<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc comments="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-teas-yang-te-40" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="TE YANG Data Model">A YANG Data Model for Traffic Engineering Tunnels, Label Switched Paths, and Interfaces</title>

    <author initials="T." surname="Saad" fullname="Tarek Saad">
      <organization>Cisco Systems Inc</organization>
      <address>
        <email>tsaad.net@gmail.com</email>
      </address>
    </author>
    <author initials="R." surname="Gandhi" fullname="Rakesh Gandhi">
      <organization>Cisco Systems Inc</organization>
      <address>
        <email>rgandhi@cisco.com</email>
      </address>
    </author>
    <author initials="X." surname="Liu" fullname="Xufeng Liu">
      <organization>Alef Edge</organization>
      <address>
        <email>xufeng.liu.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="V. P." surname="Beeram" fullname="Vishnu Pavan Beeram">
      <organization>Juniper Networks</organization>
      <address>
        <email>vbeeram@juniper.net</email>
      </address>
    </author>
    <author initials="I." surname="Bryskin" fullname="Igor Bryskin">
      <organization>Individual</organization>
      <address>
        <email>i_bryskin@yahoo.com</email>
      </address>
    </author>

    <date year="2025" month="November" day="02"/>

    
    <workgroup>TEAS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 61?>

<t>This document defines a YANG data model for the provisioning and management of
Traffic Engineering (TE) tunnels, Label Switched Paths (LSPs), and interfaces.
The model covers data that is independent of any technology or dataplane encapsulation
and is divided into two YANG modules that cover device-specific, and device independent
data.</t>

<t>This model covers data for configuration, operational state, remote procedural
calls, and event notifications.</t>



    </abstract>



  </front>

  <middle>


<?line 72?>

<section anchor="introduction"><name>Introduction</name>

<t>YANG <xref target="RFC6020"/> and <xref target="RFC7950"/> is a data modeling language that was
introduced to define the contents of a conceptual data store that allows
networked devices to be managed using NETCONF <xref target="RFC6241"/>. YANG has proved
relevant beyond its initial confines, as bindings to other interfaces (e.g.
RESTCONF <xref target="RFC8040"/>) and encoding other than XML (e.g. JSON) are being defined.
Furthermore, YANG data models can be used as the basis of implementation for
other interfaces, such as CLI and programmatic APIs.</t>

<t>This document describes a YANG data model for Traffic Engineering (TE) tunnels,
Label Switched Paths (LSPs), and interfaces. The data model is divided into two
YANG modules. The 'ietf-te' module includes data that is generic and
device independent, while the 'ietf-te-device' module includes data that is
device-specific.</t>

<t>The document describes a high-level relationship between the modules defined in
this document, as well as other external protocol YANG modules.  The TE generic
YANG data model does not include any data specific to a signaling protocol.  It
is expected other data plane technology models will augment the TE generic
YANG data model.</t>

<t>Also, it is expected that other YANG modules that model TE signaling protocols,
such as RSVP-TE (<xref target="RFC3209"/>, <xref target="RFC3473"/>), or Segment-Routing TE (SR-TE) 
<xref target="RFC9256"/> will augment the generic TE YANG  module.</t>

</section>
<section anchor="terms-and-conventions"><name>Terms and Conventions</name>

<section anchor="terminology"><name>Terminology</name>

<t>The following terms are defined in <xref target="RFC6241"/> and are used in this specification:</t>

<t><list style="symbols">
  <t>client</t>
  <t>configuration data</t>
  <t>state data</t>
</list></t>

<t>This document also makes use of the following terminology introduced in the
YANG Data Modeling Language <xref target="RFC7950"/>:</t>

<t><list style="symbols">
  <t>augment</t>
  <t>data model</t>
  <t>data node</t>
</list></t>

</section>
<section anchor="prefixes-in-data-node-names"><name>Prefixes in Data Node Names</name>

<t>In this document, names of data nodes and other data model objects are prefixed
using the standard prefix associated with the corresponding YANG imported
modules, as shown in <xref target="tab1"/>.</t>

<texttable title="Prefixes and corresponding YANG modules" anchor="tab1">
      <ttcol align='left'>Prefix</ttcol>
      <ttcol align='left'>YANG module</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>yang</c>
      <c>ietf-yang-types</c>
      <c><xref target="RFC6991"/></c>
      <c>inet</c>
      <c>ietf-inet-types</c>
      <c><xref target="RFC6991"/></c>
      <c>rt-types</c>
      <c>ietf-routing-types</c>
      <c><xref target="RFC8294"/></c>
      <c>te-types</c>
      <c>ietf-te-types</c>
      <c><xref target="I-D.draft-ietf-teas-rfc8776-update"/></c>
      <c>te-packet-types</c>
      <c>ietf-te-packet-types</c>
      <c><xref target="I-D.draft-ietf-teas-rfc8776-update"/></c>
      <c>te</c>
      <c>ietf-te</c>
      <c>this document</c>
      <c>te-dev</c>
      <c>ietf-te-device</c>
      <c>this document</c>
</texttable>

</section>
<section anchor="model-tree-diagrams"><name>Model Tree Diagrams</name>

<t>The tree diagrams extracted from the modules defined in this document are given in
subsequent sections as per the syntax defined in <xref target="RFC8340"/>.</t>

</section>
</section>
<section anchor="design-considerations"><name>Design Considerations</name>

<t>This document describes a generic TE YANG data model that is independent of
any dataplane technology.  One of the design objectives is to allow specific
data plane technology models to reuse the TE generic data model and possibly
augment it with technology specific data.</t>

<t>The elements of the generic TE YANG data model, including TE Tunnels, LSPs, and
interfaces have leafs that identify the technology layer where they reside.
For example, the LSP encoding type can identify the technology associated with a
TE Tunnel or LSP.</t>

<t>Also, the generic TE YANG data model does not cover signaling protocol data.
The signaling protocols used to instantiate TE LSPs are outside the scope of this
document and expected to be covered by augmentations defined in other documents.</t>

<t>The following other design considerations are taken into account with respect to data
organization:</t>

<t><list style="symbols">
  <t>The device independent TE data is defined in the 'ietf-te' module, and
can be used to manage data off a device, such as a TE controller. When the
model is used to manage a specific device, the model contains the TE Tunnels
originating from the specific device.  When the model is used to manage a TE
controller, the 'tunnel' list contains all TE Tunnels and TE tunnel segments
originating from devices that the TE controller manages.</t>
  <t>The device-specific TE data is defined in the 'ietf-te-device' module.</t>
  <t>Minimal elements in the model are designated as "mandatory" to
allow freedom to vendors to adapt the data model to their specific product
implementation.</t>
  <t>Suitable defaults are specified for all configurable elements.</t>
  <t>Where TE functions or features might be optional within the
deployed TE network, the model declares them as optional.</t>
</list></t>

<section anchor="state-data-organization"><name>State Data Organization</name>

<t>The Network Management Datastore Architecture (NMDA) <xref target="RFC8342"/> addresses
modeling state data for ephemeral objects.  This document adopts the NMDA model
for configuration and state data representation as per IETF guidelines for new
IETF YANG data models.</t>

</section>
</section>
<section anchor="model-overview"><name>Model Overview</name>

<t>The data model defined in this document cover the core TE features that are
commonly supported by different vendor implementations. The support of extended
or vendor specific TE features is expected to either be in augmentations, or
deviations to this model that are defined in separate documents.</t>

<section anchor="module-relationship"><name>Module Relationship</name>

<t>The generic TE YANG data model, defined in the 'ietf-te' YANG module, provides
device-independent building blocks that are agnostic of specific technologies
or control plane instances. The TE device YANG data model, defined in the
'ietf-te-device' YANG module, augments the 'ietf-te' YANG module as illustrated in
<xref target="figctrl"/> by including device-specific data such as TE interface attributes and
local TE node timers.</t>

<t>The TE data models for specific instances of data plane technology and
signaling protocols are outside the scope of this document.  They could be
defined in separate YANG modules that augment the generic TE YANG data model.</t>

<figure title="Relationship of TE modules with signaling protocol modules" anchor="figctrl"><artwork><![CDATA[
     TE generic     +---------+
     module         | ietf-te |o-------------+
                    +---------+               \
                        o  o                   \
                        |   \                   \
                        |    \ TE device module  \
                        |     +----------------+  \
                        |     | ietf-te-device |   \
                        |     +----------------+    \
                        |        o                   \
                        |        |                    \
                        |        |                     \
                    +---------------+          +---------------+
     RSVP-TE module | ietf-rsvp-te^ |o         | ietf-te-mpls^ |
                    +---------------+ \        +---------------+
                        |              \
                        |               \
                        |                \
                        |                 \
                        |                  \
                        o                +-------------------+
                    +------------+       | ietf-rsvp-otn-te^ |
     RSVP module    | ietf-rsvp^ |       +-------------------+
                    +------------+         RSVP-TE with OTN
                                              extensions

                   X---oY indicates that module X augments module Y
                   ^ indicates a module defined in other documents

]]></artwork></figure>

</section>
</section>
<section anchor="te-yang-model"><name>TE YANG Model</name>

<t>The generic TE YANG data model defined in the 'ietf-te' module supports the management and
operation of a TE network. This includes creating, modifying, and retrieving
information about TE Tunnels, LSPs, and interfaces and their associated
attributes (e.g.  Administrative-Groups, SRLGs, etc.).</t>

<t>A full tree diagram of the TE YANG data model is shown in <xref target="AppendixB"/>.</t>

<section anchor="module-structure"><name>Module Structure</name>

<t>The 'te' container is the top level container in the 'ietf-te' module. The
presence of the 'te' container enables TE function system-wide.  Further
descriptions of containers that exist under the 'te' top level container are
provided in the following sections.</t>

<t>The three containers grouped under the 'te'
container as shown in <xref target="fig-highlevel"/> and described below.</t>

<t>globals:</t>

<ul empty="true"><li>
  <t>The 'globals' container maintains the set of global TE attributes that can be
applicable to TE Tunnels and interfaces. Refer to <xref target="TeGlobals"/> for further details.</t>
</li></ul>

<t>tunnels:</t>

<ul empty="true"><li>
  <t>The 'tunnels' container includes the list of TE Tunnels that are instantiated.
Refer to <xref target="TE_TUNNELS"/> for further details on the properties of a TE Tunnel.</t>
</li></ul>

<t>lsps:</t>

<ul empty="true"><li>
  <t>The 'lsps' container includes the list of TE LSPs that are instantiated for
TE Tunnels. Refer to <xref target="TE_LSPS"/> for further details on the properties of a TE LSP.</t>
</li></ul>

<t>The model also contains two Remote Procedure Calls (RPCs) as shown
in <xref target="AppendixB"/> and described below.</t>

<t>tunnels-path-compute:</t>

<ul empty="true"><li>
  <t>An RPC to request path computation for a specific TE Tunnel.
The RPC allows requesting path computation using atomic and stateless operation.
A tunnel may also be configured in 'compute-only' mode to provide stateful path updates
- see <xref target="TE_TUNNELS"/> for further details.</t>
</li></ul>

<t>tunnels-action:</t>

<ul empty="true"><li>
  <t>An RPC to request a specific action (e.g. reoptimize, or tear-and-setup) to be taken
on a specific tunnel or all tunnels.</t>
</li></ul>

<figure title="TE Tunnel model high-level YANG tree view" anchor="fig-highlevel"><artwork><![CDATA[
module: ietf-te
  +--rw te!
     +--rw globals
     |     ...
     +--rw tunnels
     |     ...
     +--ro lsps
           ...

  rpcs:
    +---x tunnels-path-compute
    |  +---w input
    |  |     ...
    |  +--ro output
    |        ...
    +---x tunnels-actions
       +---w input
       |     ...
       +--ro output
             ...

]]></artwork></figure>

<section anchor="TeGlobals"><name>TE Globals</name>

<t>The 'globals' container covers properties that control a TE feature's
behavior system-wide, and its respective state as shown in <xref target="fig-globals"/>
and described in the text that follows.</t>

<figure title="TE globals YANG subtree high-level structure" anchor="fig-globals"><artwork><![CDATA[
     +--rw globals
     |  +--rw named-admin-groups
     |  |  +--rw named-admin-group* [name]
     |  |        ...
     |  +--rw named-srlgs
     |  |  +--rw named-srlg* [name]
     |  |        ...
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
]]></artwork></figure>

<t>named-admin-groups:</t>

<ul empty="true"><li>
  <t>A YANG container for the list of named (extended) administrative groups that may be applied
to TE links.</t>
</li></ul>

<t>named-srlgs:</t>

<ul empty="true"><li>
  <t>A YANG container for the list of named Shared Risk Link Groups (SRLGs) that may be
applied to TE links.</t>
</li></ul>

<t>named-path-constraints:</t>

<ul empty="true"><li>
  <t>A YANG container for a list of named path constraints. Each named path constraint is
composed of a set of constraints that can be applied during path computation.
A named path constraint can be applied to multiple TE Tunnels. Path constraints may also
be specified directly under the TE Tunnel. The path constraints specified under
the TE Tunnel take precedence over the path constraints 
derived from the referenced named path constraint. A named path constraint entry can be
formed of the path constraints shown in <xref target="fig-named-constraints"/>:</t>
</li></ul>

<figure title="Named path constraints YANG subtree" anchor="fig-named-constraints"><artwork><![CDATA[
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
     |             {te-types:named-path-constraints}?
     |        +--rw name                             string
     |        +--rw te-bandwidth
     |        |     ...
     |        +--rw link-protection?                 identityref
     |        +--rw setup-priority?                  uint8
     |        +--rw hold-priority?                   uint8
     |        +--rw signaling-type?                  identityref
     |        +--rw path-metric-bounds
     |        |     ...
     |        +--rw path-affinities-values
     |        |     ...
     |        +--rw path-affinity-names
     |        |     ...
     |        +--rw path-srlgs-lists
     |        |     ...
     |        +--rw path-srlgs-names
     |        |     ...
     |        +--rw disjointness?
     |        |       te-path-disjointness
     |        +--rw explicit-route-objects
     |        |     ...
     |        +--rw path-in-segment!
     |        |     ...
     |        +--rw path-out-segment!
     |              ...

]]></artwork></figure>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>name: A YANG leaf that holds the named path constraint entry. This is unique in the list and used as a key.</t>
    <t>te-bandwidth: A YANG container that holds the technology agnostic TE bandwidth constraint.</t>
    <t>link-protection: A YANG leaf that holds the link protection type constraint required for the links to be included in the computed path.</t>
    <t>setup/hold priority: YANG leafs that hold the LSP setup and hold admission priority as defined in <xref target="RFC3209"/>.</t>
    <t>signaling-type: A YANG leaf that holds the LSP setup type, such as RSVP-TE or SR.</t>
    <t>path-metric-bounds: A YANG container that holds the set of metric bounds applicable on the
computed TE tunnel path.</t>
    <t>path-affinities-values: A YANG container that holds the set of affinity values and
mask to be used during path computation.</t>
    <t>path-affinity-names: A YANG container that holds the set of named affinity constraints and
corresponding inclusion or exclusion instructions for each to be used during path computation.</t>
    <t>path-srlgs-lists: A YANG container that holds the set of SRLG values and
corresponding inclusion or exclusion instructions to be used during path computation.</t>
    <t>path-srlgs-names: A YANG container that holds the set of named SRLG constraints and
corresponding inclusion or exclusion instructions for each to be used during path computation.</t>
    <t>disjointness: The level of resource disjointness constraint that the secondary path
of a TE tunnel has to adhere to.</t>
    <t>explicit-route-objects: A YANG container that holds path constraints in the form of route entries present in the following two lists:
    <list style="symbols">
        <t>'route-object-exclude-always': a list of route entries that are always excluded from the path computation. The exclusion of a route entry in this list during path computation is not order sensitive. The route entries in this list have a 'strict' hop-type as described in <xref target="RFC4874"/> section 3.1.</t>
        <t>'route-object-include-exclude': a list of route entries to include or exclude for the path computation. For route entries in this list that are to be excluded, the hop-type is only allowed to be 'strict' as described in <xref target="RFC4874"/> section 3.1.<br />
The constraint type (include or exclude) is specified with each route entry. The path computation considers route entry constraints in the order they appear in this list. Once a route entry constraint is consumed from this list, it is not considered any further in the computation of the TE path.<br />
The 'route-object-include-exclude' is used to configure constraints on which route objects (e.g., nodes, links) are included or excluded in the path computation.<br />
The interpretation of an empty 'route-object-include-exclude' list depends on the TE Tunnel (end-to-end or Tunnel Segment) and on the specific path, according to the following rules:<br />
        <list style="numbers" type="1">
            <t>An empty 'route-object-include-exclude' list for the primary path of an end-to-end TE Tunnel indicates that there are no route objects to be included or excluded in the path computation.</t>
            <t>An empty 'route-object-include-exclude' list for the primary path of a TE Tunnel Segment indicates that no primary LSP is required for that TE Tunnel Segement.</t>
            <t>An empty 'route-object-include-exclude' list for a reverse path means it always follows the forward path (i.e., the TE Tunnel is co-routed). When the 'route-object-include-exclude' list is not empty, the reverse path is routed independently of the forward path.</t>
            <t>An empty 'route-object-include-exclude' list for the secondary (forward) path of a TE Tunnel segment indicates that the secondary path has the same endpoints as the primary path.</t>
          </list></t>
      </list></t>
    <t>path-in-segment: A YANG container that contains a list of label restrictions
that have to be taken into considerations when stitching to another tunnel
segment such as at a domain boundary.  The TE tunnel segment in this case
is being stitched to the upstream TE tunnel segment.</t>
    <t>path-out-segment: A YANG container that contains a list of label restrictions
that have to be taken into considerations when stitching to another tunnel
segment such as at a domain boundary.  The TE tunnel segment in this case
is being stitched to the downstream TE tunnel segment.</t>
  </list></t>
</li></ul>

</section>
<section anchor="TE_TUNNELS"><name>TE Tunnels</name>

<t>The 'tunnels' container holds the list of TE Tunnels that are provisioned on
ingress router devices in the network as shown in <xref target="fig-te-tunnel"/>.</t>

<figure title="TE Tunnel YANG subtree structure" anchor="fig-te-tunnel"><artwork><![CDATA[
module: ietf-te
  +--rw te
     +--rw tunnels
        +--rw tunnel* [name]
           +--rw name                            string
           +--rw alias?                          string
           +--rw identifier?                     uint32
           +--rw color?                          uint32
           +--rw description?                    string
           +--rw admin-state?                    identityref
           +--ro operational-state?              identityref
           +--rw encoding?                       identityref
           +--rw switching-type?                 identityref
           +--rw source
           |     ...
           +--rw destination
           |     ...
           +--rw bidirectional?                  boolean
           +--rw controller
           |     ...
           +--rw reoptimize-timer?               uint16
           +--rw association-objects
           |     ...
           +--rw protection
           |     ...
           +--rw restoration
           |     ...
           +--rw network-id?                     nw:network-id
           +--rw te-topology-identifier
           |     ...
           +--rw te-bandwidth
           |     ...
           +--rw link-protection?                identityref
           +--rw setup-priority?                 uint8
           +--rw hold-priority?                  uint8
           +--rw signaling-type?                 identityref
           +--rw hierarchy
           |     ...
           +--rw primary-paths
           |     ...
           +--rw secondary-paths
           |     ...
           +--rw secondary-reverse-paths
           |     ...
           +---x tunnel-action
           |     ...
           +---x protection-external-commands
                 ...

]]></artwork></figure>

<t>When the model is used to manage a specific device, the 'tunnel' list contains
the TE Tunnels originating from the specific device. When the model is used to
manage a TE controller, the 'tunnel' list contains all TE Tunnels and TE
tunnel segments originating from devices that the TE controller manages.</t>

<t>The TE Tunnel model allows the configuration and management of the following TE
tunnel objects:</t>

<t>TE Tunnel:</t>

<ul empty="true"><li>
  <t>A YANG container of one or more TE LSPs established between the source and destination
TE Tunnel termination points.</t>
</li></ul>

<t>TE Path:</t>

<ul empty="true"><li>
  <t>An engineered path that once instantiated in the forwarding plane can be used
to forward traffic from the source to the destination TE Tunnel termination points.</t>
</li></ul>

<t>TE LSP:</t>

<ul empty="true"><li>
  <t>A TE LSP is a connection-oriented service established over a TE Path
and that allows the delivery of traffic between the TE Tunnel source and
destination termination points.</t>
</li></ul>

<t>TE Tunnel Segment:</t>

<ul empty="true"><li>
  <t>A segment of a TE Tunnel that is stitched with other segments in order to provision an end-to-end tunnel.</t>
</li></ul>

<t>The TE Tunnel has a number of attributes that are set directly under the
tunnel (as shown in <xref target="fig-te-tunnel"/>). The main attributes of a TE Tunnel are described below:</t>

<t>name:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the name of a TE Tunnel.  The name of the
TE Tunnel uniquely identifies the tunnel within the TE tunnel list.  The name
of the TE Tunnel can be formatted as a Uniform Resource Indicator (URI) by
including the namespace to ensure uniqueness of the name among all the TE
Tunnels present on devices and controllers. The configured TE Tunnels can
be reported with the name of the device embedded within the TE Tunnel name.
For TE Tunnels initiated by the controller, the controller is responsible
to ensure that TE Tunnel names are unique.</t>
</li></ul>

<t>alias:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds an alternate name to the TE tunnel. Unlike the TE tunnel
name, the alias can be modified at any time during the lifetime of the TE tunnel.</t>
</li></ul>

<t>identifier:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds an identifier of the tunnel. This identifier is unique among tunnels
originated from the same ingress device.</t>
</li></ul>

<t>color:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the color associated with the TE tunnel. The color is used
to map or steer services that carry matching color onto the TE tunnel as described in
<xref target="RFC9012"/>.</t>
</li></ul>

<t>admin-state:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the tunnel administrative state.</t>
</li></ul>

<t>operational-state:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the tunnel operational state.</t>
</li></ul>

<t>encoding/switching:</t>

<ul empty="true"><li>
  <t>The 'encoding' and 'switching-type' are YANG leafs that define the specific
technology in which the tunnel operates in as described in <xref target="RFC3945"/>.</t>
</li></ul>

<t>source/destination:</t>

<ul empty="true"><li>
  <t>YANG containers that hold the tunnel source and destination node endpoint identities, including:</t>
</li></ul>

<ul empty="true"><li>
  <t><list style="symbols">
    <t>te-node-id:  A YANG leaf that holds the TE node identifier (as defined in <xref target="I-D.draft-ietf-teas-rfc8776-update"/>) of the source
 or destination of the TE Tunnel.</t>
    <t>node-id: A YANG leaf that holds the node identifier (as defined in <xref target="RFC8345"/>) of the source or
 destination of the TE Tunnel.</t>
    <t>tunnel-tp-id: A YANG leaf that holds the identifier of the source or destination of the TE Tunnel
Termination Points (TTPs) as defined in <xref target="RFC8795"/>. The TTP identifiers are optional
on nodes that have a single TTP per node. For example, TTP identifiers are optional for packet
(IP/MPLS) routers.</t>
  </list></t>
</li></ul>

<t>bidirectional:</t>

<ul empty="true"><li>
  <t>A YANG leaf that when present indicates the LSP of a TE Tunnel is bidirectional
as defined in <xref target="rfc3473"/>.</t>
</li></ul>

<t>controller:</t>

<ul empty="true"><li>
  <t>A YANG container that holds tunnel data relevant to an optional external TE controller that
may initiate or control a tunnel. This target node may be augmented by external modules, for example, to add data for Path Computation Element Protocol (PCEP) initiated and/or
delegated tunnels.</t>
</li></ul>

<t>reoptimize-timer:</t>

<ul empty="true"><li>
  <t>A YANG leaf to set the interval period for tunnel reoptimization.</t>
</li></ul>

<t>association-objects:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the set of associations of the TE Tunnel to other
TE Tunnels. Associations at the TE Tunnel level apply to all paths of the TE
Tunnel. The TE tunnel associations can be overridden by associations
configured directly under the TE Tunnel path.</t>
</li></ul>

<t>protection:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the TE Tunnel protection properties.</t>
</li></ul>

<t>restoration:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the TE Tunnel restoration properties.</t>
</li></ul>

<t>te-topology-identifier:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the topology identifier associated with the topology where paths for the TE tunnel are computed as defined in <xref target="RFC8795"/>.</t>
</li></ul>

<t>network-id:</t>

<ul empty="true"><li>
  <t>A YANG leaf that can optionally be used to identify the network topology where paths for the TE tunnel are computed as defined in <xref target="RFC8345"/>.</t>
</li></ul>

<t>hierarchy:</t>

<ul empty="true"><li>
  <t>A YANG container that holds hierarchy related properties of the TE Tunnel. A TE LSP
  can be set up in MPLS or Generalized MPLS (GMPLS) networks to be used as
  a TE link to carry traffic in other (client) networks <xref target="RFC6107"/>.  In this
  case, the model introduces the TE Tunnel hierarchical link endpoint parameters
  to identify the specific link in the client layer that the underlying TE Tunnel is
  associated with. The hierarchy container includes the following:</t>
</li></ul>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>dependency-tunnels: A hierarchical set of TE Tunnels either provisioned or
to be provisioned in the immediate lower layer, upon which the
current TE Tunnel relies for multi-layer path computation. A dependency TE
Tunnel is provisioned if it has been selected by path computation to support
at least one client-layer TE Tunnel. When a dependency TE Tunnel is
provisioned, it makes the TE link operational in the client layer's network
topology, enabling the provisioning of TE Tunnels in the client layer.</t>
  </list></t>
</li></ul>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>hierarchical-link: A YANG container that holds the identity of the
hierarchical link (in the client layer) that is supported by this TE Tunnel.
The endpoints of the hierarchical link are defined by TE tunnel source and
destination node endpoints. The hierarchical link can be identified by its source
and destination link termination point identifiers.</t>
  </list></t>
</li></ul>

<t>primary-paths:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the list of primary paths.
A primary path is identified by 'name'. A primary path is selected from the list
to instantiate a primary forwarding LSP for the tunnel.  The list of primary
paths is visited by order of preference. A primary path has the following
attributes:</t>
</li></ul>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>primary-reverse-path: A YANG container that holds properties of the
primary reverse path. The reverse path is applicable to
bidirectional TE Tunnels.</t>
  </list></t>
</li></ul>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>candidate-secondary-paths: A YANG container that holds a list of candidate
secondary paths which may be used for the primary path to support path
protection. The candidate secondary paths reference paths from the
tunnel secondary paths list.  The preference of the secondary paths is
specified within the list and dictates the order of visiting the secondary
path from the list. The attributes of a secondary path can be defined
separately from the primary path. The attributes of a secondary path will be
inherited from the associated 'active' primary when not explicitly defined
for the secondary path.</t>
  </list></t>
</li></ul>

<ul empty="true"><li>

</li></ul>

<t>secondary-paths:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the set of secondary paths. A secondary path is
 identified by 'name'. A secondary path can be referenced from the TE Tunnel's
'candidate-secondary-path' list.</t>
</li></ul>

<t>secondary-reverse-paths:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the set of secondary reverse paths. A secondary reverse
path is identified by 'name'. A secondary reverse path can be referenced from the
TE Tunnel's 'candidate-secondary-reverse-paths' list. A secondary reverse path is modeled with
the same data attributes as those of the primary path.</t>
</li></ul>

<t>The following set of common path attributes are shared for primary (forward and reverse) and secondary paths:</t>

<t>path-computation-method:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the method used for computing the TE path.</t>
</li></ul>

<t>path-computation-server:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the path computation server properties when the path is
 externally queried.</t>
</li></ul>

<t>compute-only:</t>

<ul empty="true"><li>
  <t>A path of a TE Tunnel is, by default, provisioned so that it can be instantiated
  in the forwarding plane so that it can carry traffic.
  In some cases, a TE path may be configured only for the
  purpose of computing a path and reporting it without the need to instantiate
  the LSP or commit any resources. In such a case, the path is configured in
  'compute-only' mode to distinguish it from the default behavior. A
  'compute-only' path is configured as usual with the associated per-path
  constraints and properties on a device or TE controller. The device or TE
  controller computes the feasible paths subject to configured constraints.
  A client may query the 'compute-only' computed path properties 'on-demand',
  or alternatively, can subscribe to be notified of computed paths and
  whenever the path properties change.</t>
</li></ul>

<t>use-path-computation:</t>

<ul empty="true"><li>
  <t>A YANG leaf that indicates whether or not path computation is to
  be used for a specified path.</t>
</li></ul>

<t>lockdown:</t>

<ul empty="true"><li>
  <t>A YANG leaf that when set indicates the existing path should not
be globally repaired or reoptimized.</t>
</li></ul>

<t>path-scope:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies whether the path is a segment or an end-to-end path.</t>
</li></ul>

<t>preference:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the preference for the path, used to
choose between paths in a list.  The lower the number, the higher the
preference. Paths with the same preference are treated as equal
and other methods are used to choose between them.</t>
</li></ul>

<t>k-requested-paths:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the number of k-shortest paths requested from the path
  computation server, which are returned in order based on their computed optimization
  objective costs.</t>
</li></ul>

<t>association-objects:</t>

<ul empty="true"><li>
  <t>A YANG container that holds a list of tunnel association properties.</t>
</li></ul>

<t>optimizations:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the optimization objectives
  that path computation will use to select a path.</t>
</li></ul>

<t>named-path-constraint:</t>

<ul empty="true"><li>
  <t>A YANG leafref that references an entry from the global list of named path constraints.</t>
</li></ul>

<t>te-bandwidth:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the path bandwidth (see <xref target="I-D.draft-ietf-teas-rfc8776-update"/>).</t>
</li></ul>

<t>link-protection:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the link protection type required for the links to
be included in the computed path (see <xref target="I-D.draft-ietf-teas-rfc8776-update"/>).</t>
</li></ul>

<t>setup/hold-priority:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>signaling-type:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. This value overrides
the provided one in the referenced named-path-constraint.</t>
</li></ul>

<t>path-metric-bounds:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-affinities-values:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-affinity-names:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-srlgs-lists:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-srlgs-names:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>disjointness:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>explicit-route-objects:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-in-segment:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-out-segment:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>computed-paths-properties:</t>

<ul empty="true"><li>
  <t>A YANG container that holds properties for the list of computed paths.</t>
</li></ul>

<t>computed-path-error-infos:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the list of path computation error information. The
TE system populates entries in this list whenever an error is encountered during the computation of the TE path.</t>
</li></ul>

<t>path-compute-info:</t>

<ul empty="true"><li>
  <t>A YANG grouping that contains leafs representing the path attributes that are passed to the TE path computation engine
to be considered during the path computation. This includes:</t>

  <t><list style="symbols">
    <t>path constraints,</t>
    <t>path optimization objectives, and</t>
    <t>path associations</t>
  </list></t>

  <t>Note, unless overridden under a specific path of the TE tunnel, the TE tunnel's primary path constraints, optimization objectives, and associations are inherited by the primary reverse path, secondary path and secondary reverse path.</t>
</li></ul>

<t>lsps:</t>

<ul empty="true"><li>
  <t>A YANG container that holds a list of LSPs that have been instantiated for this specific path.</t>
</li></ul>

<t>In addition to the path common attributes, the primary path has the following
attributes that are not present in the secondary path:</t>

<t><list style="symbols">
  <t>Only the primary path contains the list of 'candidate-secondary-paths' that
can protect the primary path.</t>
  <t>Only the primary path can contain a primary-reverse-path associated with the
primary path (and its associated list of
'candidate-secondary-reverse-path').</t>
</list></t>

<t>lsp-provisioning-error-infos:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the list of LSP provisioning error information. The
TE system populates entries in this list whenever an error is encountered during the LSP provisioning.</t>
</li></ul>

</section>
<section anchor="TE_LSPS"><name>TE LSPs</name>

<t>The 'lsps' container includes the set of TE LSPs that have been instantiated.
A TE LSP is identified by a 3-tuple ('tunnel-name', 'lsp-id', 'node').</t>

<t>When the model is used to manage a specific device, the 'lsps' list contains all TE
LSPs that traverse the device (including ingressing, transiting and egressing the device).</t>

<t>When the model is used to manage a TE controller, the 'lsps' list
contains the TE LSPs on devices managed by the controller that act as ingress, and may optionally include
TE LSPs on devices managed by the controller that act as transit or egress role.</t>

</section>
</section>
<section anchor="tree-diagram"><name>Tree Diagram</name>

<t><xref target="fig-te-tree"/> shows the tree diagram of depth=4 for the generic TE YANG data model defined in
the 'ietf-te' module. The full tree diagram is shown in <xref target="AppendixB"/>.</t>

<figure title="Tree diagram of depth-4 of TE Tunnel YANG data model" anchor="fig-te-tree"><artwork><![CDATA[
module: ietf-te
  +--rw te
     +--rw enable?    boolean
     +--rw globals
     |  +--rw named-admin-groups
     |  |  +--rw named-admin-group* [name]
     |  |          {te-types:extended-admin-groups,
     |  |           te-types:named-extended-admin-groups}?
     |  |        ...
     |  +--rw named-srlgs
     |  |  +--rw named-srlg* [name] {te-types:named-srlg-groups}?
     |  |        ...
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
     |             {te-types:named-path-constraints}?
     |           ...
     +--rw tunnels
     |  +--rw tunnel* [name]
     |     +--rw name                            string
     |     +--rw alias?                          string
     |     +--rw identifier?                     uint32
     |     +--rw color?                          uint32
     |     +--rw description?                    string
     |     +--rw admin-state?                    identityref
     |     +--ro operational-state?              identityref
     |     +--rw encoding?                       identityref
     |     +--rw switching-type?                 identityref
     |     +--rw source
     |     |     ...
     |     +--rw destination
     |     |     ...
     |     +--rw bidirectional?                  boolean
     |     +--rw controller
     |     |     ...
     |     +--rw reoptimize-timer?               uint16
     |     +--rw association-objects
     |     |     ...
     |     +--rw protection
     |     |     ...
     |     +--rw restoration
     |     |     ...
     |     +--rw network-id?                     nw:network-id
     |     +--rw te-topology-identifier
     |     |     ...
     |     +--rw te-bandwidth
     |     |     ...
     |     +--rw link-protection?                identityref
     |     +--rw setup-priority?                 uint8
     |     +--rw hold-priority?                  uint8
     |     +--rw signaling-type?                 identityref
     |     +--rw hierarchy
     |     |     ...
     |     +--rw primary-paths
     |     |     ...
     |     +--rw secondary-paths
     |     |     ...
     |     +--rw secondary-reverse-paths
     |     |     ...
     |     +---x tunnel-action
     |     |     ...
     |     +---x protection-external-commands
     |           ...
     +--ro lsps
        +--ro lsp* [tunnel-name lsp-id node]
           +--ro tunnel-name                         string
           +--ro lsp-id                              uint16
           +--ro node
           |       te-types:te-node-id
           +--ro source?
           |       te-types:te-node-id
           +--ro destination?
           |       te-types:te-node-id
           +--ro tunnel-id?                          uint16
           +--ro extended-tunnel-id?
           |       yang:dotted-quad
           +--ro operational-state?                  identityref
           +--ro signaling-type?                     identityref
           +--ro origin-type?                        enumeration
           +--ro lsp-resource-status?                enumeration
           +--ro lockout-of-normal?                  boolean
           +--ro freeze?                             boolean
           +--ro lsp-protection-role?                enumeration
           +--ro lsp-protection-state?               identityref
           +--ro ingress-node-id?
           |       te-types:te-node-id
           +--ro egress-node-id?
           |       te-types:te-node-id
           +--ro lsp-actual-route-information
                 ...

  rpcs:
    +---x tunnels-path-compute
    |  +---w input
    |  |  +---w path-compute-info
    |  +--ro output
    |     +--ro path-compute-result
    +---x tunnels-actions
       +---w input
       |  +---w tunnel-info
       |  |  +---w (filter-type)
       |  |        ...
       |  +---w action-info
       |     +---w action?       identityref
       |     +---w disruptive?   empty
       +--ro output
          +--ro action-result?   identityref

]]></artwork></figure>

</section>
<section anchor="yang-module"><name>YANG Module</name>

<t>The generic TE YANG module 'ietf-te' imports the following modules:</t>

<t><list style="symbols">
  <t>ietf-te-types defined in <xref target="I-D.draft-ietf-teas-rfc8776-update"/></t>
  <t>ietf-yang-types and ietf-inet-types defined in <xref target="RFC6991"/></t>
  <t>ietf-network and ietf-network-topology defined in <xref target="RFC8345"/></t>
</list></t>

<t>This module references the following documents:
<xref target="RFC4206"/>, <xref target="RFC4427"/>,
<xref target="RFC4872"/>, <xref target="RFC3209"/>, <xref target="RFC6780"/>,
<xref target="RFC7471"/>, <xref target="RFC9012"/>, <xref target="RFC8570"/>,
<xref target="RFC8232"/>, <xref target="RFC7271"/>, <xref target="RFC8234"/>, <xref target="RFC7308"/>, and <xref target="ITU_G.808.1"/>.</t>

<figure><artwork><![CDATA[
<CODE BEGINS> file "ietf-te@2025-10-27.yang"
module ietf-te {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-te";

  /* RFC Editor Note: Please replace the above line with the URN
   * assigned by IANA and remove this note.
   */

  prefix te;

  /* Import TE generic types */

  import ietf-te-types {
    prefix te-types;
    reference
      "draft-ietf-teas-rfc8776-update: Common YANG Data Types
       for Traffic Engineering.";
  }
  import ietf-yang-types {
    prefix yang;
    reference
      "RFC6991: Common YANG Data Types.";
  }

  import ietf-network {
    prefix "nw";
    reference "RFC 8345: A YANG Data Model for Network Topologies";
  }

  import ietf-network-topology {
    prefix "nt";
    reference "RFC 8345: A YANG Data Model for Network Topologies";
  }

  organization
    "IETF Traffic Engineering Architecture and Signaling (TEAS)
     Working Group.";
  contact
    "WG Web:   <https://tools.ietf.org/wg/teas/>
     WG List:  <mailto:teas@ietf.org>

     Editor:   Tarek Saad
               <mailto:tsaad.net@gmail.com>

     Editor:   Rakesh Gandhi
               <mailto:rgandhi@cisco.com>

     Editor:   Vishnu Pavan Beeram
               <mailto:vbeeram@juniper.net>

     Editor:   Xufeng Liu
               <mailto: xufeng.liu.ietf@gmail.com>

     Editor:   Igor Bryskin
               <mailto:i_bryskin@yahoo.com>";

  description
    "YANG data module for TE configuration, state, and RPCs.
     The model fully conforms to the Network Management
     Datastore Architecture (NMDA).

     Copyright (c) 2025 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
     for full legal notices.";

  // RFC Ed.: replace XXXX with actual RFC number and remove this
  // note.
  // RFC Ed.: update the date below with the date of RFC publication
  // and remove this note.

  revision 2025-10-27 {
    description
      "Initial revision for the TE generic YANG module.";
    reference
      "RFCXXXX: A YANG Data Model for Traffic Engineering Tunnels
       and Interfaces.";
  }

  typedef tunnel-ref {
    type leafref {
      path "/te:te/te:tunnels/te:tunnel/te:name";
      require-instance false;
    }
    description
      "This type is used by data models that need to reference
       a configured TE tunnel.";
  }

  /**
   * TE tunnel generic groupings
   */

  grouping path-common-properties {
    description
      "Common path attributes.";
    leaf name {
      type string;
      description
        "TE path name.";
    }
    leaf symbolic-name {
      type string;
      description
        "The symbolic path name is a human-readable string that
         identifies an LSP in the network.  The symbolic path name
         must remain constant throughout an LSP's lifetime.";
      reference
        "RFC8231, section-7.3.2";
    }
    leaf path-computation-method {
      type identityref {
        base te-types:path-computation-method;
      }
      default "te-types:path-locally-computed";
      description
        "The method used for computing the path, either
         locally computed, queried from a server or not
         computed at all (explicitly configured).";
    }
    container path-computation-server {
      when "derived-from-or-self(../path-computation-method, "
         + "'te-types:path-externally-queried')" {
        description
        "The IP address or the TE identifier of the external
         path computation server.";
      }
      uses te-types:te-generic-node-id;
      description
        "Address of the external path computation
         server.";
    }
    leaf compute-only {
      when "../use-path-computation = 'true'" {
        description
          "Applicable when path computation is requested.";
      }
      type empty;
      description
        "When present, the path is computed, but no resources
         are committed or reserved in the network. The path may
         be recomputed upon topology changes.";
    }
    leaf use-path-computation {
      when "derived-from-or-self(../path-computation-method, "
         + "'te-types:path-locally-computed')";
      type boolean;
      default "true";
      description
        "When 'true' indicates the path is dynamically computed
         and/or validated against the Traffic-Engineering Database
         (TED), and when 'false' indicates no path expansion or
         validation against the TED is required.";
    }
    leaf lockdown {
      type empty;
      description
        "When present, indicates the existing path should not be
         globally repaired or reoptimized.";
    }
    leaf path-scope {
      type identityref {
        base te-types:path-scope-type;
      }
      default "te-types:path-scope-end-to-end";
      config false;
      description
        "Indicates whether the path is a segment or portion of
         the full path, or is an end-to-end path for
         the TE Tunnel.";
    }
  }

  /* This grouping is re-used in path-computation YANG model
   * defined in [I-D.ietf-teas-yang-path-computation] */
  grouping path-compute-info {
    description
      "Attributes used for path computation request.";
    uses tunnel-associations-properties;
    uses te-types:generic-path-optimization;
    leaf named-path-constraint {
      if-feature "te-types:named-path-constraints";
      type leafref {
        path "/te:te/te:globals/te:named-path-constraints/"
           + "te:named-path-constraint/te:name";
      }
      description
        "Reference to a globally defined named path constraint set.";
    }
    uses path-constraints-common;
  }

  /* This grouping is re-used in path-computation YANG model
   * defined in [I-D.ietf-teas-yang-path-computation] */
  grouping path-forward-properties {
    description
      "The path preference.";
    leaf preference {
      type uint8 {
        range "1..255";
      }
      default "1";
      description
        "Specifies a preference for this path. The lower the number
         higher the preference.";
    }
    leaf co-routed {
      when "/te:te/te:tunnels/te:tunnel/te:bidirectional = 'true'" {
        description
          "Applicable to bidirectional tunnels only.";
      }
      type boolean;
      default "false";
      description
        "Indicates whether the reverse path must be co-routed
         with the primary.";
    }
  }

  /* This grouping is re-used in path-computation YANG model
   * defined in [I-D.ietf-teas-yang-path-computation] */
  grouping k-requested-paths {
    description
      "The k-shortest paths requests.";
    leaf k-requested-paths {
      type uint8;
      default "1";
      description
        "The number of k-shortest paths requested from the path
         computation server, which are returned in order based on
         their computed optimization objective costs.";
    }
  }

  grouping path-state {
    description
      "TE per path state parameters.";
    uses path-computation-response;
    container lsp-provisioning-error-infos {
      config false;
      description
        "LSP provisioning error information.";
      list lsp-provisioning-error-info {
        description
          "List of LSP provisioning error info entries.";
        leaf error-reason {
          type identityref {
            base te-types:lsp-provisioning-error-reason;
          }
          description
            "LSP provision error type.";
        }
        leaf error-description {
          type string;
          description
            "The textual representation of the error that occurred
             during LSP provisioning.";
        }
        leaf error-timestamp {
          type yang:date-and-time;
          description
            "Timestamp of when the reported error occurred.";
        }
        leaf error-node-id {
          type te-types:te-node-id;
          description
            "Node identifier of node where error occurred.";
        }
        leaf error-link-id {
          type te-types:te-tp-id;
          description
            "Link ID where the error occurred.";
        }
        leaf lsp-id {
          type uint16;
          description
            "The LSP-ID for which LSP provisioning error was
             returned.";
        }
      }
    }
    container lsps {
      config false;
      description
        "The TE LSPs container.";
      list lsp {
        key "node lsp-id";
        description
          "List of LSPs associated with the tunnel.";
        leaf tunnel-name {
          type leafref {
            path "/te:te/te:lsps/te:lsp/te:tunnel-name";
          }
          description "TE tunnel name.";
        }
        leaf node {
          type leafref {
            path "/te:te/te:lsps/te:lsp[tunnel-name="
               + "current()/../te:tunnel-name][lsp-id="
               + "current()/../te:lsp-id]/te:node";
          }
          description "The node where the LSP state resides.";
        }
        leaf lsp-id {
          type leafref {
            path "/te:te/te:lsps/te:lsp[tunnel-name="
               + "current()/../tunnel-name]/te:lsp-id";
          }
          description "The TE LSP identifier.";
        }
        leaf state-change-timestamp {
          type yang:date-and-time;
          description
            "Indicates the time at which the LSP operational
             state was last updated.";
        }
      }
    }
  }

  /* This grouping is re-used in path-computation YANG model
   * defined in [I-D.ietf-teas-yang-path-computation] */
  grouping path-computation-response {
    description
      "Attributes reported by path computation response.";
    container computed-paths-properties {
      config false;
      description
        "Computed path properties container.";
      list computed-path-properties {
        key "k-index";
        description
          "List of computed paths.";
        leaf k-index {
          type uint8;
          description
            "The k-th path returned from the computation server.
             A lower k value path is more optimal than higher k
             value paths";
        }
        uses te-types:generic-path-properties {
          augment "path-properties" {
            description
              "additional path properties returned by path
               computation.";
            uses te-types:te-bandwidth;
            leaf disjointness-type {
              type te-types:te-path-disjointness;
              config false;
              description
                "The type of resource disjointness.
                 When reported for a primary path, it represents the
                 minimum level of disjointness of all the secondary
                 paths. When reported for a secondary path, it
                 represents the disjointness of the secondary path.";
            }
            leaf last-computed-timestamp {
              type yang:date-and-time;
              config false;
              description
                "Timestamp of when the path was last computed.";
            }
          }
        }
      }
    }
    container computed-path-error-infos {
      config false;
      description
        "Path computation information container.";
      list computed-path-error-info {
        description
          "List of path computation info entries.";
        leaf error-description {
          type string;
          description
            "Textual representation of the error that occurred
             during path computation.";
        }
        leaf error-timestamp {
          type yang:date-and-time;
          description
            "Timestamp of last path computation attempt.";
        }
        leaf error-reason {
          type identityref {
            base te-types:path-computation-error-reason;
          }
          description
            "Reason for the path computation error.";
        }
      }
    }
  }

  grouping protection-restoration-properties {
    description
      "Protection and restoration parameters.";
    container protection {
      description
        "Protection parameters.";
      leaf protection-type {
        type identityref {
          base te-types:lsp-protection-type;
        }
        default "te-types:lsp-protection-unprotected";
        description
          "LSP protection type.";
      }
      leaf protection-reversion-disable {
        type boolean;
        default "false";
        description
          "Disable protection reversion to working path.";
      }
      leaf hold-off-time {
        type uint32;
        units "milli-seconds";
        description
          "The time between the declaration of an SF or SD condition
           and the initialization of the protection switching
           algorithm.";
        reference
          "RFC4427";
      }
      leaf wait-to-revert {
        type uint16;
        units "seconds";
        description
          "Time to wait before attempting LSP reversion.";
        reference
          "RFC4427";
      }
      leaf aps-signal-id {
        type uint8 {
          range "1..255";
        }
        default "1";
        description
          "The Automatic Protection Switching (APS) signal number
           used to reference the traffic of this tunnel. The default
           value for normal traffic is 1.
           The default value for extra-traffic is 255. If not
           specified, non-default values can be assigned by the
           server, if and only if, the server controls both
            endpoints.";
        reference
          "ITU_G.808.1";
      }
    }
    container restoration {
      description
        "Restoration parameters.";
      leaf restoration-type {
        type identityref {
          base te-types:lsp-restoration-type;
        }
        description
          "LSP restoration type.";
      }
      leaf restoration-scheme {
        type identityref {
          base te-types:restoration-scheme-type;
        }
        description
          "LSP restoration scheme.";
      }
      leaf restoration-reversion-disable {
        type boolean;
        default "false";
        description
          "Disable restoration reversion to working path.";
      }
      leaf hold-off-time {
        type uint32;
        units "milli-seconds";
        description
          "The time between the declaration of an SF or SD condition
           and the initialization of the protection switching
           algorithm.";
        reference
          "RFC4427";
      }
      leaf wait-to-restore {
        type uint16;
        units "seconds";
        description
          "Time to wait before attempting LSP restoration.";
        reference
          "RFC4427";
      }
      leaf wait-to-revert {
        type uint16;
        units "seconds";
        description
          "Time to wait before attempting LSP reversion.";
        reference
          "RFC4427";
      }
    }
  }

  grouping tunnel-associations-properties {
    description
      "TE tunnel association grouping.";
    container association-objects {
      description
        "TE tunnel associations.";
      list association-object {
        key "association-key";
        unique "type id source/id source/type";
        description
          "List of association base objects.";
        reference
          "RFC4872";
        leaf association-key {
          type string;
          description
            "Association key used to identify a specific
             association in the list";
        }
        leaf type {
          type identityref {
            base te-types:association-type;
          }
          description
            "Association type.";
          reference
            "RFC4872";
        }
        leaf id {
          type uint16;
          description
            "Association identifier.";
          reference
            "RFC4872";
        }
        container source {
          uses te-types:te-generic-node-id;
          description
            "Association source.";
          reference
            "RFC4872";
        }
      }
      list association-object-extended {
        key "association-key";
        unique
          "type id source/id source/type global-source extended-id";
        description
          "List of extended association objects.";
        reference
          "RFC6780";
        leaf association-key {
          type string;
          description
            "Association key used to identify a specific
             association in the list";
        }
        leaf type {
          type identityref {
            base te-types:association-type;
          }
          description
            "Association type.";
          reference
            "RFC4872, RFC6780";
        }
        leaf id {
          type uint16;
          description
            "Association identifier.";
          reference
            "RFC4872, RFC6780";
        }
        container source {
          uses te-types:te-generic-node-id;
          description
            "Association source.";
          reference
            "RFC4872, RFC6780";
        }
        leaf global-source {
          type uint32;
          description
            "Association global source.";
          reference
            "RFC6780";
        }
        leaf extended-id {
          type yang:hex-string;
          description
            "Association extended identifier.";
          reference
            "RFC6780";
        }
      }
    }
  }

  grouping tunnel-end-point {
    description
      "Common grouping used to specify the tunnel source and 
      destination end-points.";
    leaf node-id {
      type nw:node-id;
      description
        "The TE tunnel end-point node identifier";
    }
    leaf te-node-id {
      type te-types:te-node-id;
      description
        "The TE tunnel end-point TE node identifier";
    }
    leaf tunnel-tp-id {
      when "../node-id or ../te-node-id" {
        description
          "The TE tunnel termination point identifier is local to 
          a node";
      }
      type binary;
      description
        "The TE tunnel end-point TE tunnel termination point 
        identifier";
    }
  }

  /* This grouping is re-used in path-computation YANG model
   * defined in [I-D.ietf-teas-yang-path-computation] */
  grouping tunnel-common-attributes {
    description
      "Common grouping to define the TE tunnel parameters";
    container source {
      description
        "TE tunnel source end-point.";
      uses tunnel-end-point;
    }
    container destination {
      description
        "TE tunnel destination end-point.";
      uses tunnel-end-point;
    }
    leaf bidirectional {
      type boolean;
      default "false";
      description
        "Indicates a bidirectional tunnel";
    }
  }

  /* This grouping is re-used in path-computation YANG
   * model defined in [I-D.ietf-teas-yang-path-computation] */
  grouping tunnel-hierarchy-properties {
    description
      "A grouping for TE tunnel hierarchy information.";
    container hierarchy {
      description
        "Container for TE hierarchy related information.";
      container dependency-tunnels {
        description
          "List of tunnels that this tunnel can be potentially
           dependent on.";
        list dependency-tunnel {
          key "name";
          description
            "A tunnel entry that this tunnel can potentially depend
             on.";
          leaf name {
            type tunnel-ref;
            description
              "Dependency tunnel name. The tunnel may not have been
               instantiated yet.";
          }
          uses te-types:encoding-and-switching-type;
        }
      }
      container hierarchical-link {
        description
          "Identifies a hierarchical link (in client layer)
           that this tunnel is associated with. By default, the
           topology of the hierarchical link is the same topology of
           the tunnel;";
        reference
          "RFC4206";
        leaf enable {
          type boolean;
          default "false";
          description
            "Enables the hierarchical link properties supported by
             this tunnel";
        }
        leaf local-node-id {
          type nw:node-id;
          description
            "The local node identifier.";
        }
        leaf local-te-node-id {
          type te-types:te-node-id;
          description
            "The local TE node identifier.";
        }
        leaf local-link-tp-id {
          type nt:tp-id;
          description
            "The local link termination point identifier.";
          reference
            "RFC8345";
        }
        leaf local-te-link-tp-id {
          type te-types:te-tp-id;
          description
            "The local TE link termination point identifier.";
        }
        leaf remote-node-id {
          type nw:node-id;
          description
            "The remote node identifier.";
        }
        leaf remote-link-tp-id {
          type nt:tp-id;
          description
            "The remote link termination point identifier.";
          reference
            "RFC8345";
        }
        leaf remote-te-link-tp-id {
          type te-types:te-tp-id;
          description
            "The remote TE link termination point identifier.";
        }
        leaf remote-te-node-id {
          type te-types:te-node-id;
          description
            "Remote TE node identifier.";
        }
        leaf link-id {
          type nt:link-id;
          config false;
          description
            "A network topology assigned identifier to the link";
          reference
            "RFC8345";
        }
        leaf network-id {
          type nw:network-id;
          description
            "The network topology identifier where the hierarchical 
            link supported by this TE tunnel is instantiated.";
        }
        uses te-types:te-topology-identifier {
          description
            "The TE topology identifier where the hierarchical link
             supported by this TE tunnel is instantiated.";
        }
      }
    }
  }

  grouping path-constraints-common {
    description
      "Global named path constraints configuration
       grouping.";
    uses te-types:common-path-constraints-attributes;
    uses te-types:generic-path-disjointness;
    uses te-types:path-constraints-route-objects;
    container path-in-segment {
      presence "The end-to-end tunnel starts in a previous domain;
                this tunnel is a segment in the current domain.";
      description
        "If an end-to-end tunnel crosses multiple domains using
         the same technology, some additional constraints have to be
         taken in consideration in each domain.
         This TE tunnel segment is stitched to the upstream TE tunnel
         segment.";
      uses te-types:label-set-info;
    }
    container path-out-segment {
      presence
        "The end-to-end tunnel is not terminated in this domain;
         this tunnel is a segment in the current domain.";
      description
        "If an end-to-end tunnel crosses multiple domains using
         the same technology, some additional constraints have to be
         taken in consideration in each domain.
         This TE tunnel segment is stitched to the downstream TE
         tunnel segment.";
      uses te-types:label-set-info;
    }
  }

  /**
   * TE container
   */

  container te {
    description
      "TE global container.";
    leaf enable {
      type boolean;
      description
        "Enables the TE component features.";
    }

    /* TE Global Data */
    container globals {
      description
        "Globals TE system-wide configuration data container.";
      container named-admin-groups {
        description
          "TE named admin groups container.";
        list named-admin-group {
          if-feature "te-types:extended-admin-groups";
          if-feature "te-types:named-extended-admin-groups";
          key "name";
          description
            "List of named TE admin-groups.";
          leaf name {
            type string;
            description
              "A name that uniquely identifies a TE
               interface named admin-group.";
          }
          leaf bit-position {
            type uint32;
            description
              "Bit position representing the administrative group.
               Uniquely identify a specific administrative group by
               its numerical position within the bitmask.";
            reference
              "RFC3209 and RFC7308";
          }


        }
      }
      container named-srlgs {
        description
          "TE named SRLGs container.";
        list named-srlg {
          if-feature "te-types:named-srlg-groups";
          key "name";
          description
            "A list of named SRLG groups.";
          leaf name {
            type string;
            description
              "A name that uniquely identifies a TE
               interface named SRLG.";
          }
          leaf value {
            type te-types:srlg;
            description
              "An SRLG value.";
          }
          leaf cost {
            type uint32;
            description
              "The cost associated with an SRLG. This is used as
               a penalty during path computation when the TE path
               traverses a link with this SRLG.";
          }
        }
      }
      container named-path-constraints {
        description
          "TE named path constraints container.";
        list named-path-constraint {
          if-feature "te-types:named-path-constraints";
          key "name";
          leaf name {
            type string;
            description
              "A name that uniquely identifies a
               path constraint set.";
          }
          uses path-constraints-common;
          description
            "A list of named path constraints.";
        }
      }
    }

    /* TE Tunnel Data */
    container tunnels {
      description
        "Tunnels TE configuration data container.";
      list tunnel {
        key "name";
        description
          "The list of TE tunnels.";
        leaf name {
          type string;
          description
            "TE tunnel name.";
        }
        leaf alias {
          type string;
          description
            "An alternate name of the TE tunnel that can be modified
             anytime during its lifetime.";
        }
        leaf identifier {
          type uint32;
          description
            "TE tunnel Identifier.";
          reference
            "RFC3209";
        }
        leaf color {
          type uint32;
          description "The color associated with the TE tunnel.";
          reference "RFC9012";
        }
        leaf description {
          type string;
          default "None";
          description
            "Textual description for this TE tunnel.";
        }
        leaf admin-state {
          type identityref {
            base te-types:tunnel-admin-state-type;
          }
          default "te-types:tunnel-admin-state-up";
          description
            "TE tunnel administrative state.";
        }
        leaf operational-state {
          type identityref {
            base te-types:tunnel-state-type;
          }
          config false;
          description
            "TE tunnel operational state.";
        }
        leaf state-change-timestamp {
          type yang:date-and-time;
          description
            "Indicates the time at which the TE tunnel's operational
             state was last updated.";
        }
        uses te-types:encoding-and-switching-type;
        uses tunnel-common-attributes;
        container controller {
          description
            "Contains tunnel data relevant to external controllers.
             This target node may be augmented by external modules,
             for example, to add data for PCEP initiated and/or
             delegated tunnels.";
          leaf protocol-origin {
            type identityref {
              base te-types:protocol-origin-type;
            }
            description
              "The protocol origin for instantiating the tunnel.";
          }
          leaf controller-entity-id {
            type string;
            description
              "An identifier that is associated with the entity that
               controls the tunnel as defined in RFC8232.";
            reference "RFC8232";
          }
        }
        leaf reoptimize-timer {
          type uint16;
          units "seconds";
          description
            "Frequency of reoptimization of a traffic-engineered
             LSP. A value of 0 means that the LSP is never
             reoptimized";
        }
        uses tunnel-associations-properties;
        uses protection-restoration-properties;
        uses te-types:tunnel-constraints;
        uses tunnel-hierarchy-properties;
        container primary-paths {
          description
            "The set of primary paths.";
          reference "RFC4872";
          list primary-path {
            key "name";
            description
              "List of primary paths for this tunnel.";
            leaf active {
              type boolean;
              config false;
              description
                "Indicates an active path that
                 has been selected from the primary paths list.";
            }
            uses path-common-properties;
            uses path-forward-properties;
            uses k-requested-paths;
            uses path-compute-info;
            uses path-state;
            container primary-reverse-path {
              when "../../../te:bidirectional = 'true'";
              description
                "The reverse primary path properties.";
              uses path-common-properties;
              uses path-compute-info;
              uses path-state;
              container candidate-secondary-reverse-paths {
                description
                  "The set of referenced candidate reverse secondary
                   paths from the full set of secondary reverse paths
                   which may be used for this primary path.";
                list candidate-secondary-reverse-path {
                  key "secondary-reverse-path";
                  ordered-by user;
                  description
                    "List of candidate secondary reverse paths";
                  leaf secondary-reverse-path {
                    type leafref {
                      path "../../../../../../"
                         + "te:secondary-reverse-paths/"
                         + "te:secondary-reverse-path/te:name";
                    }
                    description
                      "A reference to the secondary reverse path that
                       may be utilized when the containing primary
                       reverse path is in use.";
                  }
                  leaf active {
                    type boolean;
                    config false;
                    description
                      "Indicates an active path that has been
                       selected from the secondary reverse paths
                       list.";
                  }
                }
              }
            }
            container candidate-secondary-paths {
              description
                "The set of candidate secondary paths which may be
                 used for this primary path. When secondary paths are
                 specified in the list the path of the secondary LSP
                 in use must be restricted to those paths
                 referenced.
                 The priority of the secondary paths is specified
                 within the list. Higher priority values are less
                 preferred - that is to say that a path with priority
                 0 is the most preferred path. In the case that the
                 list is empty, any secondary path may be
                 utilised when the current primary path is in use.";
              list candidate-secondary-path {
                key "secondary-path";
                ordered-by user;
                description
                  "List of candidate secondary paths for this
                   tunnel.";
                leaf secondary-path {
                  type leafref {
                    path "../../../../../te:secondary-paths/"
                       + "te:secondary-path/te:name";
                  }
                  description
                    "A reference to the secondary path that may be
                     utilised when the containing primary path is
                     in use.";
                }
                leaf active {
                  type boolean;
                  config false;
                  description
                    "Indicates an active path that has been selected
                     from the candidate secondary paths.";
                }
              }
            }
          }
        }
        container secondary-paths {
          description
            "The set of secondary paths.";
          reference "RFC4872";
          list secondary-path {
            key "name";
            description
              "List of secondary paths for this tunnel.";
            uses path-common-properties;
            leaf preference {
              type uint8 {
                range "1..255";
              }
              default "1";
              description
                "Specifies a preference for this path. The lower the
                 number, the higher the preference.";
            }
            leaf secondary-reverse-path {
              type leafref {
                path "../../../"
                   + "te:secondary-reverse-paths/"
                   + "te:secondary-reverse-path/te:name";
              }
              description
                "A reference to the reverse secondary path when
                 co-routed with the secondary path.";
            }
            uses path-compute-info;
            uses protection-restoration-properties;
            uses path-state;
          }
        }
        container secondary-reverse-paths {
          description
            "The set of secondary reverse paths.";
          list secondary-reverse-path {
            key "name";
            description
              "List of secondary paths for this tunnel.";
            uses path-common-properties;
            leaf preference {
              type uint8 {
                range "1..255";
              }
              default "1";
              description
                "Specifies a preference for this path. The lower the
                 number higher the preference. Paths that have the
                 same preference will be activated together.";
            }
            uses path-compute-info;
            uses protection-restoration-properties;
            uses path-state;
          }
        }
        action tunnel-action {
          description
            "Action commands to manipulate the TE tunnel state.";
          reference
            "RFC 3209: RSVP-TE: Extensions to RSVP for LSP Tunnels,
             Section 2.5";
          input {
            leaf action-type {
              type identityref {
                base te-types:tunnel-action-type;
              }
              description
                "The action to be invoked on the TE tunnel.";
            }
          }
          output {
            leaf action-result {
              type identityref {
                base te-types:te-action-result;
              }
              description
                "The result of the tunnel action operation.";
            }
          }
        }
        action protection-external-commands {
          description
            "Actions to manipulate the protection external
             commands of the TE tunnel.";
          reference
            "RFC 4427: Recovery (Protection and Restoration)
             Terminology for Generalized Multi-Protocol Label
             Switching (GMPLS)";
          input {
            leaf protection-external-command {
              type identityref {
                base te-types:protection-external-commands;
              }
              description
                "Protection external command.";
            }
            leaf ingress-node {
              type boolean;
              default "true";
              description
                "When 'true', indicates that the action is
                 applied on the ingress node.
                 By default, the action applies to the ingress
                 node";
            }
            leaf egress-node {
              type boolean;
              default "false";
              description
                "When set to 'true', indicates that the action is
                 applied on the egress node.
                 By default, the action applies to the ingress
                 node.";
            }
            leaf path-name {
              type string;
              description
                "The name of the path that the external command
                applies to.";
            }
            leaf path-type {
              type te-types:path-type;
              description
                "The type of the path that the external command
                applies to.";
            }
            leaf traffic-type {
              type enumeration {
                enum normal-traffic {
                  description
                    "The manual-switch or forced-switch command
                     applies to the normal traffic (this Tunnel).";
                }
                enum null-traffic {
                  description
                    "The manual-switch or forced-switch command
                     applies to the null traffic.";
                }
                enum extra-traffic {
                  description
                    "The manual-switch or forced-switch command
                     applies to the extra traffic (the extra-traffic
                     Tunnel sharing protection bandwidth with this
                     Tunnel).";
                }
              }
              description
                "Indicates whether the manual-switch or forced-switch
                 commands applies to the normal traffic, the null
                 traffic or the extra-traffic.";
              reference
                "RFC4427";
            }
            leaf extra-traffic-tunnel-ref {
              type tunnel-ref;
              description
                "In case there are multiple extra-traffic tunnels
                 sharing protection bandwidth with this Tunnel
                 (m:n protection), represents which extra-traffic
                 Tunnel the manual-switch or forced-switch to
                 extra-traffic command applies to.";
            }
          }
        }
      }
    }

    /* TE LSPs Data */
    container lsps {
      config false;
      description
        "TE LSPs state container.";
      list lsp {
        key "tunnel-name lsp-id node";
        unique "source destination tunnel-id lsp-id "
          + "extended-tunnel-id";
        description
          "List of LSPs associated with the tunnel.";
        leaf tunnel-name {
          type string;
          description "The TE tunnel name.";
        }
        leaf lsp-id {
          type uint16;
          description
            "An identifier unique in the context of the LSP head-end.
             For example, as used in the RSVP-TE SENDER_TEMPLATE and
             FILTER_SPEC objects. The value can be changed to allow a
             sender to share resources with itself.";
          reference
            "RFC3209";
        }
        leaf node {
          type te-types:te-node-id;
          description
            "The node where the LSP state is retrieved.";
        }
        leaf source {
          type te-types:te-node-id;
          description
            "An address of the LSP head-end that identfies the start
             of the tunnel. For example, this may be the tunnel
             sender address extracted from RSVP SENDER_TEMPLATE
             object.";
          reference
            "RFC3209";
        }
        leaf destination {
          type te-types:te-node-id;
          description
            "An address of the LSP endpoint that identfies the end
             of the tunnel. For example, this may be the tunnel end
             point address extracted from RSVP-TE SESSION object.";
          reference
            "RFC3209";
        }
        leaf tunnel-id {
          type uint16;
          description
            "An identifier of the tunnel that remains constant over
             the life of the tunnel. For example, this may be the
             Tunnel ID extracted from RSVP-TE SESSION object.";
          reference
            "RFC3209";
        }
        leaf extended-tunnel-id {
          type yang:dotted-quad;
          description
            "An optional extension qualifier that can be used to
             ensure global uniqueness of the the tunnel identifier
             by carrying an IPv4 address of the LSP head end. For
             example, this may be the Extended Tunnel ID extracted
             from RSVP-TE SESSION object.";
          reference
            "RFC3209";
        }
        leaf operational-state {
          type identityref {
            base te-types:lsp-state-type;
          }
          description
            "The LSP operational state.";
        }
        leaf signaling-type {
          type identityref {
            base te-types:path-signaling-type;
          }
          description
            "The signaling protocol used to set up this LSP.";
        }
        leaf origin-type {
          type enumeration {
            enum ingress {
              description
                "Origin ingress.";
            }
            enum egress {
              description
                "Origin egress.";
            }
            enum transit {
              description
                "Origin transit.";
            }
          }
          description
            "The origin of the LSP relative to the location of the
             local switch in the path.";
        }
        leaf lsp-resource-status {
          type enumeration {
            enum primary {
              description
                "A primary LSP is a fully established LSP for which
                 the resource allocation has been committed at the
                 data plane.";
            }
            enum secondary {
              description
                "A secondary LSP is an LSP that has been provisioned
                 in the control plane only; e.g. resource allocation
                 has not been committed at the data plane.";
            }
          }
          description
            "LSP resource allocation state.";
          reference
            "RFC4872, section 4.2.1";
        }
        leaf lockout-of-normal {
          type boolean;
          description
            "When set to 'true', it represents a lockout of normal
             traffic external command. When set to 'false', it
             represents a clear lockout of normal traffic external
             command. The lockout of normal traffic command applies
             to this Tunnel.";
          reference
            "RFC4427";
        }
        leaf freeze {
          type boolean;
          description
            "When set to 'true', it represents a freeze external
             command.  When set to 'false', it represents a clear
             freeze external command. The freeze command applies to
             all the Tunnels which are sharing the protection
             resources with this Tunnel.";
          reference
            "RFC4427";
        }
        leaf lsp-protection-role {
          type enumeration {
            enum working {
              description
                "A working LSP must be a primary LSP whilst a
                 protecting LSP can be either a primary or a
                 secondary LSP. Also, known as protected LSPs when
                 working LSPs are associated with protecting LSPs.";
            }
            enum protecting {
              description
                "A secondary LSP is an LSP that has been provisioned
                 in the control plane only; e.g. resource allocation
                 has not been committed at the data plane.";
            }
          }
          description
            "LSP role type.";
          reference
            "RFC4872, section 4.2.1";
        }
        leaf lsp-protection-state {
          type identityref {
            base te-types:lsp-protection-state;
          }
          config false;
          description
            "The reported protection state controlling which
             tunnel is using the resources of the protecting LSP.";
        }
        leaf ingress-node-id {
          type te-types:te-node-id;
          description
            "Indicates the te-node-id of the ingress node of the TE
             tunnel or tunnel segment when the protection action is
             applied to the ingress node or the Wait To Restore (WTR)
             timer is active.
             This is set to '0.0.0.0' when the controller is not
             aware of the te-node-id of ingress-node.";
        }
        leaf egress-node-id {
          type te-types:te-node-id;
          description
            "Indicates the te-node-id of the egress node of the TE
             tunnel or tunnel segment when the protection action is
             applied to the ingress node or the WTR timer is active.
             This is set to '0.0.0.0' when the controller is not
             aware of the te-node-id of ingress-node.";
        }
        container lsp-actual-route-information {
          description
            "RSVP recorded route object information.";
          list lsp-actual-route-information {
            when "../../origin-type = 'ingress'" {
              description
                "Applicable on ingress LSPs only.";
            }
            key "index";
            description
              "Record route list entry.";
            uses te-types:record-route-state;
          }
        }
      }
    }
  }

  /* TE Tunnel RPCs/execution Data */

  rpc tunnels-path-compute {
    description
      "This RPC is a generic API whose
       input and output parameters are expected to be provided by
       augments to this module.";
    reference
      "RFC 4655: A Path Computation Element (PCE)-Based
       Architecture.";
    input {
      container path-compute-info {
        /* 
         * An external path compute module may augment this
         * target.
         */
        description
          "RPC input information.";
      }
    }
    output {
      container path-compute-result {
        /* 
         * An external path compute module may augment this
         * target.
         */
        description
          "RPC output information.";
      }
    }
  }

  rpc tunnels-actions {
    description
      "RPC that manipulates the state of a TE tunnel.";
    reference
      "RFC 3209: RSVP-TE: Extensions to RSVP for LSP Tunnels,
       Section 2.5";
    input {
      container tunnel-info {
        description
          "TE tunnel information.";
        choice filter-type {
          mandatory true;
          description
            "Filter choice.";
          case all-tunnels {
            leaf all {
              type empty;
              mandatory true;
              description
                "When present, applies the action on all TE
                 tunnels.";
            }
          }
          case one-tunnel {
            leaf tunnel {
              type tunnel-ref;
              description
                "Apply action on the specific TE tunnel.";
            }
          }
        }
      }
      container action-info {
        description
          "TE tunnel action information.";
        leaf action {
          type identityref {
            base te-types:tunnel-action-type;
          }
          description
            "The action type.";
        }
        leaf disruptive {
          when "derived-from-or-self(../action, "
             + "'te-types:tunnel-action-reoptimize')";
          type empty;
          description
            "Specifies whether reoptimization operations,
             particularly when multiple tunnels are involved,
             are permitted to cause traffic disruption on some
             TE tunnels.";
        }
      }
    }
    output {
      leaf action-result {
        type identityref {
          base te-types:te-action-result;
        }
        description
          "The result of the tunnel action operation.";
      }
    }
  }
}
<CODE ENDS>
]]></artwork></figure>

</section>
</section>
<section anchor="te-device-yang-model"><name>TE Device YANG Model</name>

<t>The device TE YANG module 'ietf-te-device' models data that is specific to
managing a TE device.  This module augments the generic TE YANG module.</t>

<section anchor="module-structure-1"><name>Module Structure</name>

<t>The 'ietf-te-device' modufle defines the configuration and operational state data
that is specific to the device, including those related to the TE subsystem, tunnels, LSPs, and interfaces.</t>

<section anchor="te-device-globals-tunnels-and-lsps"><name>TE Device Globals, Tunnels and LSPs</name>

<t>The 'ietf-te-device' module augments the generic 'ietf-te' module at the
'globals', 'tunnels', and 'lsps' levels to include the device-specific
configurations and operational state.</t>

<t><xref target="fig-if-te-01"/> shows the
'ietf-te-device' subtree generated with depth=4 that describes those
augmentations.</t>

<figure title="TE Device Augmentations to Globals, Tunnels, and LSPs YANG Subtree" anchor="fig-if-te-01"><artwork><![CDATA[
module: ietf-te-device

  augment /te:te/te:globals:
    +--rw lsp-install-interval?        uint32
    +--rw lsp-cleanup-interval?        uint32
    +--rw lsp-invalidation-interval?   uint32
  augment /te:te/te:tunnels/te:tunnel:
    +--rw path-invalidation-action?    identityref
    +--rw lsp-install-interval?        uint32
    +--rw lsp-cleanup-interval?        uint32
    +--rw lsp-invalidation-interval?   uint32
  augment /te:te/te:lsps/te:lsp:
    +--ro lsp-timers
    |  +--ro uptime?            uint32
    |  +--ro time-to-install?   uint32
    |  +--ro time-to-destroy?   uint32
    +--ro downstream-info
    |     ..
    +--ro upstream-info
          ..
]]></artwork></figure>

<t>The following is the description of the augmented data at each level.</t>

<t>Global Timers (Augmenting /te:te/te:globals):</t>

<t>These are device-specific global configuration parameters related to LSP timers, applied system-wide.</t>

<dl>
  <dt>lsp-install-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, before a newly provisioned LSP is installed into the forwarding plane to carry traffic.</t>
  </dd>
  <dt>lsp-cleanup-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, before an LSP is completely removed from the system after it is no longer in use.</t>
  </dd>
  <dt>lsp-invalidation-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, during which a TE LSP's path is considered invalid before any corrective action is taken.</t>
  </dd>
</dl>

<t>Tunnel Device-Dependent Attributes (Augmenting /te:te/te:tunnels/te:tunnel).</t>

<t>These are device-specific configuration parameters that apply to individual TE Tunnels:</t>

<dl>
  <dt>path-invalidation-action</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional identityref that specifies the action to be taken when a TE Tunnel's path is deemed invalid (e.g., tear down, recompute).</t>
  </dd>
  <dt>lsp-install-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, for this specific TE Tunnel before its LSPs are installed into the forwarding plane. This value can override the global lsp-install-interval.</t>
  </dd>
  <dt>lsp-cleanup-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, for this specific TE Tunnel before its LSPs are cleaned up. This value can override the global lsp-cleanup-interval.</t>
  </dd>
  <dt>lsp-invalidation-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, for this specific TE Tunnel during which its path is considered invalid before action is taken. This value can override the global lsp-invalidation-interval.</t>
  </dd>
</dl>

<t>LSP Device-Dependent State (Augmenting /te:te/te:lsps/te:lsp).</t>

<t>These are read-only operational state parameters providing device-specific details for individual LSPs:</t>

<dl>
  <dt>lsp-timers</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>A container that holds various timer-related operational state for an LSP, applicable primarily to ingress LSPs.</t>
  </dd>
  <dt>uptime</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that indicates the total time, in seconds, that the LSP has been operational.</t>
  </dd>
  <dt>time-to-install</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that indicates the remaining time, in seconds, for a new LSP to be fully instantiated and ready to carry traffic.</t>
  </dd>
  <dt>time-to-destroy</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that indicates the remaining time, in seconds, before an existing LSP is torn down.</t>
  </dd>
  <dt>downstream-info</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>A container that holds information about the downstream neighbor and label for the LSP, applicable when the LSP is not at its egress.</t>
  </dd>
  <dt>upstream-info</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>A container that holds information about the upstream neighbor and label for the LSP, applicable when the LSP is not at its ingress.</t>
  </dd>
</dl>

</section>
<section anchor="te-device-interfaces"><name>TE Device Interfaces</name>

<t><xref target="fig-if-te-02"/> shows the TE interface subtree from the TE device module 'ietf-te-device' with depth=4.
The full tree diagram is shown in <xref target="AppendixB"/>.</t>

<figure title="TE interfaces YANG subtree from the TE device YANG data model" anchor="fig-if-te-02"><artwork><![CDATA[
module: ietf-te-device

  augment /te:te:
    +--rw interfaces
       +--rw threshold-type?            enumeration
       +--rw delta-percentage?          rt-types:percentage
       +--rw threshold-specification?   enumeration
       +--rw up-thresholds*             rt-types:percentage
       +--rw down-thresholds*           rt-types:percentage
       +--rw up-down-thresholds*        rt-types:percentage
       +--rw interface* [name]
          +--rw name                                if:interface-ref
          +--rw te-metric?
          |       te-types:te-metric
          +--rw (admin-group-type)?
          |  +--:(value-admin-groups)
          |  |     ...
          |  +--:(named-admin-groups)
          |        ...
          +--rw (srlg-type)?
          |  +--:(value-srlgs)
          |  |     ...
          |  +--:(named-srlgs)
          |        ...
          +--rw threshold-type?                     enumeration
          +--rw delta-percentage?
          |       rt-types:percentage
          +--rw threshold-specification?            enumeration
          +--rw up-thresholds*
          |       rt-types:percentage
          +--rw down-thresholds*
          |       rt-types:percentage
          +--rw up-down-thresholds*
          |       rt-types:percentage
          +--rw switching-capabilities* [switching-capability]
          |  +--rw switching-capability    identityref
          |  +--rw encoding?               identityref
          +--ro te-advertisements-state
             +--ro flood-interval?           uint32
             +--ro last-flooded-time?        uint32
             +--ro next-flooded-time?        uint32
             +--ro last-flooded-trigger?     enumeration
             +--ro advertised-level-areas* [level-area]
                   ...

]]></artwork></figure>

<t>The main elements under the interfaces container are:</t>

<t>threshold-type:</t>

<ul empty="true"><li>
  <t>An optional enumeration that specifies the type of thresholding mechanism used for flooding bandwidth updates for all TE interfaces on the device. Options include 'delta' (flooding on a change greater than a specified delta) or 'threshold-crossed' (flooding when bandwidth crosses a defined threshold).</t>
</li></ul>

<t>delta-percentage:</t>

<ul empty="true"><li>
  <t>An optional percentage value, used when threshold-type is 'delta', indicating the change in reservable bandwidth that triggers an IGP update for all TE interfaces.</t>
</li></ul>

<t>threshold-specification:</t>

<ul empty="true"><li>
  <t>An optional enumeration, used when threshold-type is 'threshold-crossed', to define whether a single set of 'mirrored-up-down' thresholds or separate 'separate-up-down' thresholds are used for increasing and decreasing bandwidth. This applies globally to all TE interfaces.</t>
</li></ul>

<t>up-thresholds:</t>

<ul empty="true"><li>
  <t>A list of percentage values, used with 'separate-up-down' thresholding, that define the points at which bandwidth updates are triggered when the reservable bandwidth is increasing across all TE interfaces.</t>
</li></ul>

<t>down-thresholds:</t>

<ul empty="true"><li>
  <t>A list of percentage values, used with 'separate-up-down' thresholding, that define the points at which bandwidth updates are triggered when the reservable bandwidth is decreasing across all TE interfaces.</t>
</li></ul>

<t>up-down-thresholds:</t>

<ul empty="true"><li>
  <t>A list of percentage values, used with 'mirrored-up-down' thresholding, that define the points at which bandwidth updates are triggered for both increasing and decreasing reservable bandwidth across all TE interfaces.</t>
</li></ul>

<t>interface:</t>

<ul empty="true"><li>
  <t>A list of individual TE interfaces configured on the device. Each entry represents a network interface enabled for Traffic Engineering and contains its specific attributes and state. A TE interface is identified by the 'name' leaf, which references an existing network interface on the device.</t>
</li></ul>

<ul empty="true"><li>
  <t>name:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A leaf that uniquely identifies the TE interface, referencing an existing network interface.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>te-metric:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>An optional leaf that holds the TE metric value associated with this specific interface, used during path computation.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>admin-group-type:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A choice node that allows configuring administrative groups for the interface using either direct values or named references.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>value-admin-groups:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A choice for defining administrative groups using direct bitmask values.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>named-admin-groups:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A list of named administrative groups applied to this TE interface, referencing globally defined named administrative groups.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>srlg-type:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A choice node that allows configuring Shared Risk Link Groups (SRLGs) for the interface using either direct values or named references.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>value-srlgs:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>A list of direct SRLG values that this link is a part of.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>named-srlgs:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>A list of named SRLGs applied to this interface, referencing globally defined named SRLGs.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>threshold-type:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>An optional enumeration, similar to the global threshold-type, but specifically for this individual TE interface, allowing per-interface override of the global bandwidth flooding behavior.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>delta-percentage:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>An optional percentage value, specific to this interface, used when its threshold-type is 'delta'.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>threshold-specification:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>An optional enumeration, specific to this interface, used when its threshold-type is 'threshold-crossed'.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>up-thresholds:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A list of percentage values, specific to this interface, used with 'separate-up-down' thresholding for increasing bandwidth.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>down-thresholds:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A list of percentage values, specific to this interface, used with 'separate-up-down' thresholding for decreasing bandwidth.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>up-down-thresholds:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A list of percentage values, specific to this interface, used with 'mirrored-up-down' thresholding for both increasing and decreasing bandwidth.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>switching-capabilities:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A list of switching capabilities supported by this interface.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>switching-capability:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An identityref indicating a specific switching capability (e.g., Packet, Lambda, Fiber).</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>encoding:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An optional identityref indicating the LSP encoding type supported by this capability on the interface.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>te-advertisements-state:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A read-only container that provides operational state information related to how this TE interface's attributes are advertised.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>flood-interval:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An optional leaf indicating the configured periodic flooding interval for this interface.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>last-flooded-time:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An optional leaf showing the time elapsed since the last advertisement flood for this interface.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>next-flooded-time:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An optional leaf showing the time remaining until the next scheduled advertisement flood for this interface.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>last-flooded-trigger:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An optional enumeration indicating the event that triggered the last advertisement flood (e.g., link-up, bandwidth-change, periodic-timer).</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>advertised-level-areas:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>A list of IGP level-areas in which this TE interface's link state information is advertised.</t>
    </li></ul>
  </li></ul>
</li></ul>

</section>
</section>
<section anchor="tree-diagram-1"><name>Tree Diagram</name>

<t><xref target="fig-te-dev-tree"/> shows the tree diagram of the device TE YANG data model defined in
the 'ietf-te-device' module.</t>

<figure title="TE Tunnel device model YANG tree diagram" anchor="fig-te-dev-tree"><artwork><![CDATA[
module: ietf-te-device

  augment /te:te:
    +--rw interfaces
       +--rw threshold-type?            enumeration
       +--rw delta-percentage?          rt-types:percentage
       +--rw threshold-specification?   enumeration
       +--rw up-thresholds*             rt-types:percentage
       +--rw down-thresholds*           rt-types:percentage
       +--rw up-down-thresholds*        rt-types:percentage
       +--rw interface* [name]
          +--rw name                                if:interface-ref
          +--rw te-metric?
          |       te-types:te-metric
          +--rw (admin-group-type)?
          |  +--:(value-admin-groups)
          |  |  +--rw (value-admin-group-type)?
          |  |     +--:(admin-groups)
          |  |     |  +--rw admin-group?
          |  |     |          te-types:admin-group
          |  |     +--:(extended-admin-groups)
          |  |              {te-types:extended-admin-groups}?
          |  |        +--rw extended-admin-group?
          |  |                te-types:extended-admin-group
          |  +--:(named-admin-groups)
          |     +--rw named-admin-groups* [named-admin-group]
          |             {te-types:extended-admin-groups,
          |              te-types:named-extended-admin-groups}?
          |        +--rw named-admin-group    leafref
          +--rw (srlg-type)?
          |  +--:(value-srlgs)
          |  |  +--rw values* [value]
          |  |     +--rw value    uint32
          |  +--:(named-srlgs)
          |     +--rw named-srlgs* [named-srlg]
          |             {te-types:named-srlg-groups}?
          |        +--rw named-srlg    leafref
          +--rw threshold-type?                     enumeration
          +--rw delta-percentage?
          |       rt-types:percentage
          +--rw threshold-specification?            enumeration
          +--rw up-thresholds*
          |       rt-types:percentage
          +--rw down-thresholds*
          |       rt-types:percentage
          +--rw up-down-thresholds*
          |       rt-types:percentage
          +--rw switching-capabilities* [switching-capability]
          |  +--rw switching-capability    identityref
          |  +--rw encoding?               identityref
          +--ro te-advertisements-state
             +--ro flood-interval?           uint32
             +--ro last-flooded-time?        uint32
             +--ro next-flooded-time?        uint32
             +--ro last-flooded-trigger?     enumeration
             +--ro advertised-level-areas* [level-area]
                +--ro level-area    uint32
  augment /te:te/te:globals:
    +--rw lsp-install-interval?        uint32
    +--rw lsp-cleanup-interval?        uint32
    +--rw lsp-invalidation-interval?   uint32
  augment /te:te/te:tunnels/te:tunnel:
    +--rw path-invalidation-action?    identityref
    +--rw lsp-install-interval?        uint32
    +--rw lsp-cleanup-interval?        uint32
    +--rw lsp-invalidation-interval?   uint32
  augment /te:te/te:lsps/te:lsp:
    +--ro lsp-timers
    |  +--ro uptime?            uint32
    |  +--ro time-to-install?   uint32
    |  +--ro time-to-destroy?   uint32
    +--ro downstream-info
    |  +--ro nhop?                 te-types:te-tp-id
    |  +--ro outgoing-interface?   if:interface-ref
    |  +--ro neighbor
    |  |  +--ro id?     te-gen-node-id
    |  |  +--ro type?   enumeration
    |  +--ro label?                rt-types:generalized-label
    +--ro upstream-info
       +--ro phop?       te-types:te-tp-id
       +--ro neighbor
       |  +--ro id?     te-gen-node-id
       |  +--ro type?   enumeration
       +--ro label?      rt-types:generalized-label

  rpcs:
    +---x link-state-update
       +---w input
          +---w (filter-type)
             +--:(match-all)
             |  +---w all          empty
             +--:(match-one-interface)
                +---w interface?   if:interface-ref

]]></artwork></figure>

</section>
<section anchor="yang-module-1"><name>YANG Module</name>

<t>The 'ietf-te-device' module imports the following modules:</t>

<t><list style="symbols">
  <t>ietf-interfaces defined in <xref target="RFC8343"/></t>
  <t>ietf-routing-types defined in <xref target="RFC8294"/></t>
  <t>ietf-te-types defined in <xref target="I-D.draft-ietf-teas-rfc8776-update"/></t>
  <t>ietf-te defined in this document</t>
</list></t>

<figure><artwork><![CDATA[
<CODE BEGINS> file "ietf-te-device@2025-10-27.yang"
module ietf-te-device {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-te-device";

  /* RFC Editor Note: Please replace the above line with the URN
   * assigned by IANA and remove this note.
   */

  prefix te-dev;

  /* Import TE module */

  import ietf-te {
    prefix te;
    reference
      "RFCXXXX: A YANG Data Model for Traffic Engineering
       Tunnels and Interfaces";
  }

  /* Import TE types */

  import ietf-te-types {
    prefix te-types;
    reference
      "draft-ietf-teas-rfc8776-update: Common YANG Data Types
       for Traffic Engineering.";
  }
  import ietf-interfaces {
    prefix if;
    reference
      "RFC8343: A YANG Data Model for Interface Management";
  }
  import ietf-routing-types {
    prefix rt-types;
    reference
      "RFC8294: Common YANG Data Types for the Routing Area";
  }

  organization
    "IETF Traffic Engineering Architecture and Signaling (TEAS)
     Working Group";
  contact
    "WG Web:   <https://tools.ietf.org/wg/teas/>
     WG List:  <mailto:teas@ietf.org>

     Editor:   Tarek Saad
               <mailto:tsaad.net@gmail.com>

     Editor:   Rakesh Gandhi
               <mailto:rgandhi@cisco.com>

     Editor:   Vishnu Pavan Beeram
               <mailto:vbeeram@juniper.net>

     Editor:   Himanshu Shah
               <mailto:hshah@ciena.com>

     Editor:   Xufeng Liu
               <mailto: xufeng.liu.ietf@gmail.com>

     Editor:   Igor Bryskin
               <mailto:i_bryskin@yahoo.com>";

  description
    "This module defines a data model for TE device configurations,
     state, and RPCs. The model fully conforms to the
     Network Management Datastore Architecture (NMDA).

     Copyright (c) 2025 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
     for full legal notices.";

  // RFC Ed.: replace XXXX with actual RFC number and remove this
  // note.
  // RFC Ed.: update the date below with the date of RFC publication
  // and remove this note.

  revision 2025-10-27 {
    description
      "Initial revision for the TE device YANG module.";
    reference
      "RFCXXXX: A YANG Data Model for Traffic Engineering Tunnels
       and Interfaces";
  }

  grouping lsp-device-timers {
    description
      "Device TE LSP timers configs.";
    leaf lsp-install-interval {
      type uint32;
      units "seconds";
      description
        "TE LSP installation delay time.";
    }
    leaf lsp-cleanup-interval {
      type uint32;
      units "seconds";
      description
        "TE LSP cleanup delay time.";
    }
    leaf lsp-invalidation-interval {
      type uint32;
      units "seconds";
      description
        "TE LSP path invalidation before taking action delay time.";
    }
  }

  grouping te-igp-flooding-bandwidth-config {
    description
      "Configurable items for igp flooding bandwidth
       threshold configuration.";
    leaf threshold-type {
      type enumeration {
        enum delta {
          description
            "'delta' indicates that the local
             system should flood IGP updates when a
             change in reserved bandwidth >= the specified
             delta occurs on the interface.";
        }
        enum threshold-crossed {
          description
            "THRESHOLD-CROSSED indicates that
             the local system should trigger an update (and
             hence flood) the reserved bandwidth when the
             reserved bandwidth changes such that it crosses,
             or becomes equal to one of the threshold values.";
        }
      }
      description
        "The type of threshold that should be used to specify the
         values at which bandwidth is flooded. 'delta' indicates that
         the local system should flood IGP updates when a change in
         reserved bandwidth >= the specified delta occurs on the
         interface. Where 'threshold-crossed' is specified, the local
         system should trigger an update (and hence flood) the
         reserved bandwidth when the reserved bandwidth changes such
         that it crosses, or becomes equal to one of the threshold
         values.";
    }
    leaf delta-percentage {
      when "../threshold-type = 'delta'" {
        description
          "The percentage delta can only be specified when the
           threshold type is specified to be a percentage delta of
           the reserved bandwidth.";
      }
      type rt-types:percentage;
      description
        "The percentage of the maximum-reservable-bandwidth
         considered as the delta that results in an IGP update
         being flooded.";
    }
    leaf threshold-specification {
      when "../threshold-type = 'threshold-crossed'" {
        description
          "The selection of whether mirrored or separate threshold
           values are to be used requires user-specified thresholds
           to be set.";
      }
      type enumeration {
        enum mirrored-up-down {
          description
            "mirrored-up-down indicates that a single set of
             threshold values should be used for both increasing
             and decreasing bandwidth when determining whether
             to trigger updated bandwidth values to be flooded
             in the IGP TE extensions.";
        }
        enum separate-up-down {
          description
            "separate-up-down indicates that a separate
             threshold values should be used for the increasing
             and decreasing bandwidth when determining whether
             to trigger updated bandwidth values to be flooded
             in the IGP TE extensions.";
        }
      }
      description
        "This value specifies whether a single set of threshold
         values should be used for both increasing and decreasing
         bandwidth when determining whether to trigger updated
         bandwidth values to be flooded in the IGP TE extensions.
         'mirrored-up-down' indicates that a single value (or set of
         values) should be used for both increasing and decreasing
         values, where 'separate-up-down' specifies that the
         increasing and decreasing values will be separately
         specified.";
    }
    leaf-list up-thresholds {
      when "../threshold-type = 'threshold-crossed'"
         + "and ../threshold-specification = 'separate-up-down'" {
        description
          "A list of up-thresholds can only be specified when the
           bandwidth update is triggered based on crossing a
           threshold and separate up and down thresholds are
           required.";
      }
      type rt-types:percentage;
      description
        "The thresholds (expressed as a percentage of the maximum
         reservable bandwidth) at which bandwidth updates are to be
         triggered when the bandwidth is increasing.";
    }
    leaf-list down-thresholds {
      when "../threshold-type = 'threshold-crossed'"
         + "and ../threshold-specification = 'separate-up-down'" {
        description
          "A list of down-thresholds can only be specified when the
           bandwidth update is triggered based on crossing a
           threshold and separate up and down thresholds are
           required.";
      }
      type rt-types:percentage;
      description
        "The thresholds (expressed as a percentage of the maximum
         reservable bandwidth) at which bandwidth updates are to be
         triggered when the bandwidth is decreasing.";
    }
    leaf-list up-down-thresholds {
      when "../threshold-type = 'threshold-crossed'"
         + "and ../threshold-specification = 'mirrored-up-down'" {
        description
          "A list of thresholds corresponding to both increasing
           and decreasing bandwidths can be specified only when an
           update is triggered based on crossing a threshold, and
           the same up and down thresholds are required.";
      }
      type rt-types:percentage;
      description
        "The thresholds (expressed as a percentage of the maximum
         reservable bandwidth of the interface) at which bandwidth
         updates are flooded - used both when the bandwidth is
         increasing and decreasing.";
    }
  }

  /**
   * TE device augmentations
   */
  augment "/te:te" {
    description
      "TE global container.";
    /* TE Interface Configuration Data */
    container interfaces {
      description
        "Configuration data model for TE interfaces.";
      uses te-igp-flooding-bandwidth-config;
      list interface {
        key "name";
        description
          "The list of interfaces enabled for TE.";
        leaf name {
          type if:interface-ref;
          description
            "The reference to interface enabled for TE.";
        }
        /* TE interface parameters */
        leaf te-metric {
          type te-types:te-metric;
          description
            "TE interface metric.";
        }
        choice admin-group-type {
          description
            "TE interface administrative groups
             representation type.";
          case value-admin-groups {
            choice value-admin-group-type {
              description
                "The type of admin-groups.";
              case admin-groups {
                description
                  "Administrative group/Resource
                   class/Color.";
                leaf admin-group {
                  type te-types:admin-group;
                  description
                    "TE interface administrative group.";
                }
              }
              case extended-admin-groups {
                if-feature "te-types:extended-admin-groups";
                description
                  "Extended administrative group/Resource
                   class/Color.";
                leaf extended-admin-group {
                  type te-types:extended-admin-group;
                  description
                    "TE interface extended administrative group.";
                }
              }
            }
          }
          case named-admin-groups {
            list named-admin-groups {
              if-feature "te-types:extended-admin-groups";
              if-feature "te-types:named-extended-admin-groups";
              key "named-admin-group";
              description
                "A list of named admin-group entries.";
              leaf named-admin-group {
                type leafref {
                  path "../../../../te:globals/"
                     + "te:named-admin-groups/te:named-admin-group/"
                     + "te:name";
                }
                description
                  "A named admin-group entry.";
              }
            }
          }
        }
        choice srlg-type {
          description
            "Choice of SRLG configuration.";
          case value-srlgs {
            list values {
              key "value";
              description
                "List of SRLG values that
                 this link is part of.";
              leaf value {
                type uint32 {
                  range "0..4294967295";
                }
                description
                  "Value of the SRLG";
              }
            }
          }
          case named-srlgs {
            list named-srlgs {
              if-feature "te-types:named-srlg-groups";
              key "named-srlg";
              description
                "A list of named SRLG entries.";
              leaf named-srlg {
                type leafref {
                  path "../../../../te:globals/"
                     + "te:named-srlgs/te:named-srlg/te:name";
                }
                description
                  "A named SRLG entry.";
              }
            }
          }
        }
        uses te-igp-flooding-bandwidth-config;
        list switching-capabilities {
          key "switching-capability";
          description
            "List of interface capabilities for this interface.";
          leaf switching-capability {
            type identityref {
              base te-types:switching-capabilities;
            }
            description
              "Switching Capability for this interface.";
          }
          leaf encoding {
            type identityref {
              base te-types:lsp-encoding-types;
            }
            description
              "Encoding supported by this interface.";
          }
        }
        container te-advertisements-state {
          config false;
          description
            "TE interface advertisements state container.";
          leaf flood-interval {
            type uint32;
            description
              "The periodic flooding interval.";
          }
          leaf last-flooded-time {
            type uint32;
            units "seconds";
            description
              "Time elapsed since last flooding in seconds.";
          }
          leaf next-flooded-time {
            type uint32;
            units "seconds";
            description
              "Time remained for next flooding in seconds.";
          }
          leaf last-flooded-trigger {
            type enumeration {
              enum link-up {
                description
                  "Link-up flooding trigger.";
              }
              enum link-down {
                description
                  "Link-down flooding trigger.";
              }
              enum threshold-up {
                description
                  "Bandwidth reservation up threshold.";
              }
              enum threshold-down {
                description
                  "Bandwidth reservation down threshold.";
              }
              enum bandwidth-change {
                description
                  "Bandwidth capacity change.";
              }
              enum user-initiated {
                description
                  "Initiated by user.";
              }
              enum srlg-change {
                description
                  "SRLG property change.";
              }
              enum periodic-timer {
                description
                  "Periodic timer expired.";
              }
            }
            default "periodic-timer";
            description
              "Trigger for the last flood.";
          }
          list advertised-level-areas {
            key "level-area";
            description
              "List of level-areas that the TE interface is
               advertised in.";
            leaf level-area {
              type uint32;
              description
                "The IGP area or level where the TE interface link
                 state is advertised in.";
            }
          }
        }
      }
    }
  }

  /* TE globals device augmentation */

  augment "/te:te/te:globals" {
    description
      "Global TE device specific configuration parameters.";
    uses lsp-device-timers;
  }

  /* TE tunnels device configuration augmentation */

  augment "/te:te/te:tunnels/te:tunnel" {
    description
      "Tunnel device dependent augmentation.";
    leaf path-invalidation-action {
      type identityref {
        base te-types:path-invalidation-action-type;
      }
      description
        "Tunnel path invalidation action.";
    }
    uses lsp-device-timers;
  }

  /* TE LSPs device state augmentation */

  augment "/te:te/te:lsps/te:lsp" {
    description
      "TE LSP device dependent augmentation.";
    container lsp-timers {
      when "../te:origin-type = 'ingress'" {
        description
          "Applicable to ingress LSPs only.";
      }
      description
        "Ingress LSP timers.";
      leaf uptime {
        type uint32;
        units "seconds";
        description
          "The LSP uptime.";
      }
      leaf time-to-install {
        type uint32;
        units "seconds";
        description
          "The time remaining for a new LSP to be instantiated
           in forwarding to carry traffic.";
      }
      leaf time-to-destroy {
        type uint32;
        units "seconds";
        description
          "The time remaining for an existing LSP to be torn down.";
      }
    }
    container downstream-info {
      when "../te:origin-type != 'egress'" {
        description
          "Downstream information of the LSP.";
      }
      description
        "Downstream information.";
      leaf nhop {
        type te-types:te-tp-id;
        description
          "Downstream next-hop address.";
      }
      leaf outgoing-interface {
        type if:interface-ref;
        description
          "Downstream interface.";
      }
      container neighbor {
        uses te-types:te-generic-node-id;
        description
          "Downstream neighbor address.";
      }
      leaf label {
        type rt-types:generalized-label;
        description
          "Downstream label.";
      }
    }
    container upstream-info {
      when "../te:origin-type != 'ingress'" {
        description
          "Upstream information of the LSP.";
      }
      description
        "Upstream information.";
      leaf phop {
        type te-types:te-tp-id;
        description
          "Upstream next-hop or previous-hop address.";
      }
      container neighbor {
        uses te-types:te-generic-node-id;
        description
          "Upstream neighbor address.";
      }
      leaf label {
        type rt-types:generalized-label;
        description
          "Upstream label.";
      }
    }
  }

  /* TE interfaces RPCs/execution Data */

  rpc link-state-update {
    description
      "Triggers a link state update for the specific interface.";
    input {
      choice filter-type {
        mandatory true;
        description
          "Filter choice.";
        case match-all {
          leaf all {
            type empty;
            mandatory true;
            description
              "Match all TE interfaces.";
          }
        }
        case match-one-interface {
          leaf interface {
            type if:interface-ref;
            description
              "Match a specific TE interface.";
          }
        }
      }
    }
  }
}
<CODE ENDS>
]]></artwork></figure>

</section>
</section>
<section anchor="notifications"><name>Notifications</name>

<t>Notifications are a key component of any topology data model.</t>

<t><xref target="RFC8639"/> and <xref target="RFC8641"/> define a subscription mechanism and a push
mechanism for YANG datastores.  These mechanisms currently allow the
user to:</t>

<t><list style="symbols">
  <t>Subscribe to notifications on a per-client basis.</t>
  <t>Specify subtree filters or XML Path Language (XPath) filters so
that only contents of interest will be sent.</t>
  <t>Specify either periodic or on-demand notifications.</t>
</list></t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document registers the following URIs in the IETF XML registry
<xref target="RFC3688"/>.
Following the format in <xref target="RFC3688"/>, the following registrations are
requested to be made.</t>

<figure><artwork><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-te
   Registrant Contact:  The IESG.
   XML: N/A, the requested URI is an XML namespace.

   URI: urn:ietf:params:xml:ns:yang:ietf-te-device
   Registrant Contact:  The IESG.
   XML: N/A, the requested URI is an XML namespace.
]]></artwork></figure>

<t>This document registers two YANG modules in the YANG Module Names
registry <xref target="RFC6020"/>.</t>

<figure><artwork><![CDATA[
   Name:       ietf-te
   Namespace:  urn:ietf:params:xml:ns:yang:ietf-te
   Prefix:     te
   Reference:  RFCXXXX

   Name:       ietf-te-device
   Namespace:  urn:ietf:params:xml:ns:yang:ietf-te-device
   Prefix:     te-device
   Reference:  RFCXXXX
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The YANG module specified in this document defines a schema for data that is
designed to be accessed via network management protocols such as NETCONF
<xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure
transport layer, and the mandatory-to-implement secure transport is Secure
Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the
mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>

<t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/> provides the
means to restrict access for particular NETCONF or RESTCONF users to a
preconfigured subset of all available NETCONF or RESTCONF protocol operations
and content.</t>

<t>There are a number of data nodes defined in this YANG module that are
writable/creatable/deletable (i.e., config true, which is the default). These
data nodes may be considered sensitive or vulnerable in some network
environments. Write operations (e.g., edit-config) to these data nodes without
proper protection can have a negative effect on network operations. These are
the subtrees and data nodes and their sensitivity/vulnerability:</t>

<t>"/te/globals":  This module specifies the global TE configurations on a device.
Unauthorized access to this container could cause the device to ignore packets
it should receive and process.</t>

<t>"/te/tunnels":  This list specifies the configuration and state of TE Tunnels
present on the device or controller.  Unauthorized access to this list could
cause the device to ignore packets it should receive and process. An attacker
may also use state to derive information about the network topology,
and subsequently orchestrate further attacks.</t>

<t>"/te/interfaces":  This list specifies the configuration and state TE interfaces
on a device. Unauthorized access to this list could cause the device to ignore packets it
should receive and process.</t>

<t>Some of the readable data nodes in this YANG module may be considered sensitive
or vulnerable in some network environments. It is thus important to control
read access (e.g., via get, get-config, or notification) to these data nodes.
These are the subtrees and data nodes and their sensitivity/vulnerability:</t>

<t>"/te/lsps": this list contains information state about established LSPs in the network.
An attacker can use this information to derive information about the network topology,
and subsequently orchestrate further attacks.</t>

<t>Some of the RPC operations in this YANG module may be considered sensitive or
vulnerable in some network environments. It is thus important to control access
to these operations. These are the operations and their
sensitivity/vulnerability:</t>

<t>"/te/tunnels-actions": using this RPC, an attacker can modify existing paths that
may be carrying live traffic, and hence result in interruption to services
carried over the network.</t>

<t>"/te/tunnels-path-compute": using this RPC, an attacker can retrieve sensitive
information about the network provider which can be used to orchestrate further
attacks.</t>

<t>The security considerations spelled out in the YANG 1.1 specification
<xref target="RFC7950"/> apply for this document as well.</t>

</section>
<section anchor="acknowledgement"><name>Acknowledgement</name>

<t>The authors would like to thank the  members of the multi-vendor YANG design
team who are involved in the definition of this model.</t>

<t>The authors would like to thank Tom Petch and Adrian Farrel for reviewing and
providing useful feedback about the document. The authors would also like to
thank Loa Andersson, Lou Berger, Sergio Belotti, Italo Busi, Carlo Perocchio,
Francesco Lazzeri, Aihua Guo, Dhruv Dhody, and Raqib Jones for providing
feedback on this document.</t>

</section>
<section anchor="contributors"><name>Contributors</name>

<figure><artwork><![CDATA[
   Oscar Gonzalez de Dios
   Telefonica

   Email: oscar.gonzalezdedios@telefonica.com

   Himanshu Shah
   Ciena

   Email: hshah@ciena.com


   Xia Chen
   Huawei Technologies

   Email: jescia.chenxia@huawei.com


   Bin Wen
   Comcast

   Email: Bin_Wen@cable.comcast.com

]]></artwork></figure>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC3209">
  <front>
    <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
    <author fullname="D. Awduche" initials="D." surname="Awduche"/>
    <author fullname="L. Berger" initials="L." surname="Berger"/>
    <author fullname="D. Gan" initials="D." surname="Gan"/>
    <author fullname="T. Li" initials="T." surname="Li"/>
    <author fullname="V. Srinivasan" initials="V." surname="Srinivasan"/>
    <author fullname="G. Swallow" initials="G." surname="Swallow"/>
    <date month="December" year="2001"/>
    <abstract>
      <t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching). Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels. A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3209"/>
  <seriesInfo name="DOI" value="10.17487/RFC3209"/>
</reference>

<reference anchor="RFC6020">
  <front>
    <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
    <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
    <date month="October" year="2010"/>
    <abstract>
      <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6020"/>
  <seriesInfo name="DOI" value="10.17487/RFC6020"/>
</reference>

<reference anchor="RFC6241">
  <front>
    <title>Network Configuration Protocol (NETCONF)</title>
    <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
    <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
    <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
    <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
    <date month="June" year="2011"/>
    <abstract>
      <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6241"/>
  <seriesInfo name="DOI" value="10.17487/RFC6241"/>
</reference>

<reference anchor="RFC6991">
  <front>
    <title>Common YANG Data Types</title>
    <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
    <date month="July" year="2013"/>
    <abstract>
      <t>This document introduces a collection of common data types to be used with the YANG data modeling language. This document obsoletes RFC 6021.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6991"/>
  <seriesInfo name="DOI" value="10.17487/RFC6991"/>
</reference>

<reference anchor="RFC6107">
  <front>
    <title>Procedures for Dynamically Signaled Hierarchical Label Switched Paths</title>
    <author fullname="K. Shiomoto" initials="K." role="editor" surname="Shiomoto"/>
    <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
    <date month="February" year="2011"/>
    <abstract>
      <t>Label Switched Paths (LSPs) set up in Multiprotocol Label Switching (MPLS) or Generalized MPLS (GMPLS) networks can be used to form links to carry traffic in those networks or in other (client) networks.</t>
      <t>Protocol mechanisms already exist to facilitate the establishment of such LSPs and to bundle traffic engineering (TE) links to reduce the load on routing protocols. This document defines extensions to those mechanisms to support identifying the use to which such LSPs are to be put and to enable the TE link endpoints to be assigned addresses or unnumbered identifiers during the signaling process. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6107"/>
  <seriesInfo name="DOI" value="10.17487/RFC6107"/>
</reference>

<reference anchor="RFC8040">
  <front>
    <title>RESTCONF Protocol</title>
    <author fullname="A. Bierman" initials="A." surname="Bierman"/>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <date month="January" year="2017"/>
    <abstract>
      <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8040"/>
  <seriesInfo name="DOI" value="10.17487/RFC8040"/>
</reference>


<reference anchor="ITU_G.808.1" >
  <front>
    <title>Generic protection switching - Linear trail and subnetwork protection</title>
    <author >
      <organization>ITU-T Recommendation G.808.1</organization>
    </author>
    <date year="2014" month="May"/>
  </front>
  <seriesInfo name="ITU-T G.808.1" value=""/>
</reference>


<reference anchor="RFC7950">
  <front>
    <title>The YANG 1.1 Data Modeling Language</title>
    <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
    <date month="August" year="2016"/>
    <abstract>
      <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7950"/>
  <seriesInfo name="DOI" value="10.17487/RFC7950"/>
</reference>

<reference anchor="RFC3473">
  <front>
    <title>Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) Extensions</title>
    <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
    <date month="January" year="2003"/>
    <abstract>
      <t>This document describes extensions to Multi-Protocol Label Switching (MPLS) Resource ReserVation Protocol - Traffic Engineering (RSVP-TE) signaling required to support Generalized MPLS. Generalized MPLS extends the MPLS control plane to encompass time-division (e.g., Synchronous Optical Network and Synchronous Digital Hierarchy, SONET/SDH), wavelength (optical lambdas) and spatial switching (e.g., incoming port or fiber to outgoing port or fiber). This document presents a RSVP-TE specific description of the extensions. A generic functional description can be found in separate documents. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3473"/>
  <seriesInfo name="DOI" value="10.17487/RFC3473"/>
</reference>

<reference anchor="RFC8294">
  <front>
    <title>Common YANG Data Types for the Routing Area</title>
    <author fullname="X. Liu" initials="X." surname="Liu"/>
    <author fullname="Y. Qu" initials="Y." surname="Qu"/>
    <author fullname="A. Lindem" initials="A." surname="Lindem"/>
    <author fullname="C. Hopps" initials="C." surname="Hopps"/>
    <author fullname="L. Berger" initials="L." surname="Berger"/>
    <date month="December" year="2017"/>
    <abstract>
      <t>This document defines a collection of common data types using the YANG data modeling language. These derived common types are designed to be imported by other modules defined in the routing area.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8294"/>
  <seriesInfo name="DOI" value="10.17487/RFC8294"/>
</reference>


<reference anchor="I-D.draft-ietf-teas-rfc8776-update">
   <front>
      <title>Common YANG Data Types for Traffic Engineering</title>
      <author fullname="Italo Busi" initials="I." surname="Busi">
         <organization>Huawei</organization>
      </author>
      <author fullname="Aihua Guo" initials="A." surname="Guo">
         <organization>Futurewei Technologies</organization>
      </author>
      <author fullname="Xufeng Liu" initials="X." surname="Liu">
         <organization>Alef Edge</organization>
      </author>
      <author fullname="Tarek Saad" initials="T." surname="Saad">
         <organization>Cisco Systems Inc.</organization>
      </author>
      <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
         <organization>Individual</organization>
      </author>
      <date day="20" month="October" year="2025"/>
      <abstract>
	 <t>   This document defines a collection of common data types, identities,
   and groupings in YANG data modeling language.  These derived common
   data types, identities and groupings are intended to be imported by
   other modules, e.g., those which model the Traffic Engineering (TE)
   configuration and state capabilities.

   This document obsoletes RFC 8776.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-teas-rfc8776-update-19"/>
   
</reference>

<reference anchor="RFC8340">
  <front>
    <title>YANG Tree Diagrams</title>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
    <date month="March" year="2018"/>
    <abstract>
      <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="215"/>
  <seriesInfo name="RFC" value="8340"/>
  <seriesInfo name="DOI" value="10.17487/RFC8340"/>
</reference>

<reference anchor="RFC8342">
  <front>
    <title>Network Management Datastore Architecture (NMDA)</title>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
    <author fullname="P. Shafer" initials="P." surname="Shafer"/>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <author fullname="R. Wilton" initials="R." surname="Wilton"/>
    <date month="March" year="2018"/>
    <abstract>
      <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8342"/>
  <seriesInfo name="DOI" value="10.17487/RFC8342"/>
</reference>

<reference anchor="RFC9012">
  <front>
    <title>The BGP Tunnel Encapsulation Attribute</title>
    <author fullname="K. Patel" initials="K." surname="Patel"/>
    <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
    <author fullname="S. Sangli" initials="S." surname="Sangli"/>
    <author fullname="J. Scudder" initials="J." surname="Scudder"/>
    <date month="April" year="2021"/>
    <abstract>
      <t>This document defines a BGP path attribute known as the "Tunnel Encapsulation attribute", which can be used with BGP UPDATEs of various Subsequent Address Family Identifiers (SAFIs) to provide information needed to create tunnels and their corresponding encapsulation headers. It provides encodings for a number of tunnel types, along with procedures for choosing between alternate tunnels and routing packets into tunnels.</t>
      <t>This document obsoletes RFC 5512, which provided an earlier definition of the Tunnel Encapsulation attribute. RFC 5512 was never deployed in production. Since RFC 5566 relies on RFC 5512, it is likewise obsoleted. This document updates RFC 5640 by indicating that the Load-Balancing Block sub-TLV may be included in any Tunnel Encapsulation attribute where load balancing is desired.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9012"/>
  <seriesInfo name="DOI" value="10.17487/RFC9012"/>
</reference>

<reference anchor="RFC8345">
  <front>
    <title>A YANG Data Model for Network Topologies</title>
    <author fullname="A. Clemm" initials="A." surname="Clemm"/>
    <author fullname="J. Medved" initials="J." surname="Medved"/>
    <author fullname="R. Varga" initials="R." surname="Varga"/>
    <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
    <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
    <author fullname="X. Liu" initials="X." surname="Liu"/>
    <date month="March" year="2018"/>
    <abstract>
      <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8345"/>
  <seriesInfo name="DOI" value="10.17487/RFC8345"/>
</reference>

<reference anchor="RFC8795">
  <front>
    <title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
    <author fullname="X. Liu" initials="X." surname="Liu"/>
    <author fullname="I. Bryskin" initials="I." surname="Bryskin"/>
    <author fullname="V. Beeram" initials="V." surname="Beeram"/>
    <author fullname="T. Saad" initials="T." surname="Saad"/>
    <author fullname="H. Shah" initials="H." surname="Shah"/>
    <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
    <date month="August" year="2020"/>
    <abstract>
      <t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8795"/>
  <seriesInfo name="DOI" value="10.17487/RFC8795"/>
</reference>

<reference anchor="RFC4206">
  <front>
    <title>Label Switched Paths (LSP) Hierarchy with Generalized Multi-Protocol Label Switching (GMPLS) Traffic Engineering (TE)</title>
    <author fullname="K. Kompella" initials="K." surname="Kompella"/>
    <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
    <date month="October" year="2005"/>
    <abstract>
      <t>To improve scalability of Generalized Multi-Protocol Label Switching (GMPLS) it may be useful to aggregate Label Switched Paths (LSPs) by creating a hierarchy of such LSPs. A way to create such a hierarchy is by (a) a Label Switching Router (LSR) creating a Traffic Engineering Label Switched Path (TE LSP), (b) the LSR forming a forwarding adjacency (FA) out of that LSP (by advertising this LSP as a Traffic Engineering (TE) link into the same instance of ISIS/OSPF as the one that was used to create the LSP), (c) allowing other LSRs to use FAs for their path computation, and (d) nesting of LSPs originated by other LSRs into that LSP (by using the label stack construct).</t>
      <t>This document describes the mechanisms to accomplish this. [PROPOSED STANDARD]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4206"/>
  <seriesInfo name="DOI" value="10.17487/RFC4206"/>
</reference>

<reference anchor="RFC4872">
  <front>
    <title>RSVP-TE Extensions in Support of End-to-End Generalized Multi-Protocol Label Switching (GMPLS) Recovery</title>
    <author fullname="J.P. Lang" initials="J.P." role="editor" surname="Lang"/>
    <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
    <author fullname="D. Papadimitriou" initials="D." role="editor" surname="Papadimitriou"/>
    <date month="May" year="2007"/>
    <abstract>
      <t>This document describes protocol-specific procedures and extensions for Generalized Multi-Protocol Label Switching (GMPLS) Resource ReSerVation Protocol - Traffic Engineering (RSVP-TE) signaling to support end-to-end Label Switched Path (LSP) recovery that denotes protection and restoration. A generic functional description of GMPLS recovery can be found in a companion document, RFC 4426. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4872"/>
  <seriesInfo name="DOI" value="10.17487/RFC4872"/>
</reference>

<reference anchor="RFC6780">
  <front>
    <title>RSVP ASSOCIATION Object Extensions</title>
    <author fullname="L. Berger" initials="L." surname="Berger"/>
    <author fullname="F. Le Faucheur" initials="F." surname="Le Faucheur"/>
    <author fullname="A. Narayanan" initials="A." surname="Narayanan"/>
    <date month="October" year="2012"/>
    <abstract>
      <t>The RSVP ASSOCIATION object was defined in the context of GMPLS-controlled Label Switched Paths (LSPs). In this context, the object is used to associate recovery LSPs with the LSP they are protecting. This object also has broader applicability as a mechanism to associate RSVP state. This document defines how the ASSOCIATION object can be more generally applied. This document also defines Extended ASSOCIATION objects that, in particular, can be used in the context of the MPLS Transport Profile (MPLS-TP). This document updates RFC 2205, RFC 3209, and RFC 3473. It also generalizes the definition of the Association ID field defined in RFC 4872. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6780"/>
  <seriesInfo name="DOI" value="10.17487/RFC6780"/>
</reference>

<reference anchor="RFC7471">
  <front>
    <title>OSPF Traffic Engineering (TE) Metric Extensions</title>
    <author fullname="S. Giacalone" initials="S." surname="Giacalone"/>
    <author fullname="D. Ward" initials="D." surname="Ward"/>
    <author fullname="J. Drake" initials="J." surname="Drake"/>
    <author fullname="A. Atlas" initials="A." surname="Atlas"/>
    <author fullname="S. Previdi" initials="S." surname="Previdi"/>
    <date month="March" year="2015"/>
    <abstract>
      <t>In certain networks, such as, but not limited to, financial information networks (e.g., stock market data providers), network performance information (e.g., link propagation delay) is becoming critical to data path selection.</t>
      <t>This document describes common extensions to RFC 3630 "Traffic Engineering (TE) Extensions to OSPF Version 2" and RFC 5329 "Traffic Engineering Extensions to OSPF Version 3" to enable network performance information to be distributed in a scalable fashion. The information distributed using OSPF TE Metric Extensions can then be used to make path selection decisions based on network performance.</t>
      <t>Note that this document only covers the mechanisms by which network performance information is distributed. The mechanisms for measuring network performance information or using that information, once distributed, are outside the scope of this document.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7471"/>
  <seriesInfo name="DOI" value="10.17487/RFC7471"/>
</reference>

<reference anchor="RFC8570">
  <front>
    <title>IS-IS Traffic Engineering (TE) Metric Extensions</title>
    <author fullname="L. Ginsberg" initials="L." role="editor" surname="Ginsberg"/>
    <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
    <author fullname="S. Giacalone" initials="S." surname="Giacalone"/>
    <author fullname="D. Ward" initials="D." surname="Ward"/>
    <author fullname="J. Drake" initials="J." surname="Drake"/>
    <author fullname="Q. Wu" initials="Q." surname="Wu"/>
    <date month="March" year="2019"/>
    <abstract>
      <t>In certain networks, such as, but not limited to, financial information networks (e.g., stock market data providers), network-performance criteria (e.g., latency) are becoming as critical to data-path selection as other metrics.</t>
      <t>This document describes extensions to IS-IS Traffic Engineering Extensions (RFC 5305). These extensions provide a way to distribute and collect network-performance information in a scalable fashion. The information distributed using IS-IS TE Metric Extensions can then be used to make path-selection decisions based on network performance.</t>
      <t>Note that this document only covers the mechanisms with which network-performance information is distributed. The mechanisms for measuring network performance or acting on that information, once distributed, are outside the scope of this document.</t>
      <t>This document obsoletes RFC 7810.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8570"/>
  <seriesInfo name="DOI" value="10.17487/RFC8570"/>
</reference>

<reference anchor="RFC8232">
  <front>
    <title>Optimizations of Label Switched Path State Synchronization Procedures for a Stateful PCE</title>
    <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
    <author fullname="I. Minei" initials="I." surname="Minei"/>
    <author fullname="J. Medved" initials="J." surname="Medved"/>
    <author fullname="R. Varga" initials="R." surname="Varga"/>
    <author fullname="X. Zhang" initials="X." surname="Zhang"/>
    <author fullname="D. Dhody" initials="D." surname="Dhody"/>
    <date month="September" year="2017"/>
    <abstract>
      <t>A stateful Path Computation Element (PCE) has access to not only the information disseminated by the network's Interior Gateway Protocol (IGP) but also the set of active paths and their reserved resources for its computation. The additional Label Switched Path (LSP) state information allows the PCE to compute constrained paths while considering individual LSPs and their interactions. This requires a State Synchronization mechanism between the PCE and the network, the PCE and Path Computation Clients (PCCs), and cooperating PCEs. The basic mechanism for State Synchronization is part of the stateful PCE specification. This document presents motivations for optimizations to the base State Synchronization procedure and specifies the required Path Computation Element Communication Protocol (PCEP) extensions.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8232"/>
  <seriesInfo name="DOI" value="10.17487/RFC8232"/>
</reference>

<reference anchor="RFC7271">
  <front>
    <title>MPLS Transport Profile (MPLS-TP) Linear Protection to Match the Operational Expectations of Synchronous Digital Hierarchy, Optical Transport Network, and Ethernet Transport Network Operators</title>
    <author fullname="J. Ryoo" initials="J." role="editor" surname="Ryoo"/>
    <author fullname="E. Gray" initials="E." role="editor" surname="Gray"/>
    <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
    <author fullname="A. D'Alessandro" initials="A." surname="D'Alessandro"/>
    <author fullname="T. Cheung" initials="T." surname="Cheung"/>
    <author fullname="E. Osborne" initials="E." surname="Osborne"/>
    <date month="June" year="2014"/>
    <abstract>
      <t>This document describes alternate mechanisms to perform some of the functions of MPLS Transport Profile (MPLS-TP) linear protection defined in RFC 6378, and also defines additional mechanisms. The purpose of these alternate and additional mechanisms is to provide operator control and experience that more closely models the behavior of linear protection seen in other transport networks.</t>
      <t>This document also introduces capabilities and modes for linear protection. A capability is an individual behavior, and a mode is a particular combination of capabilities. Two modes are defined in this document: Protection State Coordination (PSC) mode and Automatic Protection Switching (APS) mode.</t>
      <t>This document describes the behavior of the PSC protocol including priority logic and state machine when all the capabilities associated with the APS mode are enabled.</t>
      <t>This document updates RFC 6378 in that the capability advertisement method defined here is an addition to that document.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7271"/>
  <seriesInfo name="DOI" value="10.17487/RFC7271"/>
</reference>

<reference anchor="RFC8234">
  <front>
    <title>Updates to MPLS Transport Profile (MPLS-TP) Linear Protection in Automatic Protection Switching (APS) Mode</title>
    <author fullname="J. Ryoo" initials="J." surname="Ryoo"/>
    <author fullname="T. Cheung" initials="T." surname="Cheung"/>
    <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
    <author fullname="I. Busi" initials="I." surname="Busi"/>
    <author fullname="G. Wen" initials="G." surname="Wen"/>
    <date month="August" year="2017"/>
    <abstract>
      <t>This document contains updates to MPLS Transport Profile (MPLS-TP) linear protection in Automatic Protection Switching (APS) mode defined in RFC 7271. The updates provide rules related to the initialization of the Protection State Coordination (PSC) Control Logic (in which the state machine resides) when operating in APS mode and clarify the operation related to state transition table lookup.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8234"/>
  <seriesInfo name="DOI" value="10.17487/RFC8234"/>
</reference>

<reference anchor="RFC7308">
  <front>
    <title>Extended Administrative Groups in MPLS Traffic Engineering (MPLS-TE)</title>
    <author fullname="E. Osborne" initials="E." surname="Osborne"/>
    <date month="July" year="2014"/>
    <abstract>
      <t>MPLS Traffic Engineering (MPLS-TE) advertises 32 administrative groups (commonly referred to as "colors" or "link colors") using the Administrative Group sub-TLV. This is defined for OSPFv2 (RFC 3630), OSPFv3 (RFC 5329) and IS-IS (RFC 5305).</t>
      <t>This document adds a sub-TLV to the IGP TE extensions, "Extended Administrative Group". This sub-TLV provides for additional administrative groups (link colors) beyond the current limit of 32.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7308"/>
  <seriesInfo name="DOI" value="10.17487/RFC7308"/>
</reference>

<reference anchor="RFC8343">
  <front>
    <title>A YANG Data Model for Interface Management</title>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <date month="March" year="2018"/>
    <abstract>
      <t>This document defines a YANG data model for the management of network interfaces. It is expected that interface-type-specific data models augment the generic interfaces data model defined in this document. The data model includes definitions for configuration and system state (status information and counters for the collection of statistics).</t>
      <t>The YANG data model in this document conforms to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
      <t>This document obsoletes RFC 7223.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8343"/>
  <seriesInfo name="DOI" value="10.17487/RFC8343"/>
</reference>

<reference anchor="RFC8639">
  <front>
    <title>Subscription to YANG Notifications</title>
    <author fullname="E. Voit" initials="E." surname="Voit"/>
    <author fullname="A. Clemm" initials="A." surname="Clemm"/>
    <author fullname="A. Gonzalez Prieto" initials="A." surname="Gonzalez Prieto"/>
    <author fullname="E. Nilsen-Nygaard" initials="E." surname="Nilsen-Nygaard"/>
    <author fullname="A. Tripathy" initials="A." surname="Tripathy"/>
    <date month="September" year="2019"/>
    <abstract>
      <t>This document defines a YANG data model and associated mechanisms enabling subscriber-specific subscriptions to a publisher's event streams. Applying these elements allows a subscriber to request and receive a continuous, customized feed of publisher-generated information.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8639"/>
  <seriesInfo name="DOI" value="10.17487/RFC8639"/>
</reference>

<reference anchor="RFC8641">
  <front>
    <title>Subscription to YANG Notifications for Datastore Updates</title>
    <author fullname="A. Clemm" initials="A." surname="Clemm"/>
    <author fullname="E. Voit" initials="E." surname="Voit"/>
    <date month="September" year="2019"/>
    <abstract>
      <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8641"/>
  <seriesInfo name="DOI" value="10.17487/RFC8641"/>
</reference>

<reference anchor="RFC3688">
  <front>
    <title>The IETF XML Registry</title>
    <author fullname="M. Mealling" initials="M." surname="Mealling"/>
    <date month="January" year="2004"/>
    <abstract>
      <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="81"/>
  <seriesInfo name="RFC" value="3688"/>
  <seriesInfo name="DOI" value="10.17487/RFC3688"/>
</reference>

<reference anchor="RFC6242">
  <front>
    <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
    <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
    <date month="June" year="2011"/>
    <abstract>
      <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6242"/>
  <seriesInfo name="DOI" value="10.17487/RFC6242"/>
</reference>

<reference anchor="RFC8446">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2018"/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8446"/>
  <seriesInfo name="DOI" value="10.17487/RFC8446"/>
</reference>

<reference anchor="RFC8341">
  <front>
    <title>Network Configuration Access Control Model</title>
    <author fullname="A. Bierman" initials="A." surname="Bierman"/>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <date month="March" year="2018"/>
    <abstract>
      <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
      <t>This document obsoletes RFC 6536.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="91"/>
  <seriesInfo name="RFC" value="8341"/>
  <seriesInfo name="DOI" value="10.17487/RFC8341"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC9256">
  <front>
    <title>Segment Routing Policy Architecture</title>
    <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
    <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
    <author fullname="D. Voyer" initials="D." surname="Voyer"/>
    <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
    <author fullname="P. Mattes" initials="P." surname="Mattes"/>
    <date month="July" year="2022"/>
    <abstract>
      <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
      <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9256"/>
  <seriesInfo name="DOI" value="10.17487/RFC9256"/>
</reference>

<reference anchor="RFC4874">
  <front>
    <title>Exclude Routes - Extension to Resource ReserVation Protocol-Traffic Engineering (RSVP-TE)</title>
    <author fullname="CY. Lee" initials="CY." surname="Lee"/>
    <author fullname="A. Farrel" initials="A." surname="Farrel"/>
    <author fullname="S. De Cnodder" initials="S." surname="De Cnodder"/>
    <date month="April" year="2007"/>
    <abstract>
      <t>This document specifies ways to communicate route exclusions during path setup using Resource ReserVation Protocol-Traffic Engineering (RSVP-TE).</t>
      <t>The RSVP-TE specification, "RSVP-TE: Extensions to RSVP for LSP Tunnels" (RFC 3209) and GMPLS extensions to RSVP-TE, "Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) Extensions" (RFC 3473) allow abstract nodes and resources to be explicitly included in a path setup, but not to be explicitly excluded.</t>
      <t>In some networks where precise explicit paths are not computed at the head end, it may be useful to specify and signal abstract nodes and resources that are to be explicitly excluded from routes. These exclusions may apply to the whole path, or to parts of a path between two abstract nodes specified in an explicit path. How Shared Risk Link Groups (SRLGs) can be excluded is also specified in this document. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4874"/>
  <seriesInfo name="DOI" value="10.17487/RFC4874"/>
</reference>

<reference anchor="RFC3945">
  <front>
    <title>Generalized Multi-Protocol Label Switching (GMPLS) Architecture</title>
    <author fullname="E. Mannie" initials="E." role="editor" surname="Mannie"/>
    <date month="October" year="2004"/>
    <abstract>
      <t>Future data and transmission networks will consist of elements such as routers, switches, Dense Wavelength Division Multiplexing (DWDM) systems, Add-Drop Multiplexors (ADMs), photonic cross-connects (PXCs), optical cross-connects (OXCs), etc. that will use Generalized Multi-Protocol Label Switching (GMPLS) to dynamically provision resources and to provide network survivability using protection and restoration techniques.</t>
      <t>This document describes the architecture of GMPLS. GMPLS extends MPLS to encompass time-division (e.g., SONET/SDH, PDH, G.709), wavelength (lambdas), and spatial switching (e.g., incoming port or fiber to outgoing port or fiber). The focus of GMPLS is on the control plane of these various layers since each of them can use physically diverse data or forwarding planes. The intention is to cover both the signaling and the routing part of that control plane. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3945"/>
  <seriesInfo name="DOI" value="10.17487/RFC3945"/>
</reference>

<reference anchor="rfc3473">
  <front>
    <title>Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) Extensions</title>
    <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
    <date month="January" year="2003"/>
    <abstract>
      <t>This document describes extensions to Multi-Protocol Label Switching (MPLS) Resource ReserVation Protocol - Traffic Engineering (RSVP-TE) signaling required to support Generalized MPLS. Generalized MPLS extends the MPLS control plane to encompass time-division (e.g., Synchronous Optical Network and Synchronous Digital Hierarchy, SONET/SDH), wavelength (optical lambdas) and spatial switching (e.g., incoming port or fiber to outgoing port or fiber). This document presents a RSVP-TE specific description of the extensions. A generic functional description can be found in separate documents. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3473"/>
  <seriesInfo name="DOI" value="10.17487/RFC3473"/>
</reference>

<reference anchor="RFC4427">
  <front>
    <title>Recovery (Protection and Restoration) Terminology for Generalized Multi-Protocol Label Switching (GMPLS)</title>
    <author fullname="E. Mannie" initials="E." role="editor" surname="Mannie"/>
    <author fullname="D. Papadimitriou" initials="D." role="editor" surname="Papadimitriou"/>
    <date month="March" year="2006"/>
    <abstract>
      <t>This document defines a common terminology for Generalized Multi-Protocol Label Switching (GMPLS)-based recovery mechanisms (i.e., protection and restoration). The terminology is independent of the underlying transport technologies covered by GMPLS. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4427"/>
  <seriesInfo name="DOI" value="10.17487/RFC4427"/>
</reference>




    </references>

</references>


<?line 3695?>

<section anchor="AppendixA"><name>Data Tree Examples</name>

<t>This section contains examples of use of the model with RESTCONF <xref target="RFC8040"/> and JSON encoding.</t>

<t>For the example we will use a 4-node MPLS network were RSVP-TE MPLS Tunnels can be setup. The
loopbacks of each router are shown. The network in <xref target="AppFig-Topo"/> will be used in the examples
described in the following sections.</t>

<figure title="TE network used in data tree examples" anchor="AppFig-Topo"><artwork><![CDATA[
 192.0.2.1        192.0.2.2      192.0.2.4
 +-------+        +-------+      +-------+
 |       |        |       |      |       |
 |   A   +--------+   B   +------+   D   |
 +---+---+        +-------+      +---+---+
     |                               |
     |            +-------+          |
     |            |       |          |
     +------------+   C   +----------+
                  |       |
                  +-------+
                  192.0.2.3
]]></artwork></figure>

<section anchor="TeTunnel"><name>Basic Tunnel Setup</name>

<t>This example uses the TE Tunnel YANG data model defined in this document to create an
RSVP-TE signaled Tunnel of packet LSP encoding type. First, the TE Tunnel is created with no specific restrictions or constraints (e.g., protection or restoration).
The TE Tunnel ingresses on router A and egresses on router D.</t>

<t>In this case, the TE Tunnel is created without specifying additional information about the primary paths.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/tunnels HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_2",
      "admin-state": "ietf-te-types:tunnel-admin-state-up",
      "encoding": "ietf-te-types:lsp-encoding-packet",
      "source": {
        "te-node-id": "192.0.2.1"
      },
      "destination": {
        "te-node-id": "192.0.2.4"
      },
      "bidirectional": false,
      "signaling-type": "ietf-te-types:path-setup-rsvp"
    }
  ]
}

{
  "ietf-te:tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_2 (IPv6)",
      "admin-state": "ietf-te-types:tunnel-admin-state-up",
      "encoding": "ietf-te-types:lsp-encoding-packet",
      "source": {
        "te-node-id": "2001:db8::1"
      },
      "destination": {
        "te-node-id": "2001:db8::4"
      },
      "bidirectional": false,
      "signaling-type": "ietf-te-types:path-setup-rsvp"
    }
  ]
}

]]></artwork></figure>

</section>
<section anchor="global-named-path-constraints"><name>Global Named Path Constraints</name>

<t>This example uses the YANG data model to create a 'named path constraint' that can be referenced by TE Tunnels.
The path constraint, in this case, limits the TE Tunnel hops for the computed path.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/globals/named-path-constraints
     HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:named-path-constraint": [
    {
      "name": "max-hop-3",
      "path-metric-bounds": {
        "path-metric-bound": [
          {
            "metric-type": "ietf-te-types:path-metric-hop",
            "upper-bound": "3"
          }
        ]
      }
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="tunnel-with-global-path-constraint"><name>Tunnel with Global Path Constraint</name>

<t>In this example, the previously created 'named path constraint' is applied to the TE Tunnel created in <xref target="TeTunnel"/>.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/tunnels HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_4_1",
      "description": "Simple_LSP_with_named_path",
      "admin-state": "ietf-te-types:tunnel-admin-state-up",
      "encoding": "ietf-te-types:lsp-encoding-packet",
      "source": {
        "te-node-id": "192.0.2.1"
      },
      "destination": {
        "te-node-id": "192.0.2.4"
      },
      "signaling-type": "ietf-te-types:path-setup-rsvp",
      "primary-paths": {
        "primary-path": [
          {
            "name": "Simple_LSP_1",
            "use-path-computation": true,
            "path-scope": "ietf-te-types:path-scope-end-to-end",
            "named-path-constraint": "max-hop-3"
          }
        ]
      }
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="tunnel-with-per-tunnel-path-constraint"><name>Tunnel with Per-tunnel Path Constraint</name>

<t>In this example, the a per-tunnel path constraint is explicitly indicated under the TE Tunnel created in <xref target="TeTunnel"/> to constrain the computed path for the tunnel.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/tunnels HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_4_2",
      "admin-state": "ietf-te-types:tunnel-admin-state-up",
      "encoding": "ietf-te-types:lsp-encoding-packet",
      "source": {
        "te-node-id": "192.0.2.1"
      },
      "destination": {
        "te-node-id": "192.0.2.4"
      },
      "bidirectional": false,
      "signaling-type": "ietf-te-types:path-setup-rsvp",
      "primary-paths": {
        "primary-path": [
          {
            "name": "path1",
            "path-scope": "ietf-te-types:path-scope-end-to-end",
            "path-metric-bounds": {
              "path-metric-bound": [
                {
                  "metric-type": "ietf-te-types:path-metric-hop",
                  "upper-bound": "3"
                }
              ]
            }
          }
        ]
      }
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="tunnel-state"><name>Tunnel State</name>

<t>In this example, the 'GET' query is sent to return the state stored about the tunnel.</t>

<figure><artwork><![CDATA[
GET  /restconf/data/ietf-te:te/tunnels +
     /tunnel="Example_LSP_Tunnel_A_4_1"
     /primary-paths/ HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
]]></artwork></figure>

<t>The request, with status code 200 would include, for example, the following json:</t>

<figure><artwork><![CDATA[
{
  "ietf-te:primary-path": [
    {
      "name": "path1",
      "path-computation-method": "ietf-te-types:path-locally-computed",
      "path-scope": "ietf-te-types:path-scope-end-to-end",
      "computed-paths-properties": {
        "computed-path-properties": [
          {
            "k-index": 1,
            "path-properties": {
              "path-route-objects": {
                "path-route-object": [
                  {
                    "index": 1,
                    "numbered-node-hop": {
                      "node-id": "192.0.2.2",
                      "hop-type": "strict"
                    }
                  },
                  {
                    "index": 2,
                    "numbered-node-hop": {
                      "node-id": "192.0.2.4",
                      "hop-type": "strict"
                    }
                  }
                ]
              }
            }
          }
        ]
      },
      "lsps": {
        "lsp": [
          {
            "node": "192.0.2.1",
            "lsp-id": 25356,
            "tunnel-name": "Example_LSP_Tunnel_A_4_1"
          }
        ]
      }
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="example-te-tunnel-with-primary-and-secondary-paths"><name>Example TE Tunnel with Primary and Secondary Paths</name>

<figure title="TE network used in data tree examples" anchor="AppFig-Topo2"><artwork><![CDATA[
                       +----------+          +----------+
                     +-|192.0.2.9 |---+      |192.0.2.10|
                     | +----------+   |      +----------+
                     |                |          |   |
+----------+    +----------+     +----------+    |   |
|192.0.2.8 |----|192.0.2.3 |-----|192.0.2.4 |----+   |
+----------+    +----------+     +----------+        |
  |                  |                |              |
+----------+         |                |              |
|192.0.2.1 |---------+                |           +----------+
+----------+                          +-----------|192.0.2.5 |
      |  |                                        +----------+
      |  |              +----------+                     | |
      |  +--------------|192.0.2.2 |---------------------+ |
      |                 +----------+                       |
      |                       | |                          |
  +----------+                | |                   +----------+
  |192.0.2.6 |----------------+ +-------------------|192.0.2.7 |
  +----------+                                      +----------+

]]></artwork></figure>

<t>Below is the state retrieved for a TE tunnel from source 192.0.2.1 to 192.0.2.5
with primary, secondary, reverse, and secondary reverse paths as shown in <xref target="AppFig-Topo2"/>.</t>

<figure><artwork><![CDATA[
{
  "ietf-te:te": {
    "tunnels": {
      "tunnel": [
        {
          "name": "example-1",
          "description": "Example in slide 1",
          "source": {
            "te-node-id": "192.0.2.1"
          },
          "destination": {
            "te-node-id": "192.0.2.5"
          },
          "bidirectional": true,
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-1 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": false,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "name": "primary-2 (rev)",
                  "path-scope": "ietf-te-types:path-scope-end-to-end",
                  "explicit-route-objects": {
                    "route-object-include-exclude": [
                      {
                        "index": 1,
                        "explicit-route-usage":
                        "ietf-te-types:route-include-object",
                        "numbered-node-hop": {
                          "node-id": "192.0.2.3",
                          "hop-type": "loose"
                        }
                      }
                    ]
                  },
                  "candidate-secondary-reverse-paths": {
                    "candidate-secondary-reverse-path": [
                      {
                        "secondary-reverse-path": "secondary-3 (rev)"
                      },
                      {
                        "secondary-reverse-path": "secondary-4 (rev)"
                      },
                      {
                        "secondary-reverse-path": "secondary-5 (rev)"
                      }
                    ]
                  }
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-1 (fwd)"
                    },
                    {
                      "secondary-path": "secondary-2 (fwd)"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-1 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-2 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage": 
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          },
          "secondary-reverse-paths": {
            "secondary-reverse-path": [
              {
                "name": "secondary-3 (rev)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.4",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-4 (rev)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.4"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.3",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-5 (rev)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.3"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          }
        },
        {
          "name": "example-3",
          "description": "Example in slide 3",
          "source": {
            "te-node-id": "192.0.2.1"
          },
          "destination": {
            "te-node-id": "192.0.2.5"
          },
          "bidirectional": true,
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-1 (bidir)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "path-scope": "ietf-te-types:path-scope-end-to-end"
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-1 (bidir)"
                    },
                    {
                      "secondary-path": "secondary-2 (bidir)"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-1 (bidir)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-2 (bidir)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          }
        },
        {
          "name": "example-4",
          "description": "Example in slide 4",
          "source": {
            "te-node-id": "192.0.2.1"
          },
          "destination": {
            "te-node-id": "192.0.2.5"
          },
          "bidirectional": true,
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-1 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "name": "primary-2 (rev)",
                  "path-scope": "ietf-te-types:path-scope-end-to-end",
                  "candidate-secondary-reverse-paths": {
                    "candidate-secondary-reverse-path": [
                      {
                        "secondary-reverse-path": "secondary-3 (rev)"
                      },
                      {
                        "secondary-reverse-path": "secondary-4 (rev)"
                      }
                    ]
                  }
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-1 (fwd)"
                    },
                    {
                      "secondary-path": "secondary-2 (fwd)"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-1 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-2 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          },
          "secondary-reverse-paths": {
            "secondary-reverse-path": [
              {
                "name": "secondary-3 (rev)",
                "path-scope": "ietf-te-types:path-scope-end-to-end"
              },
              {
                "name": "secondary-4 (rev)",
                "path-scope": "ietf-te-types:path-scope-end-to-end"
              }
            ]
          }
        }
      ]
    }
  }
}
]]></artwork></figure>

</section>
<section anchor="example-multi-domain-te-tunnel-with-primary-and-secondary-paths"><name>Example Multi-domain TE Tunnel with Primary and Secondary Paths</name>

<figure title="TE network used in the multi-domain TE Tunnel example" anchor="AppFig-Topo3"><artwork><![CDATA[
                            XXXXXXX
                         XXX       XXX
                       XX             XX
                     X                  X
                     X    Domain 2      X
            XXXXXXX   X                X    XXXXXXXX
         XXX    +-----------+    +-----------+      XXX
       XX       | 192.0.2.1 |    | 192.0.2.2 |         XX
      X         +-----------+    +-----------+           X
      X                 X   XXXXXX    X                  X
+-----------+           X             X             +-----------+
|192.0.2.100| Domain 1  X             X   Domain 3  |192.0.2.200|
+-----------+           X   XXXXXX    X             +-----------+
      X         +-----------+    +-----------+           X
      X         | 192.0.2.3 |    | 192.0.2.4 |          X
       XX       +-----------+    +-----------+        XX
         XXX       X  X                  XXX       XXX
            XXXXXXX  X                    X  XXXXXXX
                     X                    X
                     X    Domain 4        X
                       XX             XX
                         XXX       XXX
                            XXXXXXX

]]></artwork></figure>

<t>The following state is retrieved for a multi-domain TE tunnel, where both the
primary and secondary paths consist of TE tunnel segments, as shown in <xref target="AppFig-Topo3"/>.
In each domain, a TE tunnel segment is established to form the complete end-to-end TE path.
The nodes (192.0.2.100) and (192.0.2.200) form the multi-domain end-to-end source and destination
respectively. The nodes (192.0.2.1), (192.0.2.2), (192.0.2.3), and (192.0.2.4) act as domain
border nodes and transit nodes for the end-to-end TE tunnel LSPs.</t>

<figure><artwork><![CDATA[
{
  "ietf-te:te": {
    "tunnels": {
      "tunnel": [
        {
          "name": "Example_Head_End_Tunnel_Segment",
          "admin-state": "ietf-te-types:tunnel-admin-state-up",
          "encoding": "ietf-te-types:lsp-encoding-packet",
          "source": {
            "te-node-id": "192.0.2.100"
          },
          "bidirectional": true,
          "signaling-type": "ietf-te-types:path-setup-rsvp",
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-path-1",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.1"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "path-scope": "ietf-te-types:path-scope-end-to-end"
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-path-1"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-path-1",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.3"
                      }
                    }
                  ]
                }
              }
            ]
          }
        },
        {
          "name": "Example_Primary_Transit_Tunnel_Segment",
          "admin-state": "ietf-te-types:tunnel-admin-state-up",
          "encoding": "ietf-te-types:lsp-encoding-packet",
          "bidirectional": true,
          "signaling-type": "ietf-te-types:path-setup-rsvp",
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-path-2",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.2"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "path-scope": "ietf-te-types:path-scope-end-to-end"
                }
              }
            ]
          }
        },
        {
          "name": "Example_Secondary_Transit_Tunnel_Segment",
          "admin-state": "ietf-te-types:tunnel-admin-state-up",
          "encoding": "ietf-te-types:lsp-encoding-packet",
          "bidirectional": true,
          "signaling-type": "ietf-te-types:path-setup-rsvp",
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-path-4",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "primary-reverse-path": {
                  "path-scope": "ietf-te-types:path-scope-end-to-end"
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-path-4"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-path-4",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.3"
                      }
                    },
                    {
                      "index": 2,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.4"
                      }
                    }
                  ]
                }
              }
            ]
          }
        },
        {
          "name": "Example_Tail_End_Tunnel_Segment",
          "admin-state": "ietf-te-types:tunnel-admin-state-up",
          "encoding": "ietf-te-types:lsp-encoding-packet",
          "destination": {
            "te-node-id": "192.0.2.200"
          },
          "bidirectional": true,
          "signaling-type": "ietf-te-types:path-setup-rsvp",
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-path-3",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.2"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "path-scope": "ietf-te-types:path-scope-end-to-end"
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-path-3"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-path-3",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.4"
                      }
                    }
                  ]
                }
              }
            ]
          }
        }
      ]
    }
  }
}
]]></artwork></figure>

</section>
</section>
<section anchor="AppendixB"><name>Full Model Tree Diagram</name>

<t>The full tree diagram of the TE YANG data model defined in
module 'ietf-te' is shown below.</t>

<figure><artwork><![CDATA[
module: ietf-te
  +--rw te
     +--rw enable?    boolean
     +--rw globals
     |  +--rw named-admin-groups
     |  |  +--rw named-admin-group* [name]
     |  |          {te-types:extended-admin-groups,
     |  |           te-types:named-extended-admin-groups}?
     |  |     +--rw name            string
     |  |     +--rw bit-position?   uint32
     |  +--rw named-srlgs
     |  |  +--rw named-srlg* [name] {te-types:named-srlg-groups}?
     |  |     +--rw name     string
     |  |     +--rw value?   te-types:srlg
     |  |     +--rw cost?    uint32
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
     |             {te-types:named-path-constraints}?
     |        +--rw name                       string
     |        +---u path-constraints-common
     +--rw tunnels
     |  +--rw tunnel* [name]
     |     +--rw name                                    string
     |     +--rw alias?                                  string
     |     +--rw identifier?                             uint32
     |     +--rw color?                                  uint32
     |     +--rw description?                            string
     |     +--rw admin-state?                            identityref
     |     +--ro operational-state?                      identityref
     |     +--rw state-change-timestamp?
     |     |       yang:date-and-time
     |     +---u te-types:encoding-and-switching-type
     |     +---u tunnel-common-attributes
     |     +--rw controller
     |     |  +--rw protocol-origin?        identityref
     |     |  +--rw controller-entity-id?   string
     |     +--rw reoptimize-timer?                       uint16
     |     +---u tunnel-associations-properties
     |     +---u protection-restoration-properties
     |     +---u te-types:tunnel-constraints
     |     +---u tunnel-hierarchy-properties
     |     +--rw primary-paths
     |     |  +--rw primary-path* [name]
     |     |     +--ro active?                      boolean
     |     |     +---u path-common-properties
     |     |     +---u path-forward-properties
     |     |     +---u k-requested-paths
     |     |     +---u path-compute-info
     |     |     +---u path-state
     |     |     +--rw primary-reverse-path
     |     |     |  +---u path-common-properties
     |     |     |  +---u path-compute-info
     |     |     |  +---u path-state
     |     |     |  +--rw candidate-secondary-reverse-paths
     |     |     |     +--rw candidate-secondary-reverse-path*
     |     |     |             [secondary-reverse-path]
     |     |     |        +--rw secondary-reverse-path    leafref
     |     |     |        +--ro active?                   boolean
     |     |     +--rw candidate-secondary-paths
     |     |        +--rw candidate-secondary-path* [secondary-path]
     |     |           +--rw secondary-path    leafref
     |     |           +--ro active?           boolean
     |     +--rw secondary-paths
     |     |  +--rw secondary-path* [name]
     |     |     +---u path-common-properties
     |     |     +--rw preference?                          uint8
     |     |     +--rw secondary-reverse-path?              leafref
     |     |     +---u path-compute-info
     |     |     +---u protection-restoration-properties
     |     |     +---u path-state
     |     +--rw secondary-reverse-paths
     |     |  +--rw secondary-reverse-path* [name]
     |     |     +---u path-common-properties
     |     |     +--rw preference?                          uint8
     |     |     +---u path-compute-info
     |     |     +---u protection-restoration-properties
     |     |     +---u path-state
     |     +---x tunnel-action
     |     |  +---w input
     |     |  |  +---w action-type?   identityref
     |     |  +--ro output
     |     |     +--ro action-result?   identityref
     |     +---x protection-external-commands
     |        +---w input
     |           +---w protection-external-command?   identityref
     |           +---w ingress-node?                  boolean
     |           +---w egress-node?                   boolean
     |           +---w path-name?                     string
     |           +---w path-type?
     |           |       te-types:path-type
     |           +---w traffic-type?                  enumeration
     |           +---w extra-traffic-tunnel-ref?      tunnel-ref
     +--ro lsps
        +--ro lsp* [tunnel-name lsp-id node]
           +--ro tunnel-name                     string
           +--ro lsp-id                          uint16
           +--ro node                            te-types:te-node-id
           +--ro source?                         te-types:te-node-id
           +--ro destination?                    te-types:te-node-id
           +--ro tunnel-id?                      uint16
           +--ro extended-tunnel-id?             yang:dotted-quad
           +--ro operational-state?              identityref
           +--ro signaling-type?                 identityref
           +--ro origin-type?                    enumeration
           +--ro lsp-resource-status?            enumeration
           +--ro lockout-of-normal?              boolean
           +--ro freeze?                         boolean
           +--ro lsp-protection-role?            enumeration
           +--ro lsp-protection-state?           identityref
           +--ro ingress-node-id?                te-types:te-node-id
           +--ro egress-node-id?                 te-types:te-node-id
           +--ro lsp-actual-route-information
              +--ro lsp-actual-route-information* [index]
                 +---u te-types:record-route-state

  rpcs:
    +---x tunnels-path-compute
    |  +---w input
    |  |  +---w path-compute-info
    |  +--ro output
    |     +--ro path-compute-result
    +---x tunnels-actions
       +---w input
       |  +---w tunnel-info
       |  |  +---w (filter-type)
       |  |     +--:(all-tunnels)
       |  |     |  +---w all       empty
       |  |     +--:(one-tunnel)
       |  |        +---w tunnel?   tunnel-ref
       |  +---w action-info
       |     +---w action?       identityref
       |     +---w disruptive?   empty
       +--ro output
          +--ro action-result?   identityref

  grouping path-common-properties:
    +-- name?                      string
    +-- path-computation-method?   identityref
    +-- path-computation-server
    |  +---u te-types:te-generic-node-id
    +-- compute-only?              empty
    +-- use-path-computation?      boolean
    +-- lockdown?                  empty
    +--ro path-scope?                identityref
  grouping path-compute-info:
    +---u tunnel-associations-properties
    +---u te-types:generic-path-optimization
    +-- named-path-constraint?                leafref
    |       {te-types:named-path-constraints}?
    +---u path-constraints-common
  grouping path-forward-properties:
    +-- preference?   uint8
    +-- co-routed?    boolean
  grouping k-requested-paths:
    +-- k-requested-paths?   uint8
  grouping path-state:
    +---u path-computation-response
    +--ro lsp-provisioning-error-infos
    |  +--ro lsp-provisioning-error-info* []
    |     +--ro error-reason?        identityref
    |     +--ro error-description?   string
    |     +--ro error-timestamp?     yang:date-and-time
    |     +--ro error-node-id?       te-types:te-node-id
    |     +--ro error-link-id?       te-types:te-tp-id
    |     +--ro lsp-id?              uint16
    +--ro lsps
       +--ro lsp* [node lsp-id]
          +--ro tunnel-name?              -> /te/lsps/lsp/tunnel-name
          +--ro node?                     leafref
          +--ro lsp-id?                   leafref
          +--ro state-change-timestamp?   yang:date-and-time
  grouping path-computation-response:
    +--ro computed-paths-properties
    |  +--ro computed-path-properties* [k-index]
    |     +--ro k-index?                            uint8
    |     +---u te-types:generic-path-properties
    +--ro computed-path-error-infos
       +--ro computed-path-error-info* []
          +--ro error-description?   string
          +--ro error-timestamp?     yang:date-and-time
          +--ro error-reason?        identityref
  grouping protection-restoration-properties:
    +-- protection
    |  +-- protection-type?                identityref
    |  +-- protection-reversion-disable?   boolean
    |  +-- hold-off-time?                  uint32
    |  +-- wait-to-revert?                 uint16
    |  +-- aps-signal-id?                  uint8
    +-- restoration
       +-- restoration-type?                identityref
       +-- restoration-scheme?              identityref
       +-- restoration-reversion-disable?   boolean
       +-- hold-off-time?                   uint32
       +-- wait-to-restore?                 uint16
       +-- wait-to-revert?                  uint16
  grouping tunnel-associations-properties:
    +-- association-objects
       +-- association-object* [association-key]
       |  +-- association-key?   string
       |  +-- type?              identityref
       |  +-- id?                uint16
       |  +-- source
       |     +---u te-types:te-generic-node-id
       +-- association-object-extended* [association-key]
          +-- association-key?   string
          +-- type?              identityref
          +-- id?                uint16
          +-- source
          |  +---u te-types:te-generic-node-id
          +-- global-source?     uint32
          +-- extended-id?       yang:hex-string
  grouping tunnel-end-point:
    +-- node-id?        nw:node-id
    +-- te-node-id?     te-types:te-node-id
    +-- tunnel-tp-id?   binary
  grouping tunnel-common-attributes:
    +-- source
    |  +---u tunnel-end-point
    +-- destination
    |  +---u tunnel-end-point
    +-- bidirectional?   boolean
  grouping tunnel-hierarchy-properties:
    +-- hierarchy
       +-- dependency-tunnels
       |  +-- dependency-tunnel* [name]
       |     +-- name?                                   tunnel-ref
       |     +---u te-types:encoding-and-switching-type
       +-- hierarchical-link
          +-- enable?                            boolean
          +-- local-node-id?                     nw:node-id
          +-- local-te-node-id?                  te-types:te-node-id
          +-- local-link-tp-id?                  nt:tp-id
          +-- local-te-link-tp-id?               te-types:te-tp-id
          +-- remote-node-id?                    nw:node-id
          +-- remote-link-tp-id?                 nt:tp-id
          +-- remote-te-link-tp-id?              te-types:te-tp-id
          +-- remote-te-node-id?                 te-types:te-node-id
          +--ro link-id?                           nt:link-id
          +-- network-id?                        nw:network-id
          +---u te-types:te-topology-identifier
  grouping path-constraints-common:
    +---u te-types:common-path-constraints-attributes
    +---u te-types:generic-path-disjointness
    +---u te-types:path-constraints-route-objects
    +-- path-in-segment!
    |  +---u te-types:label-set-info
    +-- path-out-segment!
       +---u te-types:label-set-info
]]></artwork></figure>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

