Routing Area Working Group
Internet Engineering Task Force (IETF)                 S. Litkowski, Ed.
Internet-Draft
Request for Comments: 7916                                   B. Decraene
Intended status:
Category: Standards Track                                         Orange
Expires: December 27, 2015
ISSN: 2070-1721                                              C. Filsfils
                                                                 K. Raza
                                                           Cisco Systems
                                                            M. Horneffer
                                                        Deutsche Telekom
                                                               P. Sarkar
                                                        Juniper Networks
                                                  Individual Contributor
                                                               June 25, 2015 2016

             Operational management Management of Loop Free Loop-Free Alternates
                 draft-ietf-rtgwg-lfa-manageability-11

Abstract

   Loop Free

   Loop-Free Alternates (LFA), (LFAs), as defined in RFC 5286 is 5286, constitute an IP
   Fast
   ReRoute Reroute (IP FRR) mechanism enabling traffic protection for IP
   traffic
   (and (and, by extension, MPLS LDP traffic by extension). traffic).  Following first early
   deployment experiences, this document provides operational feedback
   on LFA, LFAs, highlights some limitations, and proposes a set of
   refinements to address those limitations.  It also proposes required
   management specifications.

   This proposal is also applicable to remote LFA solution.

Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119]. remote-LFA solutions.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents an Internet Standards Track document.

   This document is a product of the Internet Engineering Task Force
   (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list  It represents the consensus of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid the IETF community.  It has
   received public review and has been approved for a maximum publication by the
   Internet Engineering Steering Group (IESG).  Further information on
   Internet Standards is available in Section 2 of RFC 5741.

   Information about the current status of six months this document, any errata,
   and how to provide feedback on it may be updated, replaced, or obsoleted by other documents obtained at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."
   This Internet-Draft will expire on December 27, 2015.
   http://www.rfc-editor.org/info/rfc7916.

Copyright Notice

   Copyright (c) 2015 2016 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
     1.1.  Requirements Language . . . . . . . . . . . . . . . . . .   3
   2.  Definitions . . . . . . . . . . . . . . . . . . . . . . . . .   3
   3.  Operational issues Issues with default Default LFA tie breakers Tiebreakers . . . . . . .   4
     3.1.  Case 1: PE router protecting failures Router Protecting against Failures within core network Core
           Network . . . . . . . . . . . . . . . . . . . . . . . . .   4
     3.2.  Case 2: PE router choosen Router Chosen to protect core failures Protect against Core Failures
           while P router Router LFA exists . . . Exists . . . . . . . . . . . . . . . .   5
     3.3.  Case 3: suboptimal Suboptimal P router alternate choice Router Alternate Choice  . . . . . .   6
     3.4.  Case 4: No-transit No-Transit LFA computing node Computing Node . . . . . . . . . .   7
   4.  Need for coverage monitoring Coverage Monitoring  . . . . . . . . . . . . . . . .   8
   5.  Need for LFA activation granularity Activation Granularity . . . . . . . . . . . . .   9
   6.  Configuration requirements Requirements  . . . . . . . . . . . . . . . . .   9
     6.1.  LFA enabling/disabling scope Enabling/Disabling Scope  . . . . . . . . . . . . . .  10
     6.2.  Policy based  Policy-Based LFA selection Selection  . . . . . . . . . . . . . . .  10
       6.2.1.  Connected vs remote alternates  . . versus Remote Alternates  . . . . . . . . .  11
       6.2.2.  Mandatory criteria Criteria  . . . . . . . . . . . . . . . . .  12
       6.2.3.  Additional criteria Criteria . . . . . . . . . . . . . . . . .  12
       6.2.4.  Evaluation of Criteria evaluation . .  . . . . . . . . . . . . . . .  12
       6.2.5.  Retrieving alternate path attributes Alternate Path Attributes  . . . . . . . .  16
       6.2.6.  ECMP LFAs . . . . . . . . . . . . . . . . . . . . . .  22  21
   7.  Operational aspects Aspects . . . . . . . . . . . . . . . . . . . . .  23  22
     7.1.  No-transit condition  No-Transit Condition on LFA computing node Computing Node  . . . . . . .  23  22
     7.2.  Manual triggering Triggering of FRR  . . . . . . . . . . . . . . . .  24  23
     7.3.  Required local information Local Information  . . . . . . . . . . . . . . .  25  24
     7.4.  Coverage monitoring Monitoring . . . . . . . . . . . . . . . . . . .  25  24
     7.5.  LFA  LFAs and network planning Network Planning . . . . . . . . . . . . . . . .  26  25
   8.  Security Considerations . . . . . . . . . . . . . . . . . . .  26  25
   9.  IANA Considerations . .  References  . . . . . . . . . . . . . . . . . . .  27
   10. Contributors . . . . . .  26
     9.1.  Normative References  . . . . . . . . . . . . . . . . . .  27
   11.  26
     9.2.  Informative References  . . . . . . . . . . . . . . . . . . . . . . . . .  27
     11.1.  Normative References . . . . . . . . .
   Contributors  . . . . . . . . .  27
     11.2.  Informative References . . . . . . . . . . . . . . . . .  28
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  29  28

1.  Introduction

   Following the first deployments of Loop Free Loop-Free Alternates (LFA), (LFAs), this
   document provides feedback to the community about the management of
   LFA.
   LFAs.

   o  Section 3 provides real uses use cases illustrating some limitations
      and suboptimal behavior.

   o  Section 4 provides requirements for LFA simulations.

   o  Section 5 proposes requirements for activation granularity and
      policy based
      policy-based selection of the alternate.

   o  Section 6 express expresses requirements for the operational management of
      LFA and especially
      LFAs and, in particular, a policy framework to manage alternates.

   o  Section 7 details some operational considerations of LFA like IS-
      IS LFAs, such as
      IS-IS overload bit management or and troubleshooting informations. information.

1.1.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

2.  Definitions

   o  Per-prefix LFA : LFA computation, and computation: Evaluation for the best alternate evaluation is
      done for each destination prefix, as opposed to "Per-next hop" the "per-next-hop"
      simplification also technique proposed in [RFC5286] Section 3.8. 3.8 of [RFC5286].

   o  PE router : router: Provider Edge router.  These routers are connecting connect customers
      to each other.

   o  P router : router: Provider router.  These routers are core routers, routers without
      customer connections.  They provide transit between PE
      routers routers,
      and they form the core network.

   o  Core network : network: subset of the network composed by of P routers and
      links between them.

   o  Core link : link: network link part of the core network i.e. network, i.e., a link
      between P router
      to P router link. routers.

   o  Link-protecting LFA : LFA: alternate providing protection against link
      failure.

   o  Node-protecting LFA : LFA: alternate providing protection against node
      failure.

   o  Connected alternate : alternate: alternate adjacent (at the IGP level) to the
      point
      Point of local repair (i.e. Local Repair (PLR) (i.e., an IGP neighbor).

   o  Remote alternate: alternate : alternate which is that does not share an IGP adjacency
      with the point of local repair. PLR.

3.  Operational issues Issues with default Default LFA tie breakers Tiebreakers

   [RFC5286] introduces the notion of tie breakers tiebreakers when selecting the LFA
   among multiple candidate alternate next-hops. next hops.  When multiple LFA LFAs
   exist, RFC 5286 [RFC5286] has favored the selection of the LFA providing that provides
   the best coverage of against the failure cases.  While this is indeed a
   goal,
   this it is one among multiple goals, and in some deployment deployments this lead
   leads to the selection of a suboptimal LFA.  The following sections details
   detail real use cases of related to such limitations.

   Note that the use case of for LFA computation per destination
   (per-prefix LFA) is assumed throughout this analysis.  We also assume
   in the network figures that all IP prefixes are advertised with
   zero cost.

3.1.  Case 1: PE router protecting failures Router Protecting against Failures within core network Core Network

         P1 --------- P2 ---------- P3 --------- P4
         |      1           100           1       |
         |                                        |
         | 100                                    | 100
         |                                        |
         |      1           100           1       |  1     5k
         P5 --------- P6 ---------- P7 --------- P8 --- P9 -- PE1
         | |         | |            |             |
       5k| |5k     5k| |5k          | 5k          | 5k
         | |         | |            |             |
         | +-- PE4 --+ |            +---- PE2 ----+
         |             |                   |
         +---- PE5 ----+                   | 5k
                                           |
                                          PE3

                                                   Figure 1

         Px routers are P routers using n*10G n * 10 Gbps links.
         PEs are connected using links with lower bandwidth.

                                 Figure 1
   In figure Figure 1, let us consider the traffic flowing from PE1 to PE4.
   The nominal path is P9-P8-P7-P6-PE4.  Let us now consider the failure
   of link P7-P8.  As the P4 primary path to PE4 is P8-P7-P6-PE4, P4 is
   not an LFA for P8 (because P4 will loop back traffic back to P8) P8), and the
   only available LFA is PE2.

   When the core link P8-P7 fails, P8 switches all traffic destined to
   PE4/PE5 towards the node PE2.  Hence  Hence, a PE node and PE links are used
   to protect against the failure of a core link.  Typically, PE links
   have less capacity than core links links, and congestion may occur on PE2
   links.  Note that although PE2 was is not directly affected by the
   failure, its links become congested congested, and its traffic will suffer from
   the congestion.

   In summary, in the case of P8-P7 link failure, the impact on customer
   traffic is:

   o  From PE2 PE2's point of view : view:

      *  without LFA: no impact impact.

      *  with LFA: traffic is partially dropped (but possibly
         prioritized by a QoS mechanism).  It must be highlighted that
         in such a situation, traffic not affected by the failure may be
         affected by the congestion.

   o  From P8 P8's point of view:

      *  without LFA: traffic is totally dropped until convergence
         occurs.

      *  with LFA: traffic is partially dropped (but possibly
         prioritized by a QoS mechanism).

   Besides the congestion aspects of using an Edge a PE router as an alternate
   to protect against a core failure, a service provider may consider
   this as to be a bad routing design and would like want to prevent it.

3.2.  Case 2: PE router choosen Router Chosen to protect core failures Protect against Core Failures while
      P router Router LFA exists Exists
          P1 --------- P2 ------------ P3 -------- ------- P4
          |      1           100       |     1    |
          |                            |          |
          | 100                        | 30       | 30
          |                            |          |
          |     1         50       50  |    10    |   1    5k
          P5 --------- P6 --- P10 ---- P7 -------- ------- P8 --- P9 -- PE1
          | |         | |        \                |
        5k| |5k     5k| |5k       \ 5k            | 5k
          | |         | |          \              |
          | +-- PE4 --+ |           +---- PE2 ----+
          |             |                  |
          +---- PE5 ----+                  | 5k
                                           |
                                          PE3

                             Figure 2

             Px routers are P routers meshed with n*10G n * 10 Gbps links.
             PEs are meshed using links with lower bandwidth.

                                 Figure 2

   In the figure Figure 2, let us consider the traffic coming from PE1 to PE4.
   Nominal  The
   nominal path is P9-P8-P7-P10-P6-PE4.  Let us now consider the failure
   of the link P7-P8.  For P8, P4 is a link-protecting LFA and PE2 is a
   node-protecting LFA.  PE2 is chosen as the best LFA LFA, due to its the
   better type of protection type. that it provides.  Just like as in case 1, this
   may lead to congestion on PE2 links upon LFA activation.

3.3.  Case 3: suboptimal Suboptimal P router alternate choice Router Alternate Choice
                             +--- PE3 --+ ---+
                            /             \
                      1000 /               \ 1000
                          /                 \
                  +----- P1 ---------------- P2 ----+
                  |      |        500        |      |
                  | 10   |                   |      | 10
                  |      |                   |      |
                  R5     | 10                | 10   R7
                  |      |                   |      |
                  | 10   |                   |      | 10
                  |      |        500        |      |
                  +---- P3 ---------------- ----------------- P4 -----+ ----+
                          \                 /
                      1000 \               / 1000
                            \             /
                             +--- PE1 ---+

               Figure 3

                   Px routers are P routers.
                   P1-P2 and P3-P4 links are 1G 1 Gbps links.
                   All
   others inter Px other inter-Px links are 10G 10 Gbps links.

                                 Figure 3

   In the figure above, Figure 3, let us consider the failure of link P1-P3.  For
   destination PE3, P3 has two possible alternates:

   o  P4, which is node-protecting

   o  R5, which is link-protecting

   P4 is chosen as the best LFA LFA, due to its the better type of protection type.
   that it provides.  However, for bandwidth capacity reasons, it
   may not be desirable to use P4 for bandwidth capacity reason. P4.  A service provider may prefer to use high bandwidth
   high-bandwidth links as prefered the preferred LFA.  In this example, prefering
   preferring the shortest path over protection the type of protection may achieve
   the expected behavior, but in cases where metric are metrics do not
   reflecting reflect the
   bandwidth, it this technique would not work and some other criteria
   would need to be involved when selecting the best LFA.

3.4.  Case 4: No-transit No-Transit LFA computing node Computing Node
                               P1       P2
                               |   \  /   |
                            50 | 50 \/ 50 | 50
                               |    /\    |
                               PE1-+  +-- PE2
                                \        /
                              45 \      / 45
                                  -PE3-
                         (No-transit condition set)

                                 Figure 4

   The IS-IS and OSPF protocols define some way to prevent a router to be from
   being used as for transit.

   The IS-IS overload bit is defined in [ISO10589] [ISO10589], and the OSPF R-bit
   is defined in [RFC5340].  Also, the OSPF Stub Router stub router is also defined in
   [RFC6987] as a method to prevent transit on a node by advertising
   MaxLinkMetric on all non stub non-stub links.

   In the figure above, Figure 4, PE3 has its no-transit condition set (permanently, for
   design reason) reasons) and wants to protect traffic using an LFA for
   destination PE2.

   On PE3, the loop-free condition is not satisfied : satisfied: 100 !< 45 + 45.
   PE1 is thus not considered as an LFA.  However  However, thanks to the no-
   transit
   no-transit condition on PE3, we know that PE1 will not loop the
   traffic back to PE3.  So  So, PE1 is an LFA to reach PE2.

   In the case of a no-transit condition set on a node, LFA behavior
   must be clarified.

4.  Need for coverage monitoring Coverage Monitoring

   As per [RFC6571], LFA coverage highly depends strongly on the used network
   topology.
   topology that is in use.  Even if remote LFA ([RFC7490]) extends the remote-LFA mechanism [RFC7490]
   significantly extends the coverage of the basic LFA specification,
   there is are still some cases where protection would not be available.
   As network topologies are constantly evolving (network extension, capacity addings,
   additional capacity, latency
   optimization optimization, etc.), the protection
   coverage may change.  Fast reroute Reroute (FRR) functionality may be
   critical for some services supported by the
   network, network; a service
   provider must constantly always know what type of protection coverage is
   currently available on the network.  Moreover, predicting
   the protection
   coverage in case the event of network topology change changes is mandatory.

   Today

   Today, network simulation tool tools associated with whatif "what if" scenarios
   functionality
   are often used by service providers for the overall network design
   (capacity, path optimization optimization, etc.).  Section 7.5,
   Section 7.4  Sections 7.3, 7.4, and Section 7.3 7.5 of
   this document propose to add the addition of LFA
   informations information into such tool tools
   and within routers, so that a service provider may be able : to:

   o  to  evaluate protection coverage after a topology change.

   o  to  adjust the topology change to cover the primary need (e.g. (e.g.,
      latency optimization or optimization, bandwidth increase) as well as LFA
      protection.

   o  to monitor  constantly monitor the LFA coverage in the live network and
      being alerted.
      receive alerts.

   Documentation of LFA selection algorithms by implementers (default
   and tuning options) is important in order to leave possibility make it possible for
   3rd party
   third-party modules to model these policy-LFA expressions. policy-based LFA selection
   algorithms.

5.  Need for LFA activation granularity Activation Granularity

   As in all FRR mechanism, mechanisms, an LFA installs backup paths in the
   Forwarding Information Base (FIB).  Depending on the hardware used by
   a service provider, FIB resource resources may be critical.  Activating LFA, LFAs
   by default, default on all available components (IGP topologies, interface, interfaces,
   address
   families families, etc.) may lead to a waste of FIB resource resources, as
   generally in a
   network only a few destinations in a network should be protected (e.g.
   (e.g., loopback addresses supporting MPLS services) compared to the
   number of destinations in the RIB.

   Moreover Routing Information Base (RIB).

   Moreover, a service provider may implement multiple different FRR
   mechanism
   mechanisms in its networks for different usages (MRT, applications (e.g.,
   Maximally Redundant Trees (MRTs), TE FRR).  In this scenario, an
   implementation MAY allow to compute the computation of alternates for a specific
   destination even if the destination is already protected by another
   mechanism.  This will bring provide redundancy and let the ability
   for permit the operator to
   select the best option for FRR FRR, using a policy language.

   Section 6 of this document propose provides some implementation guidelines.

6.  Configuration requirements Requirements

   Controlling the selection of the best alternate and the granularity
   of LFA activation granularity is a requirement for Service Providers. service providers.  This
   section defines configuration requirements for LFA. LFAs.

6.1.  LFA enabling/disabling scope Enabling/Disabling Scope

   The granularity of LFA activation SHOULD be controlled (as alternate
   next hop hops consume memory in the forwarding plane).

   An implementation of an LFA SHOULD allow its activation activation, with the
   following granularities:

   o  Per routing context: VRF, Virtual Routing and Forwarding (VRF),
      virtual/logical router, global routing table, etc.

   o  Per interface interface.

   o  Per protocol instance, topology, area area.

   o  Per prefixes: prefix prefix: Prefix protection SHOULD have a higher priority
      compared to interface protection.  This means that if a specific
      prefix must be protected due to a configuration request, an LFA
      MUST be computed and installed for this that prefix even if the primary
      outgoing interface is not configured for protection.

   An implementation of an LFA MAY allow its activation activation, with the
   following criteria:

   o  Per address-family: ipv4 address family: IPv4 unicast, ipv6 unicast IPv6 unicast.

   o  Per MPLS control plane: for For MPLS control planes that inherit
      routing decision decisions from the IGP routing protocol, the MPLS dataplane
      data plane may be protected by an LFA.  The implementation may
      allow an operator to control this inheritance of protection from
      the IP prefix to the MPLS label bound to this prefix.  The protection
      inheritance of protection will concern : IP to MPLS, MPLS to MPLS, IP-to-MPLS, MPLS-to-MPLS,
      and MPLS to IP MPLS-to-IP entries.  As an example, LDP and segment-routing Segment Routing
      extensions [SEG-RTG-ARCH] for ISIS IS-IS and OSPF are
      control plane control-plane
      eligible to for this inheritance of protection.

6.2.  Policy based  Policy-Based LFA selection Selection

   When multiple alternates exist, the LFA selection algorithm is based
   on
   tie breakers. tiebreakers.  Current tie breakers tiebreakers do not provide sufficient
   control
   on regarding how the best alternate is chosen.  This document
   proposes an enhanced tie breaker tiebreaker allowing service providers to manage
   all specific cases:

   1.  An implementation of LFA implementation SHOULD support policy-based decision decisions for
       determining the best LFA.

   2.  Policy based decision  Policy-based decisions SHOULD be based on multiple criterions, criteria, with
       each criteria criterion having a level of preference.

   3.  If the defined policy does not allow the determination of a
       unique best LFA, an implementation SHOULD pick only one based on
       its own decision.  An  For load-balancing purposes, an implementation
       SHOULD also support the election of multiple LFAs, for loadbalancing purposes. LFAs.

   4.  Policy  The policy SHOULD be applicable to a protected interface or to a
       specific set of destinations.  In the case of application on applicability to
       the protected interface, all destinations primarily routed on this
       that interface SHOULD use the interface policy. policy for that interface.

   5.  It is an implementation  The choice to reevaluate policy dynamically of whether or not to dynamically re-evaluate policy
       (in case the event of a policy change). change) is left to the implementation.
       If a dynamic approach is chosen, the implementation SHOULD
       recompute the best LFAs and reinstall them in FIB, the FIB without
       service disruption.  If a non-
       dynamic non-dynamic approach is chosen, the
       policy would be taken into account upon the next IGP event.  In
       this case, the implementation SHOULD support a command to
       manually force the recomputation/reinstallation of LFAs.

6.2.1.  Connected vs remote alternates versus Remote Alternates

   In addition to connected LFAs, tunnels (e.g. (e.g., IP, LDP, RSVP-TE or RSVP-TE,
   Segment Routing) to distant routers may be used to complement LFA
   coverage (tunnel tail used as virtual neighbor).  When a router has
   multiple alternate candidates for a specific destination, it may have
   connected alternates and remote alternates (reachable via a tunnel).
   Connected alternates may not always provide an optimal routing path path,
   and it may be preferable to select a remote alternate over a
   connected alternate.  Some usage uses of tunnels to extend LFA ([RFC5286]) [RFC5286]
   coverage is are described in either [RFC7490] or
   [I-D.francois-segment-routing-ti-lfa].  These documents and [TI-LFA].  [RFC7490] and
   [TI-LFA] present some use cases of for LDP tunnels ([RFC7490]) or and Segment Routing tunnels
   ([I-D.francois-segment-routing-ti-lfa]).
   tunnels, respectively.  This document considers any type of tunneling
   techniques to reach remote alternates (IP, GRE, Generic Routing
   Encapsulation (GRE), LDP, RSVP-TE, L2TP, the Layer 2 Tunneling Protocol
   (L2TP), Segment Routing Routing, etc.) and does not restrict the remote
   alternates to the usage uses presented in the referenced document. these other documents.

   In figure Figure 1, there is no P router alternate for P8 to reach PE4 or
   PE5 ,
   PE5, so P8 is using PE2 as alternate, which an alternate; this may generate congestion
   when FRR is activated.  Instead, we could have a remote alternate for
   P8 to protect traffic to PE4 and PE5.  For example, a tunnel from P8
   to P3 (following the shortest path) can be setup set up, and P8 would be
   able to use P3 as a remote alternate to protect traffic to PE4 and
   PE5.  In this scenario, traffic will not use a PE link during FRR
   activation.

   When selecting the best alternate, the selection algorithm MUST
   consider all available alternates (connected or tunnel).  For example
   example, with Remote LFA, remote LFAs, computation of PQ set ([RFC7490]) sets [RFC7490] SHOULD be
   performed before the selection of the best alternate selection. alternate.

6.2.2.  Mandatory criteria Criteria

   An implementation of LFA implementation MUST support the following criteria:

   o  Non candidate  Non-candidate link: A link marked as "non candidate" "non-candidate" will never be
      used as an LFA.

   o  A primary next hop being protected by another primary next hop of
      the same prefix (ECMP case).

   o  Type of protection provided by the alternate: link protection, protection or
      node protection.  In the case of preference for node protection preference, protection,
      an implementation SHOULD support fall back fallback to link protection if
      node protection is not available.

   o  Shortest path: lowest IGP metric used to reach the destination.

   o  SRLG  Shared Risk Link Groups (SRLGs) (as defined in [RFC5286] Section 3, 3 of
      [RFC5286]; see also Section 6.2.4.1 for more details).

6.2.3.  Additional criteria Criteria

   An implementation of LFA implementation SHOULD support the following criteria:

   o  Downstreamness of an alternate : preference of  A downstream alternate: Preference for a downstream path over a non downstream
      non-downstream path SHOULD be configurable.

   o  Link coloring with : include, exclude "include", "exclude", and preference based system preference-based
      systems (see Section 6.2.4.2).

   o  Link Bandwidth bandwidth (see Section 6.2.4.3).

   o  Alternate preference/Node preference / node coloring (see Section 6.2.4.4).

6.2.4.  Evaluation of Criteria evaluation

6.2.4.1.  SRLG

   [RFC5286]  SRLGs

   Section 3. 3 of [RFC5286] proposes to the reuse of GMPLS IGP extensions to
   encode
   Shared Risk Link Groups ([RFC4205] and [RFC4203]).  The section is SRLGs [RFC5307] [RFC4203].  Section 3 of [RFC5286] also describing
   describes the algorithm to compute SRLG protection.

   When SRLG protection is computed, an implementation SHOULD allow the
   following :
   following:

   o  Exclusion of alternates violating SRLG. in violation of SRLGs.

   o  Maintenance of a preference system between alternates based on
      SRLG violations.  How the preference system is implemented is out
      of scope of for this document document, but here are few examples : two examples:

      *  Preference based on the number of violations.  In this case : the case,
         more violations = the less preferred.

      *  Preference based on violation cost.  In this case, each SRLG
         violation has an associated cost.  The lower violation cost sum
         is costs
         are preferred.

   When applying SRLG criteria, the SRLG violation check SHOULD be
   performed on source sources to alternate alternates as well as alternate alternates to
   destination
   paths paths, based on the SRLG set of the primary path.  In the
   case of remote LFA, PQ to destination LFAs, PQ-to-destination path attributes would be
   retrieved from
   SPT the Shortest Path Tree (SPT) rooted at the PQ.

6.2.4.2.  Link coloring Coloring

   Link coloring is a powerful system to control the choice of
   alternates.  Link colors are markers that will allow to encode the encoding of
   properties of a particular link.  Protecting interfaces are tagged
   with colors.  Protected interfaces are configured to include some
   colors with a preference level, level and exclude others.

   Link color information SHOULD be signalled signaled in the IGP IGP, and admin-
   groups
   administrative-group IGP extensions ([RFC5305] and [RFC3630]) [RFC5305] [RFC3630] that are
   already standardized, implemented implemented, and widely-used, widely used SHOULD be used for
   encoding and signalling signaling link colors.

                                    PE2
                                    |  +---- P4
                                    | /
                           PE1 ---- P1 --------- P2
                                    |      10Gb
              1Gb     10 Gbps
                             1 Gbps |
                                    |
                                    P3

                                 Figure 8

   Example : 5

   In the example in Figure 5, the P1 router is connected to three P
   routers and two PEs.  P1 is configured to protect the P1-P4 link.  We
   assume that that, given the topology, all neighbors are candidate LFA. LFAs.
   We would like to enforce a policy in the network where only a core
   router may protect against the failure of a core link, link and where high capacity
   high-capacity links are
   prefered. preferred.

   In this example, we can use the proposed link coloring by:

   o  Marking PEs the PE links with the color RED RED.

   o  Marking 10Gb CORE the 10 Gbps core link with the color BLUE BLUE.

   o  Marking 1Gb CORE the 1 Gbps core link with the color YELLOW YELLOW.

   o  Configured  Configuring the protected interface P1->P4 with : as follows:

      *  Include BLUE, preference 200 200.

      *  Include YELLOW, preference 100 100.

      *  Exclude RED RED.

   Using this, PE links will never be used to protect against P1-P4 link
   failure
   failure, and 10Gb the 10 Gbps link will be be preferred.

   The main advantage of this solution is that it can easily be
   duplicated on other interfaces and other nodes without change.  A
   Service Provider
   service provider has only to define the color system (associate a
   color with a level of significance), as it is done already for TE
   affinities or BGP communities.

   An implementation of link coloring:

   o  SHOULD support multiple include "include" and exclude "exclude" colors on a single
      protected interface.

   o  SHOULD provide a level of preference between included colors.

   o  SHOULD support the configuration of multiple colors configuration on a single
      protecting interface.

6.2.4.3.  Bandwidth

   As mentioned in previous sections, not taking into account the
   bandwidth of an alternate could lead to congestion during FRR
   activation.  We propose to base that the bandwidth criteria be based on the
   link speed information information, for the following reason : reasons:

   o  if  If a router S has a set of X destinations primarly primarily forwarded to
      N, using per prefix LFA per-prefix LFAs may lead to have having a subset of X
      protected by a neighbor N1, another subset by N2, another subset
      by Nx Nx, etc.

   o  S is not aware about of traffic flows to each destination and destination, so in the
      case of FRR activation, S is not able to evaluate how much traffic
      will be sent to N1,N2, N1, N2, Nx, etc.  Nx
      in case of FRR activation.

   Based on this, it is not useful to gather available bandwidth on
   alternate paths, as the router does not know how much bandwidth it
   requires for protection.  The proposed link speed approach provides a
   good approximation with a small cost at low cost, as information is easily available.

   The bandwidth criteria of the policy framework SHOULD work in at
   least the following two ways : ways:

   o  PRUNE : exclude a  Prune: Exclude an LFA if the link speed to reach it is lower than
      the link speed of the primary next hop next-hop interface.

   o  PREFER : prefer a  Prefer: Prefer an LFA based on its bandwidth to reach it compared
      to the link speed of the primary next hop next-hop interface.

6.2.4.4.  Alternate preference/Node coloring Preference / Node Coloring

   Rather than tagging interface interfaces on each node (using link color) colors) to
   identify the types of alternate node type nodes (as an example), it would be
   helpful if routers could be identified in the IGP.  This would allow a
   grouped processing on multiple nodes.  As an implementation need needs to
   exclude some specific alternates (see Section 6.2.3), an
   implementation :

   o SHOULD be able to to:

   o  give a preference to a specific alternate.

   o  SHOULD be able to  give a preference to a group of alternate. alternates.

   o  SHOULD be able to  exclude a specific alternate.

   o  SHOULD be able to  exclude a group of alternate. alternates.

   A specific alternate may be identified by its interface, IP address address,
   or router ID ID, and a group of alternates may be identified by a marker
   (tag) advertised in IGP.  The IGP encoding and signalling signaling for marking
   group
   groups of alternates SHOULD be done using
   [I-D.ietf-isis-node-admin-tag], [I-D.ietf-ospf-node-admin-tag]. according to [RFC7917] and
   [RFC7777].  Using a tag/marker is referred to as Node coloring in comparison "node coloring", as
   compared to the link coloring option presented in Section 6.2.4.2.

   Consider the following network:

                                  PE3
                                  |
                                  |
                                  PE2
                                  |   +---- P4
                                  |  /
                         PE1 ---- P1 -------- P2
                                  |      10Gb
              1Gb    10 Gbps
                           1 Gbps |
                                  |
                                  P3

                                 Figure 9 6

   In the example above, each node is configured with a specific tag
   flooded through the IGP.

   o  PE1,PE3: 200 (non candidate). (non-candidate).

   o  PE2: 100 (edge/core).

   o  P1,P2,P3: 50 (core).

   A simple policy could be configured on P1 to choose the best
   alternate for P1->P4 based on router function/role the function or role of the router,
   as follows : follows:

   o  criteria  criterion 1 -> alternate preference: exclude tag tags 100 and 200.

   o  criteria  criterion 2 -> bandwidth.

6.2.5.  Retrieving alternate path attributes Alternate Path Attributes

6.2.5.1.  Alternate path Path

   The alternate path is composed of two distinct parts : parts: PLR to
   alternate and alternate to destination.

                             N1 -- R1 ---- R2
                            /50     \       \
                           /         R3 --- R4
                          /                   \
                          S -------- E ------- D
                          \\                  //
                           \\                //
                            N2 ---- PQ ---- R5

                                 Figure 5 7
   In the figure above, Figure 7, we consider a primary path from S to D, with S using E
   as the primary nexthop. next hop.  All metrics are 1 1, except {S,N1}=50. that {S,N1} = 50.
   Two alternate paths are available:

   o  {S,N1,R1,R2|R3,R4,D}  {S,N1,R1,R2|R3,R4,D}, where N1 is a connected alternate.  This
      consists of two sub-paths:

      *  {S,N1}: path from the PLR to the alternate.

      *  {N1,R1,R2|R3,R4,D}: path from the alternate to the destination.

   o  {S,N2,PQ,R5,D}  {S,N2,PQ,R5,D}, where the PQ is a remote alternate.  Again  Again, the
      path consists of two sub-paths:

      *  {S,N2,PQ}: path from the PLR to the alternate.

      *  {PQ,R5,D}: path from the alternate to the destination.

   As displayed in the figure, Figure 7, some part parts of the alternate path may
   fanout in multipath fan
   out to multiple paths due to ECMP.

6.2.5.2.  Alternate path attributes Path Attributes

   Some criterions criteria listed in the previous sections are requiring to
   retrieve require the retrieval
   of some characteristic characteristics of the alternate path (SRLG, bandwidth,
   color, tag tag, etc.).  We call these characteristics "path attributes".
   A path attribute can record a list of node properties (e.g. (e.g., node
   tag) or link properties (e.g. (e.g., link color).

   This document defines two types of path attributes:

   o  Cumulative attribute: when When a path attribute is cumulative, the
      implementation SHOULD record the value of the attribute on each
      element (link and node) along the alternate path.  SRLG, link
      color, and node color are cumulative attributes.

   o  Unitary attribute: when When a path attribute is unitary, the
      implementation SHOULD record the value of the attribute only on
      the first element along the alternate path (first node, or first
      link).  Bandwidth is a unitary attribute.

                             N1 -- R1 ---- R2
                            /               \
                           / 50              R4
                          /                   \
                          S -------- E ------- D

                                 Figure 8
   In the figure above, Figure 8, N1 is a connected alternate to each reach D from S.  We
   consider that all links have a RED color except {R1,R2} {R1,R2}, which is
   BLUE.  We consider all links to be 10Gbps, 10 Gbps except {N1,R1} {N1,R1}, which is
   2.5Gbps.
   2.5 Gbps.  The bandwidth attribute collected for the alternate path
   will be 10Gbps. 10 Gbps.  As the attribute is unitary, only the link speed of
   the first link {S,N1} is recorded.  The link color attribute
   collected for the alternate path will be {RED,RED,BLUE,RED,RED}.  As
   the attribute is cumulative, the value of the attribute on each link
   along the path is recorded.

6.2.5.3.  Connected alternate Alternate

   For an alternate path using a connected alternate:

   o  attributes  Attributes from the PLR to the alternate are retrieved from the
      interface connected to the alternate.  In case  If the alternate is
      connected through multiple interfaces, the evaluation of
      attributes SHOULD be done once per interface (each interface is
      considered as a separate alternate) and once per ECMP group of
      interfaces (Layer 3 bundle).

   o  path  Path attributes from the alternate to the destination are
      retrieved from
      SPF the SPT rooted at the alternate.  As the alternate
      is a connected alternate, the SPF SPT has already been computed to
      find the alternate, so there is no need of for additional
      computation.

                             N1 -- R1 ---- R2
                          50//50             \
                           //                 \
                        i1//i2                 \
                         S -------- E -------- D

                                 Figure 6 9

   In the figure above, Figure 9, we consider a primary path from S to D, with S using E
   as the primary nexthop. next hop.  All metrics are considered as 1 expect except
   {S,N1}
   links links, which are using a metric of 50.  We consider the
   following SRLG
   groups SRLGs on links:

   o  {S,N1} using i1 : SRLG1,SRLG10 i1: SRLG1,SRLG10.

   o  {S,N1} using i2 : SRLG2,SRLG20 i2: SRLG2,SRLG20.

   o  {N1,R1}: SRLG3.

   o  {R1,R2}: SRLG4.

   o  {N1,R1} : SRLG3

   o  {R1,R2} : SRLG4

   o  {R2,D} : SRLG5

   o  {S,E} : SRLG10

   o  {E,D} : SRLG6  {R2,D}: SRLG5.

   o  {S,E}: SRLG10.

   o  {E,D}: SRLG6.

   S is connected to the alternate using two interfaces interfaces: i1 and i2.

   If i1 and i2 are not part of an ECMP group, the evaluation of
   attributes is done once per interface, and each interface is
   considered as a separate alternate path.  Two alternate paths will be
   available with the associated SRLG attributes : attributes:

   o  Alternate path #1 : #1: {S,N1 using if1,R1,R2,D}:
      SRLG1,SRLG10,SRLG3,SRLG4,SRLG5.

   o  Alternate path #2 : #2: {S,N1 using if2,R1,R2,D}:
      SRLG2,SRLG20,SRLG3,SRLG4,SRLG5.

   Alternate path #1 is sharing risks with the primary path and may be
   depreferred
   pruned, or pruned by user defined its preference may be revoked, per user-defined policy.

   If i1 and i2 are part of an ECMP group, the evaluation of attributes
   is done once per ECMP group, and the implementation considers a
   single alternate path {S,N1 using if1|if2,R1,R2,D} with the following
   SRLG attributes: SRLG1,SRLG10,SRLG2,SRLG20,SRLG3,SRLG4,SRLG5.
   Alternate  The
   alternate path is sharing risks with the primary path and may be
   depreferred
   pruned, or pruned by user defined its preference may be revoked, per user-defined policy.

6.2.5.4.  Remote alternate Alternate

   For alternate path using a remote alternate (tunnel) : (tunnel):

   o  Attributes on the path from the PLR to the alternate are retrieved
      using the PLR's primary SPF SPT (when using a PQ-node PQ node from P-Space) the
      P-space) or the immediate neighbor's SPF SPT (when using a PQ from the
      extended
      P-Space). P-space).  These are then combined with the attributes of
      the link(s) to reach the immediate neighbor.  In both cases, no
      additional SPF SPT is required.

   o  Attributes from the remote alternate to the destination path may
      be retrieved from SPF the SPT rooted at the remote alternate.  An
      additional forward SPF SPT is required for each remote alternate (PQ-node)
      (PQ node), as indicated in [I-D.ietf-rtgwg-rlfa-node-protection] section 3.2 . Section 2.3.2 of [REMOTE-LFA-NODE].  In
      some remote alternate remote-alternate scenarios, like [I-D.francois-segment-
      routing-ti-lfa], alternate to [TI-LFA], alternate-to-
      destination path attributes may be obtained using a different
      technique.

   The number of remote alternates may be very high. .  In the case of
   remote LFA, LFAs, simulations of real-world network topologies have shown
   that order of hundreths as many as hundreds of PQ may be PQs are possible.  The computational
   overhead to collect of collecting all path attributes of all PQ such PQs to
   destination paths may could grow beyond practical reason. reasonable levels.

   To handle this situation, implementations need to limit the number of
   remote alternates to be evaluated to a finite number before
   collecting alternate path attributes and running the policy
   evaluation.  [I-D.ietf-rtgwg-rlfa-node-protection]  Section 2.3.3 of [REMOTE-LFA-NODE] provides a way to
   reduce the number of PQ PQs to be evaluated.

   Some other remote alternate techniques using static or dynamic
   tunnels may not require this pruning.

                  Link            Remote              Remote
                  alternate       alternate           alternate
                 -------------  ------------------   -------------
   Alternates    |  LFA      |  |   rLFA (PQs)   |   |  Static/  |
                 |           |  |                |   |  Dynamic  |
   sources       |           |  |                |   |  tunnels  |
                 -------------  ------------------   -------------
                      |                   |                  |
                      |                   |                  |
                      |        --------------------------    |
                      |        |  Prune some alternates |    |
                      |        | (sorting strategy)     |    |
                      |        --------------------------    |
                      |                   |                  |
                      |                   |                  |
                  ------------------------------------------------
                  |          Collect alternate attributes        |
                  ------------------------------------------------
                                          |
                                          |
                               -------------------------
                               |    Evaluate policy    |
                               -------------------------
                                          |
                                          |
                                   Best alternates

                                 Figure 10

6.2.5.5.  Collecting attributes Attributes in case the Case of multipath Multiple Paths

   As described in Section 6.2.5, there may be some situation situations where an
   alternate path or part of an alternate path fans out to multiple
   paths (e.g. (e.g., ECMP).  When collecting path attributes in such a case,
   an implementation SHOULD consider the union of attributes of each sub-
   path.
   sub-path.

   In the figure 5 Figure 7 (in Section 6.2.5), 6.2.5.1), S has two alternates alternate paths to
   reach D.  Each alternate path fans out into multipath to multiple paths due to ECMP.
   Considering
   Consider the following link color attributes : attributes: all links are RED
   except {R1,R3} {R1,R3}, which is BLUE.  The user wants to use an alternate
   path with only RED links.  The first alternate path
   {S,N1,R1,R2|R3,R4,D} does not fit the constraint, as {R1,R3} is BLUE.
   The second alternate path {S,N2,PQ,R5,D} fits the constraint and will
   be preferred preferred, as it uses only RED links.

6.2.6.  ECMP LFAs

                                     10
                                PE2 - PE3
                                 |     |
                              50 |  5  | 50
                                 P1----P2
                                 \\    //
                              50  \\  // 50
                                   PE1

           Figure 7

                 Links between P1 and PE1 are L1 and L2, links L2.
                 Links between P2 and PE1 are L3 and L4 L4.

                                 Figure 11

   In Figure 11, the figure above, primary path from PE1 to PE2 is through P1 P1, using
   ECMP on two parallel links -- L1 and L2.  In the case of standard
   ECMP behavior, if L1 is failing, postconvergence the post-convergence next hop would
   become L2 and there ECMP would be no longer ECMP. be in use.  If an LFA is
   activated, as stated in
   [RFC5286] Section 3.4., 3.4 of [RFC5286], "alternate
   next-hops may themselves also be primary next-hops, but need not be"
   and "alternate next-hops should maximize the coverage of the failure cases".
   cases."  In this scenario scenario, there is no alternate providing node
   protection, LFA will so PE1 will prefer L2 as the alternate to protect L1 which L1;
   this makes sense compared to postconvergence post-convergence behavior.

   Considering

   Consider a different scenario using figure 7, scenario, again referring to Figure 11, where L1
   and L2 are configured as a layer Layer 3 bundle using a local feature, as well as L3/
   L4 being feature and
   L3/L4 comprise a second layer Layer 3 bundle.  Layer 3 bundles are
   configured as if a link in the bundle is failing, failing; the traffic must be
   rerouted out of the bundle.  Layer 3 bundles are generally introduced
   to increase bandwidth between nodes.  In a nominal situation, ECMP is
   still available from PE1 to PE2, but if L1 is failing, postconvergence the
   post-convergence next hop would become the ECMP on L3 and L4.  In
   this case, LFA behavior SHOULD be adapted in order to reflect the
   bandwidth requirement.

   We would expect the following FIB entry on PE1 : PE1:

                   On PE1 : PE1: PE2 +--> ECMP -> L1
                                |     |
                                |     +----> L2
                                |
                                +--> LFA(ECMP) LFA (ECMP) -> L3
                                      |
                          +--------->
                                      +----------> L4

                                 Figure 12

   If L1 or L2 is failing, traffic must be switched on the LFA ECMP
   bundle rather than using the other primary next hop.

   As mentioned in [RFC5286] Section 3.4., 3.4 of [RFC5286], protecting a link within an
   ECMP by another primary next hop is not a MUST.  Moreover, we as already
   presented
   discussed in this document, that maximizing the coverage of against the failure case
   cases may not be the right approach approach, and policy based a policy-based choice of an
   alternate may be preferred.

   An implementation SHOULD allow to prefer setting a preference to protect a
   primary next hop by with another primary next hop.  An implementation
   SHOULD also allow to
   prefer setting a preference to protect a primary next hop by
   with a NON primary NON-primary next hop.  An implementation SHOULD allow to the use
   of an ECMP bundle as a an LFA.

7.  Operational aspects Aspects

7.1.  No-transit condition  No-Transit Condition on LFA computing node Computing Node

   In [RFC5286], Section 3.5, 3.5 of [RFC5286], the setting of the no-transit condition
   (through the IS-IS overload bit or the OSPF R-bit) in an LFA
   computation is only taken into account for the case where a neighbor
   has the no-transit condition set.

   In addition to RFC 5286 inequality Inequality 1 Loop-Free Criterion (Loop-Free Criterion)
   (Distance_opt(N, D) < Distance_opt(N, S) + Distance_opt(S, D)), D))
   [RFC5286], the IS-IS overload bit or the OSPF R-bit of the LFA
   calculating neighbor (S) SHOULD be taken into account.  Indeed, if it
   has the IS-IS overload bit set or the OSPF R-bit clear, no neighbor
   will loop back to traffic back to itself.

   An OSPF router acting as a stub router [RFC 6987] [RFC6987] SHOULD behave as if
   the R-bit was clear regarding the LFA computation.

7.2.  Manual triggering Triggering of FRR

   Service providers often perform manual link shutdown (using router
   CLI) a
   router's command-line interface (CLI)) to perform some network
   changes/tests.  A manual link shutdown may be done at multiple level :
   levels: physical interface, logical interface, IGP interface, BFD session
   Bidirectional Forwarding Detection (BFD) session, etc.  Especially  In
   particular, testing or troubleshooting FRR requires to perform the that manual
   shutdown be performed on the remote end of the link link, as generally a local
   shutdown would not generally trigger FRR.

   To enhance permit such a situation, an implementation SHOULD support
   triggering/activating LFA Fast Reroute FRR for a given link when a manual shutdown
   is done on a component that currently supports FRR activation.

   An implementation MAY also support FRR activation for a specific
   interface or a specific prefix on a primary next-hop interface and
   revert without any action on any running component of the node (links
   or protocols).  In this use case, the FRR activation time need needs to be
   controlled by a timer in case the operator forgot to revert the
   traffic
   on to the primary path.  When the timer expires, the traffic is
   automatically reverted to the primary path.  This will make easier
   tests simplify the
   testing of fast-reroute path and the FRR path; traffic can then revert be reverted back to the
   primary path without causing a global network convergence.

   For example : example:

   o  if  If an implementation supports FRR activation upon a BFD session down
      session-down event, this that implementation SHOULD support FRR
      activation when a manual shutdown is done on the BFD session.  But
      if an implementation does not support FRR activation on upon a BFD session
      down,
      session-down event, there is no need for this that implementation to
      support FRR activation on upon manual shutdown of a BFD session.

   o  if  If an implementation supports FRR activation on upon a physical link down
      link-down event (e.g. (e.g., Rx laser Off "off" detection, or error threshold raised
      etc.), this
      raised), that implementation SHOULD support FRR activation when a
      manual shutdown at of a physical interface is done.  But if an
      implementation does not support FRR activation on upon a physical link
      down
      link-down event, there is no need for this that implementation to
      support FRR activation on upon manual shutdown of a physical link shutdown. link.

   o  A CLI command may allow to switch switching from the primary path to the FRR
      path
      for testing to test the FRR path for a specific. specific interface or prefix.
      There is no impact on
      controlplane, the control plane; only dataplane the data plane of
      the local node could may be changed.  A similar command may allow to switch back
      switching traffic back from the FRR path to the primary path.

7.3.  Required local information

   LFA Local Information

   The introduction of LFAs in a network requires some enhancement in enhancements to
   standard routing information provided by implementations.  Moreover,
   due to the non
   100% "non-100%" coverage, coverage informations information is also required.

   Hence

   Hence, an implementation : implementation:

   o  MUST be able to display, for every prefix, the primary next hop as
      well as the alternate next hop next-hop information.

   o  MUST provide coverage information per LFA activation domain of LFA (area,
      level, topology, instance, virtual router, address family family, etc.).

   o  MUST provide the number of protected prefixes as well as non protected
      non-protected prefixes globally.

   o  SHOULD provide the number of protected prefixes as well as non
      protected
      non-protected prefixes per link.

   o  MAY provide the number of protected prefixes as well as non protected
      non-protected prefixes per priority if the implementation supports
      prefix-priority insertion in the RIB/FIB.

   o  SHOULD provide a reason for choosing an alternate (policy and
      criteria) and for excluding an alternate.

   o  SHOULD provide the list of non protected non-protected prefixes and the reason
      why they are not protected (no (e.g., no protection required or required, no
      alternate available).

7.4.  Coverage monitoring Monitoring

   It is pretty easy to evaluate the coverage of a network in a nominal
   situation, but topology changes may change the level of coverage.  In
   some situations, the network may no longer be able to provide the
   required level of protection.  Hence, it becomes very important for
   service providers to get alerted about receive alerts regarding changes of in coverage.

   An implementation SHOULD : SHOULD:

   o  provide an alert system if total coverage (for a node) is below a
      defined threshold or comes back when coverage returns to a normal situation. normal.

   o  provide an alert system if coverage of for a specific link is below a
      defined threshold or comes back when coverage returns to a normal situation. normal.

   An implementation MAY : MAY:

   o  trigger an alert if a specific destination is not protected
      anymore or when protection comes back up for this destination destination.

   Although the procedures for providing alerts are beyond the scope of
   this document, we recommend that implementations consider standard
   and well used well-used mechanisms like syslog or SNMP traps.

7.5.  LFA  LFAs and network planning Network Planning

   The operator may choose to run simulations in order to ensure full
   coverage of a
   certain type of full coverage for the whole network or a given subset
   of the network.  This is particularly likely if he operates the
   network in the sense of the third backbone profiles profile described in [RFC6571],
   Section 4 of [RFC6571]; that is, he seeks to design and engineer the
   network topology in such a way that a certain level of coverage is
   always achieved.  Obviously  Obviously, a complete and exact simulation of the
   IP FRR coverage can only be achieved, achieved if the behavior is deterministic
   and if the algorithm used is available to the simulation tool.  Thus, an
   implementation SHOULD:

   o  Behave deterministic deterministically in its selection LFA selection process.  I.e.  That is,
      in the same topology and with the same policy configuration, the
      implementation MUST always choose the same alternate for a given
      prefix.

   o  Document its behavior.  The implementation SHOULD provide enough
      documentation of regarding its behavior that allows to allow an implementer of a
      simulation tool, tool to foresee the exact choice of the LFA
      implementation for every prefix in a given topology.  This SHOULD
      take into account all possible policy configuration options.  One
      possible way to document this behavior is to disclose the
      algorithm used to choose alternates.

8.  Security Considerations

   The policy mechanism introduced in this document allows to tune the tuning of
   the selection of the alternate.  This is not seen as a security threat
   as:
   threat, because:

   o  all candidates are already eligible as per [RFC5286] and
      considered useable. usable.

   o  the policy is based on information from the router's own
      configuration and from the IGP IGP, both of which are both considered
      trusted.

   Hence

   Hence, this document does not introduce any new security
   considerations as compared to [RFC5286].

   This document does not introduce any change in security consideration
   compared to [RFC5286].  The

   As noted above, the policy mechanism introduced in this document allow to tune
   allows the tuning of the selection of the best alternate choice but does not
   change the list of alternates that are eligible.  As defined described in [RFC5286]
   Section 7., 7 of [RFC5286], this best alternate "can be used anyway when
   a different topological change occurs, and hence this can't be viewed
   as a new security threat.". threat."

9.  IANA Considerations

   This document has no action for IANA.

10.  Contributors

   Significant contributions were made by Pierre Francois, Hannes
   Gredler, Chris Bowers, Jeff Tantsura, Uma Chunduri, Acee Lindem and
   Mustapha Aissaoui which the authors would like to acknowledge.

11.  References

11.1.

9.1.  Normative References

   [I-D.ietf-isis-node-admin-tag]
              Sarkar, P., Gredler, H., Hegde, S., Litkowski, S.,
              Decraene, B., Li, Z., Aries, E., Rodriguez, R., and H.
              Raghuveer, "Advertising Per-node Admin Tags in IS-IS",
              draft-ietf-isis-node-admin-tag-02 (work in progress), June
              2015.

   [I-D.ietf-ospf-node-admin-tag]
              Hegde, S., Raghuveer, H., Gredler, H., Shakir, R.,
              Smirnov, A., Li, Z., and B. Decraene, "Advertising per-
              node administrative tags in OSPF", draft-ietf-ospf-node-
              admin-tag-02 (work in progress), June 2015.

   [ISO10589]
              International Organization for Standardization,
              "Intermediate system System to Intermediate system System intra-domain
              routing
              routeing information exchange protocol for use in
              conjunction with the protocol for providing the
              connectionless-mode Network Service network service (ISO 8473), ISO/IEC
              10589:2002, Second Edition.", Nov 8473)",
              ISO Standard 10589, 2002.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997.

   [RFC3137]  Retana, A., Nguyen, L., White, R., Zinin, A., and D.
              McPherson, "OSPF Stub Router Advertisement", RFC 3137,
              June 2001. 1997,
              <http://www.rfc-editor.org/info/rfc2119>.

   [RFC3630]  Katz, D., Kompella, K., and D. Yeung, "Traffic Engineering
              (TE) Extensions to OSPF Version 2", RFC 3630,
              DOI 10.17487/RFC3630, September
              2003. 2003,
              <http://www.rfc-editor.org/info/rfc3630>.

   [RFC4203]  Kompella, K. K., Ed. and Y. Rekhter, Ed., "OSPF Extensions in
              Support of Generalized Multi-Protocol Label Switching
              (GMPLS)", RFC 4203, DOI 10.17487/RFC4203, October 2005.

   [RFC4205]  Kompella, K. and Y. Rekhter, "Intermediate System to
              Intermediate System (IS-IS) Extensions in Support of
              Generalized Multi-Protocol Label Switching (GMPLS)", RFC
              4205, October 2005. 2005,
              <http://www.rfc-editor.org/info/rfc4203>.

   [RFC5286]  Atlas, A. A., Ed. and A. Zinin, Ed., "Basic Specification for
              IP Fast Reroute: Loop-Free Alternates", RFC 5286,
              DOI 10.17487/RFC5286, September 2008. 2008,
              <http://www.rfc-editor.org/info/rfc5286>.

   [RFC5305]  Li, T. and H. Smit, "IS-IS Extensions for Traffic
              Engineering", RFC 5305, DOI 10.17487/RFC5305, October 2008.
              2008, <http://www.rfc-editor.org/info/rfc5305>.

   [RFC5307]  Kompella, K. K., Ed. and Y. Rekhter, Ed., "IS-IS Extensions
              in Support of Generalized Multi-Protocol Label Switching
              (GMPLS)", RFC 5307, DOI 10.17487/RFC5307, October 2008. 2008,
              <http://www.rfc-editor.org/info/rfc5307>.

   [RFC5340]  Coltun, R., Ferguson, D., Moy, J., and A. Lindem, "OSPF
              for IPv6", RFC 5340, DOI 10.17487/RFC5340, July 2008. 2008,
              <http://www.rfc-editor.org/info/rfc5340>.

   [RFC6571]  Filsfils, C., Ed., Francois, P., Ed., Shand, M., Decraene,
              B., Uttaro, J., Leymann, N., and M. Horneffer, "Loop-Free
              Alternate (LFA) Applicability in Service Provider (SP)
              Networks", RFC 6571, DOI 10.17487/RFC6571, June 2012. 2012,
              <http://www.rfc-editor.org/info/rfc6571>.

   [RFC6987]  Retana, A., Nguyen, L., Zinin, A., White, R., and D.
              McPherson, "OSPF Stub Router Advertisement", RFC 6987,
              DOI 10.17487/RFC6987, September 2013. 2013,
              <http://www.rfc-editor.org/info/rfc6987>.

   [RFC7490]  Bryant, S., Filsfils, C., Previdi, S., Shand, M., and N.
              So, "Remote Loop-Free Alternate (LFA) Fast Reroute (FRR)",
              RFC 7490, DOI 10.17487/RFC7490, April 2015.

11.2. 2015,
              <http://www.rfc-editor.org/info/rfc7490>.

   [RFC7777]  Hegde, S., Shakir, R., Smirnov, A., Li, Z., and B.
              Decraene, "Advertising Node Administrative Tags in OSPF",
              RFC 7777, DOI 10.17487/RFC7777, March 2016,
              <http://www.rfc-editor.org/info/rfc7777>.

   [RFC7917]  Sarkar, P., Ed., Gredler, H., Hegde, S., Litkowski, S.,
              and B. Decraene, "Advertising Node Administrative Tags in
              IS-IS", RFC 7917, DOI 10.17487/RFC7917, June 2016,
              <http://www.rfc-editor.org/info/rfc7917>.

9.2.  Informative References

   [I-D.francois-segment-routing-ti-lfa]

   [REMOTE-LFA-NODE]
              Sarkar, P., Ed., Hegde, S., Bowers, C., Gredler, H., and
              S. Litkowski, "Remote-LFA Node Protection and
              Manageability", Work in Progress, draft-ietf-rtgwg-rlfa-
              node-protection-05, December 2015.

   [SEG-RTG-ARCH]
              Filsfils, C., Ed., Previdi, S., Ed., Decraene, B.,
              Litkowski, S., and R. Shakir, "Segment Routing
              Architecture", Work in Progress, draft-ietf-spring-
              segment-routing-08, May 2016.

   [TI-LFA]   Francois, P., Filsfils, C., Bashandy, A., and B. Decraene, B.,
              and S. Litkowski, "Topology Independent Fast Reroute using
              Segment Routing",
              draft-francois-segment-routing-ti-lfa-00 (work Work in
              progress), Progress, draft-francois-
              segment-routing-ti-lfa-00, November 2013.

   [I-D.ietf-rtgwg-rlfa-node-protection]
              Sarkar, P.,

Contributors

   Significant contributions were made by Pierre Francois, Hannes
   Gredler, H., Hegde, S., Chris Bowers, C., Litkowski,
              S., and H. Raghuveer, "Remote-LFA Node Protection Jeff Tantsura, Uma Chunduri, Acee Lindem, and
              Manageability", draft-ietf-rtgwg-rlfa-node-protection-02
              (work in progress), June 2015.
   Mustapha Aissaoui, whom the authors would like to acknowledge.

Authors' Addresses

   Stephane Litkowski (editor)
   Orange

   Email: stephane.litkowski@orange.com

   Bruno Decraene
   Orange

   Email: bruno.decraene@orange.com

   Clarence Filsfils
   Cisco Systems

   Email: cfilsfil@cisco.com

   Kamran Raza
   Cisco Systems

   Email: skraza@cisco.com

   Martin Horneffer
   Deutsche Telekom

   Email: Martin.Horneffer@telekom.de
   Pushpasis Sarkar
   Juniper Networks
   Individual Contributor

   Email: psarkar@juniper.net pushpasis.ietf@gmail.com