Gang Yan, Shunwan Zhuang (Huawei) IETF 92, Dallas, TX USA

Slides:



Advertisements
Similar presentations
Chapter 9: Access Control Lists
Advertisements

1 Authorization XACML – a language for expressing policies and rules.
Draft-ietf-dime-agent-overload- 01.txt. Agenda Extensions to DOIC Questions Review of representative use cases.
Draft-chen-i2rs-mpls-ldp-usecases-00/ draft-huang-i2rs-mpls-te-usecase-00 IETF 88 I2RS1 Use Cases for an Interface to MPLS Protocol draft-chen-i2rs-mpls-ldp-usecases-00/
Policy Based Routing using ACL & Route Map By Group 7 Nischal ( ) Pranali ( )
WXES2106 Network Technology Semester /2005 Chapter 10 Access Control Lists CCNA2: Module 11.
Routing and Routing Protocols
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—4-1 Implement an IPv4-Based Redistribution Solution Assessing Network Routing Performance and.
Draft-zhuang-l2vpn-yang-cfg-00IETF 91 BESS WG1 Yang Model for L2VPN draft-zhuang-l2vpn-yang-cfg-00 Shunwan Zhuang, Haibo Wang, Zhenbin Li (Huawei) IETF.
Draft-li-l2vpn-ccvpn-arch-00IETF 88 L2VPN1 An Architecture of Central Controlled Layer 2 Virtual Private Network (L2VPN) draft-li-l2vpn-ccvpn-arch-00 Zhenbin.
Draft-li-rtgwg-cc-igp-arch-00IETF 88 RTGWG1 An Architecture of Central Controlled Interior Gateway Protocol (IGP) draft-li-rtgwg-cc-igp-arch-00 Zhenbin.
Draft-ni-l3vpn-bgp-ext-sd-co-lsp-00IETF 87 L3VPN1 BGP Extensions for Setup Service-Driven Co-Routed LSP in L3VPN draft-ni-l3vpn-bgp-ext-sd-co-lsp-00 Hui.
Draft-boutros-bess-evpn-vpws-service-edge-gateway-00 Sami Boutros Ali Sajassi Patrice Brissette [Cisco Systems] Daniel Voyer [Bell Canada] IETF 92,
Use Cases and API Extension for Source IP Address Selection draft-sijeon-dmm-use-cases-api-source-00.txt Presenter: Alper Yegin Authors: Seil Jeon, Sergio.
Network Certification Preparation. Module - 5 Basic troubleshooting of IP addressing issues Basic troubleshooting of RIP and IGRP Basic troubleshooting.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
Draft-li-mpls-network-virtualization-framework-00IETF 88 SPRING WG1 Framework of Network Virtualization Based on MPLS Global Label draft-li-mpls-network-virtualization-framework-00.
CCNA – Cisco Certified Network Associates Access Control List (ACL) By Roshan Chaudhary Lecturer Islington College.
Module 8: Planning and Troubleshooting IPSec. Overview Understanding Default Policy Rules Planning an IPSec Deployment Troubleshooting IPSec Communications.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Using BGP between PE and CE in EVPN draft-li-l2vpn-evpn-pe-ce-01 Zhenbin Li, Junlin Zhuang, Shunwan Zhuang (Huawei Technologies) IETF 90, Toronto, Canada.
YANG Data Model for Access Control List Configuration draft-huang-netmod-acl-02 Lisa Huang, Alexander Clemm,
1 © NOKIA FILENAMs.PPT/ DATE / NN Requirements for Firewall Configuration Protocol March 10 th, 2005 Gabor Bajko Franck Le Michael Paddon Trevor Plestid.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Outbound Route Filtering.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Applying Route-Maps as BGP Filters.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Module Summary The multihomed customer network must exchange BGP information with both ISP.
DHCP options for PAA Status report of draft-ietf-dhc-paa-option-01.txt Lionel Morand IETF-65, Dallas.
Draft-li-rtgwg-igp-ext-mrt-frr-00IETF 85 RTGWG1 Applicability of LDP Multi-Topology for Unicast Fast-reroute Using Maximally Redundant Trees draft-li-rtgwg-ldp-mt-mrt-frr-01.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Advertising Global Labels or SIDs Using IS-IS draft-xu-isis-global-label-sid-advdraft-xu-isis-global-label-sid-adv-00 Xiaohu Xu (Huawei)
Yang Models for BESS WGIETF 91 BESS WG1 Yang Model for BESS WG draft-zhuang-l2vpn-yang-cfg-00/ draft-zhuang-l2vpn-evpn-yang-cfg-00/ draft-zhuang-l3vpn-yang-cfg-00.
Draft-li-idr-cc-bgp-arch-00IETF 88 IDR1 An Architecture of Central Controlled Border Gateway Protocol (BGP) draft-li-idr-cc-bgp-arch-00 Zhenbin Li, Mach.
Draft-chen-rtgwg-resource-management-yang-00IETF 94 RTGWG1 PCE-initiated IP Tunnel draft-chen-pce-pce-initiated-ip-tunnel-00 Xia Chen, Zhenbin Li(Huawei)
Draft-lewis-infrastructure-security-00.txt Infrastructure Protection BCP Darrel Lewis, James Gill, Paul Quinn, Peter Schoenmaker.
Communicating Prefix Cost to Mobile Nodes (draft-mccann-dmm-prefixcost-01) IETF 93 Prague.
Design Work of Tunnel Models
Yang Data Model for Tunnel Policy draft-li-rtgwg-tunnel-policy-yang-00
YANG Data Model For RIB Extensions IETF 97, Seoul
Instructor Materials Chapter 7: Access Control Lists
Instructor Materials Chapter 4: Access Control Lists
YANG Data Model for RIP draft-liu-rtgwg-yang-rip-01
Zhenbin Li, Kai Lu Huawei Technologies IETF 98, Chicago, USA
YANG Model for IPIPv4 Tunnel
The SUPA Information Model
BGP Routing Policies.
Network Router Configuration: From Data Mining to Policy Management
draft-francois-segment-routing-ti-lfa-00
Subscribing to YANG datastore push updates draft-netconf-yang-push-00 IETF #94 Yokohama A. Clemm A. Gonzalez Prieto
Nicolas BOUTHORS Qosmos
Chapter 4: Access Control Lists (ACLs)
* Essential Network Security Book Slides.
Fast Reroute for Node Protection in LDP- based LSPs
Zhenbin Li, Shunwan Zhuang Huawei Technologies
DetNet Configuration YANG Model
draft-ding-netmod-arp-yang-model-00 Xiaojian Ding, Feng Zheng
YANG Data Models MPLS Base and Static LSPs draft-ietf-mpls-base-yang-04 draft-ietf-mpls-static-yang-04 Tarek.
Separating Routing Planes using Segment Routing draft-gulkohegde-spring-separating-routing-planes-using-sr-00 IETF 98 – Chicago, USA Shraddha Hegde
draft-liu-netmod-yang-schedule-02
QoS Yang Model Aseem Choudhary, Norm Strahle, Ing-Whar Chen,
A YANG Data Model for Microwave Radio Link draft-ietf-ccamp-mw-yang-04
Overview of Database Security
Network-automatic-optimization
Fast Reroute for Node Protection in LDP- based LSPs
Chabot College ELEC Access Control Lists - Introduction.
EVPN Interworking with IPVPN
QoS Yang Model Aseem Choudhary, Norm Strahle, Ing-Whar Chen,
RIFT YANG draft-zhang-rift-yang-01
YANG Data Models for TE and RSVP draft-ietf-teas-yang-te-21 draft-ietf-teas-yang-rsvp-11 draft-ietf-teas-yang-rsvp-te-07 Tarek Saad, Juniper Networks Rakesh.
Interface extensions YANG & VLAN sub-interface YANG Status update
Presentation transcript:

Gang Yan, Shunwan Zhuang (Huawei) IETF 92, Dallas, TX USA Yang Data Model for Routing Policy draft-yan-rtgwg-routing-policy-yang-00 Gang Yan, Shunwan Zhuang (Huawei) IETF 92, Dallas, TX USA

Introduction This document defines a YANG data model that can be used to configure and manage routing policies. Routing policies serve the following purposes: Control route advertising Control route receiving Filter and control imported routes Modify attributes of specified routes Attributes of the routes Configure fast reroute (FRR)

Design of Data Model The routing policy Yang module is divided in following containers : asPathFilters ACLFilters communityFilters extendCommunityFilters extendCommunitySooLists rdFilters prefixFilters ipv6PrefixFilters routePolicys: A Route-Policy is a complex filter. A Route-Policy can use the preceding filters to define its matching rules.

Composition of a Route-Policy A Route-Policy consists of node IDs, matching mode, if-match clauses, and apply clauses. Node ID: A Route-Policy consists of one or more nodes. Matching mode: 1) permit; 2) deny. if-match clause: The if-match clause defines the matching rules. apply clause: The apply clauses specify actions. Matching results of a Route-Policy: The matching results of a Route-Policy are obtained based on the following aspects: Matching mode of the node, either permit or deny Matching rules (either permit or deny) contained in the if-match clause (such as ACLs or IP prefix lists)

Route-Policy Configuration A Route-Policy is a complex filter. It is used to match attributes of specified routes and change route attributes when specific conditions are met. A Route-Policy can use the following filters to define its matching rules: asPathFilters, ACLFilters, communityFilters, extendCommunityFilters, extendCommunitySooLists , rdFilters , prefixFilters, ipv6PrefixFilters

Next Steps Request for suggestions Solicit comments and collaboration