780'>
  <front>
    <title>RSVP ASSOCIATION Object Extensions</title>
    <author fullname='L. Berger' initials='L.' surname='Berger'/>
    <author fullname='F. Le Faucheur' initials='F.' surname='Le Faucheur'/>
    <author fullname='A. Narayanan' initials='A.' surname='Narayanan'/>
    <date month='October' year='2012'/>
    <abstract>
      <t>The RSVP ASSOCIATION object was defined in the context of GMPLS-controlled Label Switched Paths (LSPs). In this context, the object is used to associate recovery LSPs with the LSP they are protecting. This object also has broader applicability as a mechanism to associate RSVP state. This document defines how the ASSOCIATION object can be more generally applied. This document also defines Extended ASSOCIATION objects that, in particular, can be used in the context of the MPLS Transport Profile (MPLS-TP). This document updates RFC 2205, RFC 3209, and RFC 3473. It also generalizes the definition of the Association ID field defined in RFC 4872. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6780'/>
  <seriesInfo name='DOI' value='10.17487/RFC6780'/>
</reference>

<reference anchor='RFC7471' target='https://www.rfc-editor.org/info/rfc7471'>
  <front>
    <title>OSPF Traffic Engineering (TE) Metric Extensions</title>
    <author fullname='S. Giacalone' initials='S.' surname='Giacalone'/>
    <author fullname='D. Ward' initials='D.' surname='Ward'/>
    <author fullname='J. Drake' initials='J.' surname='Drake'/>
    <author fullname='A. Atlas' initials='A.' surname='Atlas'/>
    <author fullname='S. Previdi' initials='S.' surname='Previdi'/>
    <date month='March' year='2015'/>
    <abstract>
      <t>In certain networks, such as, but not limited to, financial information networks (e.g., stock market data providers), network performance information (e.g., link propagation delay) is becoming critical to data path selection.</t>
      <t>This document describes common extensions to RFC 3630 "Traffic Engineering (TE) Extensions to OSPF Version 2" and RFC 5329 "Traffic Engineering Extensions to OSPF Version 3" to enable network performance information to be distributed in a scalable fashion. The information distributed using OSPF TE Metric Extensions can then be used to make path selection decisions based on network performance.</t>
      <t>Note that this document only covers the mechanisms by which network performance information is distributed. The mechanisms for measuring network performance information or using that information, once distributed, are outside the scope of this document.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7471'/>
  <seriesInfo name='DOI' value='10.17487/RFC7471'/>
</reference>

<reference anchor='RFC8570' target='https://www.rfc-editor.org/info/rfc8570'>
  <front>
    <title>IS-IS Traffic Engineering (TE) Metric Extensions</title>
    <author fullname='L. Ginsberg' initials='L.' role='editor' surname='Ginsberg'/>
    <author fullname='S. Previdi' initials='S.' role='editor' surname='Previdi'/>
    <author fullname='S. Giacalone' initials='S.' surname='Giacalone'/>
    <author fullname='D. Ward' initials='D.' surname='Ward'/>
    <author fullname='J. Drake' initials='J.' surname='Drake'/>
    <author fullname='Q. Wu' initials='Q.' surname='Wu'/>
    <date month='March' year='2019'/>
    <abstract>
      <t>In certain networks, such as, but not limited to, financial information networks (e.g., stock market data providers), network-performance criteria (e.g., latency) are becoming as critical to data-path selection as other metrics.</t>
      <t>This document describes extensions to IS-IS Traffic Engineering Extensions (RFC 5305). These extensions provide a way to distribute and collect network-performance information in a scalable fashion. The information distributed using IS-IS TE Metric Extensions can then be used to make path-selection decisions based on network performance.</t>
      <t>Note that this document only covers the mechanisms with which network-performance information is distributed. The mechanisms for measuring network performance or acting on that information, once distributed, are outside the scope of this document.</t>
      <t>This document obsoletes RFC 7810.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8570'/>
  <seriesInfo name='DOI' value='10.17487/RFC8570'/>
</reference>

<reference anchor='RFC8232' target='https://www.rfc-editor.org/info/rfc8232'>
  <front>
    <title>Optimizations of Label Switched Path State Synchronization Procedures for a Stateful PCE</title>
    <author fullname='E. Crabbe' initials='E.' surname='Crabbe'/>
    <author fullname='I. Minei' initials='I.' surname='Minei'/>
    <author fullname='J. Medved' initials='J.' surname='Medved'/>
    <author fullname='R. Varga' initials='R.' surname='Varga'/>
    <author fullname='X. Zhang' initials='X.' surname='Zhang'/>
    <author fullname='D. Dhody' initials='D.' surname='Dhody'/>
    <date month='September' year='2017'/>
    <abstract>
      <t>A stateful Path Computation Element (PCE) has access to not only the information disseminated by the network's Interior Gateway Protocol (IGP) but also the set of active paths and their reserved resources for its computation. The additional Label Switched Path (LSP) state information allows the PCE to compute constrained paths while considering individual LSPs and their interactions. This requires a State Synchronization mechanism between the PCE and the network, the PCE and Path Computation Clients (PCCs), and cooperating PCEs. The basic mechanism for State Synchronization is part of the stateful PCE specification. This document presents motivations for optimizations to the base State Synchronization procedure and specifies the required Path Computation Element Communication Protocol (PCEP) extensions.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8232'/>
  <seriesInfo name='DOI' value='10.17487/RFC8232'/>
</reference>

<reference anchor='RFC7271' target='https://www.rfc-editor.org/info/rfc7271'>
  <front>
    <title>MPLS Transport Profile (MPLS-TP) Linear Protection to Match the Operational Expectations of Synchronous Digital Hierarchy, Optical Transport Network, and Ethernet Transport Network Operators</title>
    <author fullname='J. Ryoo' initials='J.' role='editor' surname='Ryoo'/>
    <author fullname='E. Gray' initials='E.' role='editor' surname='Gray'/>
    <author fullname='H. van Helvoort' initials='H.' surname='van Helvoort'/>
    <author fullname='A. D&apos;Alessandro' initials='A.' surname='D&apos;Alessandro'/>
    <author fullname='T. Cheung' initials='T.' surname='Cheung'/>
    <author fullname='E. Osborne' initials='E.' surname='Osborne'/>
    <date month='June' year='2014'/>
    <abstract>
      <t>This document describes alternate mechanisms to perform some of the functions of MPLS Transport Profile (MPLS-TP) linear protection defined in RFC 6378, and also defines additional mechanisms. The purpose of these alternate and additional mechanisms is to provide operator control and experience that more closely models the behavior of linear protection seen in other transport networks.</t>
      <t>This document also introduces capabilities and modes for linear protection. A capability is an individual behavior, and a mode is a particular combination of capabilities. Two modes are defined in this document: Protection State Coordination (PSC) mode and Automatic Protection Switching (APS) mode.</t>
      <t>This document describes the behavior of the PSC protocol including priority logic and state machine when all the capabilities associated with the APS mode are enabled.</t>
      <t>This document updates RFC 6378 in that the capability advertisement method defined here is an addition to that document.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7271'/>
  <seriesInfo name='DOI' value='10.17487/RFC7271'/>
</reference>

<reference anchor='RFC8234' target='https://www.rfc-editor.org/info/rfc8234'>
  <front>
    <title>Updates to MPLS Transport Profile (MPLS-TP) Linear Protection in Automatic Protection Switching (APS) Mode</title>
    <author fullname='J. Ryoo' initials='J.' surname='Ryoo'/>
    <author fullname='T. Cheung' initials='T.' surname='Cheung'/>
    <author fullname='H. van Helvoort' initials='H.' surname='van Helvoort'/>
    <author fullname='I. Busi' initials='I.' surname='Busi'/>
    <author fullname='G. Wen' initials='G.' surname='Wen'/>
    <date month='August' year='2017'/>
    <abstract>
      <t>This document contains updates to MPLS Transport Profile (MPLS-TP) linear protection in Automatic Protection Switching (APS) mode defined in RFC 7271. The updates provide rules related to the initialization of the Protection State Coordination (PSC) Control Logic (in which the state machine resides) when operating in APS mode and clarify the operation related to state transition table lookup.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8234'/>
  <seriesInfo name='DOI' value='10.17487/RFC8234'/>
</reference>

<reference anchor='RFC7308' target='https://www.rfc-editor.org/info/rfc7308'>
  <front>
    <title>Extended Administrative Groups in MPLS Traffic Engineering (MPLS-TE)</title>
    <author fullname='E. Osborne' initials='E.' surname='Osborne'/>
    <date month='July' year='2014'/>
    <abstract>
      <t>MPLS Traffic Engineering (MPLS-TE) advertises 32 administrative groups (commonly referred to as "colors" or "link colors") using the Administrative Group sub-TLV. This is defined for OSPFv2 (RFC 3630), OSPFv3 (RFC 5329) and IS-IS (RFC 5305).</t>
      <t>This document adds a sub-TLV to the IGP TE extensions, "Extended Administrative Group". This sub-TLV provides for additional administrative groups (link colors) beyond the current limit of 32.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7308'/>
  <seriesInfo name='DOI' value='10.17487/RFC7308'/>
</reference>

<reference anchor='RFC8343' target='https://www.rfc-editor.org/info/rfc8343'>
  <front>
    <title>A YANG Data Model for Interface Management</title>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>This document defines a YANG data model for the management of network interfaces. It is expected that interface-type-specific data models augment the generic interfaces data model defined in this document. The data model includes definitions for configuration and system state (status information and counters for the collection of statistics).</t>
      <t>The YANG data model in this document conforms to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
      <t>This document obsoletes RFC 7223.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8343'/>
  <seriesInfo name='DOI' value='10.17487/RFC8343'/>
</reference>

<reference anchor='RFC8639' target='https://www.rfc-editor.org/info/rfc8639'>
  <front>
    <title>Subscription to YANG Notifications</title>
    <author fullname='E. Voit' initials='E.' surname='Voit'/>
    <author fullname='A. Clemm' initials='A.' surname='Clemm'/>
    <author fullname='A. Gonzalez Prieto' initials='A.' surname='Gonzalez Prieto'/>
    <author fullname='E. Nilsen-Nygaard' initials='E.' surname='Nilsen-Nygaard'/>
    <author fullname='A. Tripathy' initials='A.' surname='Tripathy'/>
    <date month='September' year='2019'/>
    <abstract>
      <t>This document defines a YANG data model and associated mechanisms enabling subscriber-specific subscriptions to a publisher's event streams. Applying these elements allows a subscriber to request and receive a continuous, customized feed of publisher-generated information.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8639'/>
  <seriesInfo name='DOI' value='10.17487/RFC8639'/>
</reference>

<reference anchor='RFC8641' target='https://www.rfc-editor.org/info/rfc8641'>
  <front>
    <title>Subscription to YANG Notifications for Datastore Updates</title>
    <author fullname='A. Clemm' initials='A.' surname='Clemm'/>
    <author fullname='E. Voit' initials='E.' surname='Voit'/>
    <date month='September' year='2019'/>
    <abstract>
      <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8641'/>
  <seriesInfo name='DOI' value='10.17487/RFC8641'/>
</reference>

<reference anchor='RFC3688' target='https://www.rfc-editor.org/info/rfc3688'>
  <front>
    <title>The IETF XML Registry</title>
    <author fullname='M. Mealling' initials='M.' surname='Mealling'/>
    <date month='January' year='2004'/>
    <abstract>
      <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='81'/>
  <seriesInfo name='RFC' value='3688'/>
  <seriesInfo name='DOI' value='10.17487/RFC3688'/>
</reference>

<reference anchor='RFC6242' target='https://www.rfc-editor.org/info/rfc6242'>
  <front>
    <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
    <author fullname='M. Wasserman' initials='M.' surname='Wasserman'/>
    <date month='June' year='2011'/>
    <abstract>
      <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6242'/>
  <seriesInfo name='DOI' value='10.17487/RFC6242'/>
</reference>

<reference anchor='RFC8446' target='https://www.rfc-editor.org/info/rfc8446'>
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname='E. Rescorla' initials='E.' surname='Rescorla'/>
    <date month='August' year='2018'/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8446'/>
  <seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>

<reference anchor='RFC8341' target='https://www.rfc-editor.org/info/rfc8341'>
  <front>
    <title>Network Configuration Access Control Model</title>
    <author fullname='A. Bierman' initials='A.' surname='Bierman'/>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
      <t>This document obsoletes RFC 6536.</t>
    </abstract>
  </front>
  <seriesInfo name='STD' value='91'/>
  <seriesInfo name='RFC' value='8341'/>
  <seriesInfo name='DOI' value='10.17487/RFC8341'/>
</reference>




    </references>

    <references title='Informative References'>



<reference anchor='RFC9256' target='https://www.rfc-editor.org/info/rfc9256'>
  <front>
    <title>Segment Routing Policy Architecture</title>
    <author fullname='C. Filsfils' initials='C.' surname='Filsfils'/>
    <author fullname='K. Talaulikar' initials='K.' role='editor' surname='Talaulikar'/>
    <author fullname='D. Voyer' initials='D.' surname='Voyer'/>
    <author fullname='A. Bogdanov' initials='A.' surname='Bogdanov'/>
    <author fullname='P. Mattes' initials='P.' surname='Mattes'/>
    <date month='July' year='2022'/>
    <abstract>
      <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
      <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9256'/>
  <seriesInfo name='DOI' value='10.17487/RFC9256'/>
</reference>

<reference anchor='RFC3945' target='https://www.rfc-editor.org/info/rfc3945'>
  <front>
    <title>Generalized Multi-Protocol Label Switching (GMPLS) Architecture</title>
    <author fullname='E. Mannie' initials='E.' role='editor' surname='Mannie'/>
    <date month='October' year='2004'/>
    <abstract>
      <t>Future data and transmission networks will consist of elements such as routers, switches, Dense Wavelength Division Multiplexing (DWDM) systems, Add-Drop Multiplexors (ADMs), photonic cross-connects (PXCs), optical cross-connects (OXCs), etc. that will use Generalized Multi-Protocol Label Switching (GMPLS) to dynamically provision resources and to provide network survivability using protection and restoration techniques.</t>
      <t>This document describes the architecture of GMPLS. GMPLS extends MPLS to encompass time-division (e.g., SONET/SDH, PDH, G.709), wavelength (lambdas), and spatial switching (e.g., incoming port or fiber to outgoing port or fiber). The focus of GMPLS is on the control plane of these various layers since each of them can use physically diverse data or forwarding planes. The intention is to cover both the signaling and the routing part of that control plane. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='3945'/>
  <seriesInfo name='DOI' value='10.17487/RFC3945'/>
</reference>

<reference anchor='rfc3473' target='https://www.rfc-editor.org/info/rfc3473'>
  <front>
    <title>Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) Extensions</title>
    <author fullname='L. Berger' initials='L.' role='editor' surname='Berger'/>
    <date month='January' year='2003'/>
    <abstract>
      <t>This document describes extensions to Multi-Protocol Label Switching (MPLS) Resource ReserVation Protocol - Traffic Engineering (RSVP-TE) signaling required to support Generalized MPLS. Generalized MPLS extends the MPLS control plane to encompass time-division (e.g., Synchronous Optical Network and Synchronous Digital Hierarchy, SONET/SDH), wavelength (optical lambdas) and spatial switching (e.g., incoming port or fiber to outgoing port or fiber). This document presents a RSVP-TE specific description of the extensions. A generic functional description can be found in separate documents. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='3473'/>
  <seriesInfo name='DOI' value='10.17487/RFC3473'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

