+---------------+ +---------------+ | | <------- Signal Channel ------> | | | DOTS Client | | DOTS Server | | | <======= Data Channel ======> | | +---------------+ +---------------+
+-------------------+ | DOTS Data Channel | +-------------------+ | RESTCONF | +-------------------+ | TLS | +-------------------+ | TCP | +-------------------+ | IP | +-------------------+
error-app-tag: loop-detected error-tag: operation-failed error-type: transport, application error-info: <via-header> : A copy of the Via header field when the loop was detected. Description: An infinite loop has been detected when forwarding a requests via a proxy.
module: ietf-dots-data-channel +--rw dots-data +--rw dots-client* [cuid] | +--rw cuid string | +--rw cdid? string | +--rw aliases | | +--rw alias* [name] | | +--rw name string | | +--rw target-prefix* inet:ip-prefix | | +--rw target-port-range* [lower-port] | | | +--rw lower-port inet:port-number | | | +--rw upper-port? inet:port-number | | +--rw target-protocol* uint8 | | +--rw target-fqdn* inet:domain-name | | +--rw target-uri* inet:uri | | +--ro pending-lifetime? int32 | +--rw acls | ... +--ro capabilities ...
module: ietf-dots-data-channel +--rw dots-data +--rw dots-client* [cuid] | +--rw cuid string | +--rw cdid? string | +--rw aliases | | ... | +--rw acls | +--rw acl* [name] | +--rw name string | +--rw type? ietf-acl:acl-type | +--rw activation-type? activation-type | +--ro pending-lifetime? int32 | +--rw aces | +--rw ace* [name] | +--rw name string | +--rw matches | | +--rw (l3)? | | | +--:(ipv4) | | | | ... | | | +--:(ipv6) | | | ... | | +--rw (l4)? | | +--:(tcp) | | | ... | | +--:(udp) | | | ... | | +--:(icmp) | | ... | +--rw actions | | +--rw forwarding identityref | | +--rw rate-limit? decimal64 | +--ro statistics | +--ro matched-packets? yang:counter64 | +--ro matched-octets? yang:counter64 +--ro capabilities ...
module: ietf-dots-data-channel +--rw dots-data +--rw dots-client* [cuid] | ... | +--rw acls | +--rw acl* [name] | ... | +--rw aces | +--rw ace* [name] | +--rw name string | +--rw matches | | +--rw (l3)? | | | +--:(ipv4) | | | | +--rw ipv4 | | | | +--rw dscp? inet:dscp | | | | +--rw ecn? uint8 | | | | +--rw length? uint16 | | | | +--rw ttl? uint8 | | | | +--rw protocol? uint8 | | | | +--rw ihl? uint8 | | | | +--rw flags? bits | | | | +--rw offset? uint16 | | | | +--rw identification? uint16 | | | | +--rw (destination-network)? | | | | | +--:(destination-ipv4-network) | | | | | +--rw destination-ipv4-network? | | | | | inet:ipv4-prefix | | | | +--rw (source-network)? | | | | | +--:(source-ipv4-network) | | | | | +--rw source-ipv4-network? | | | | | inet:ipv4-prefix | | | | +--rw fragment | | | | +--rw operator? operator | | | | +--rw type fragment-type | | | +--:(ipv6) | | | ... | | +--rw (l4)? | | ... | +--rw actions | | ... | +--ro statistics | ... +--ro capabilities ...
module: ietf-dots-data-channel +--rw dots-data +--rw dots-client* [cuid] | ... | +--rw acls | +--rw acl* [name] | ... | +--rw aces | +--rw ace* [name] | +--rw name string | +--rw matches | | +--rw (l3)? | | | +--:(ipv4) | | | | ... | | | +--:(ipv6) | | | +--rw ipv6 | | | +--rw dscp? inet:dscp | | | +--rw ecn? uint8 | | | +--rw length? uint16 | | | +--rw ttl? uint8 | | | +--rw protocol? uint8 | | | +--rw (destination-network)? | | | | +--:(destination-ipv6-network) | | | | +--rw destination-ipv6-network? | | | | inet:ipv6-prefix | | | +--rw (source-network)? | | | | +--:(source-ipv6-network) | | | | +--rw source-ipv6-network? | | | | inet:ipv6-prefix | | | +--rw flow-label? | | | | inet:ipv6-flow-label | | | +--rw fragment | | | +--rw operator? operator | | | +--rw type fragment-type | | +--rw (l4)? | | ... | +--rw actions | | ... | +--ro statistics | ... +--ro capabilities ...
+--rw matches | +--rw (l3)? | | ... | +--rw (l4)? | +--:(tcp) | | +--rw tcp | | +--rw sequence-number? uint32 | | +--rw acknowledgement-number? uint32 | | +--rw data-offset? uint8 | | +--rw reserved? uint8 | | +--rw flags? bits | | +--rw window-size? uint16 | | +--rw urgent-pointer? uint16 | | +--rw options? binary | | +--rw flags-bitmask | | | +--rw operator? operator | | | +--rw bitmask uint16 | | +--rw (source-port)? | | | +--:(source-port-range-or-operator) | | | +--rw source-port-range-or-operator | | | +--rw (port-range-or-operator)? | | | +--:(range) | | | | +--rw lower-port | | | | | inet:port-number | | | | +--rw upper-port | | | | inet:port-number | | | +--:(operator) | | | +--rw operator? | | | | operator | | | +--rw port | | | inet:port-number | | +--rw (destination-port)? | | +--:(destination-port-range-or-operator) | | +--rw destination-port-range-or-operator | | +--rw (port-range-or-operator)? | | +--:(range) | | | +--rw lower-port | | | | inet:port-number | | | +--rw upper-port | | | inet:port-number | | +--:(operator) | | +--rw operator? | | | operator | | +--rw port | | inet:port-number | +--:(udp) | | ... | +--:(icmp) | ... +--rw actions | ...
+--rw matches | +--rw (l3)? | | ... | +--rw (l4)? | +--:(tcp) | | ... | +--:(udp) | | +--rw udp | | +--rw length? uint16 | | +--rw (source-port)? | | | +--:(source-port-range-or-operator) | | | +--rw source-port-range-or-operator | | | +--rw (port-range-or-operator)? | | | +--:(range) | | | | +--rw lower-port | | | | | inet:port-number | | | | +--rw upper-port | | | | inet:port-number | | | +--:(operator) | | | +--rw operator? | | | | operator | | | +--rw port | | | inet:port-number | | +--rw (destination-port)? | | +--:(destination-port-range-or-operator) | | +--rw destination-port-range-or-operator | | +--rw (port-range-or-operator)? | | +--:(range) | | | +--rw lower-port | | | | inet:port-number | | | +--rw upper-port | | | inet:port-number | | +--:(operator) | | +--rw operator? | | | operator | | +--rw port | | inet:port-number | +--:(icmp) | +--rw icmp | +--rw type? uint8 | +--rw code? uint8 | +--rw rest-of-header? binary +--rw actions | ...
ACL Match | Mandatory Fields |
---|---|
ipv4 | length, protocol, destination-ipv4-network, source-ipv4-network, and fragment |
ipv6 | length, protocol, destination-ipv6-network, source-ipv6-network, and fragment |
tcp | flags-bitmask, source-port-range-or-operator, and destination-port-range-or-operator |
udp | length, source-port-range-or-operator, and destination-port-range-or-operator |
icmp | type and code |
module: ietf-dots-data-channel +--rw dots-data ... +--ro capabilities +--ro address-family* enumeration +--ro forwarding-actions* identityref +--ro rate-limit? boolean +--ro transport-protocols* uint8 +--ro ipv4 | +--ro dscp? boolean | +--ro ecn? boolean | +--ro length? boolean | +--ro ttl? boolean | +--ro protocol? boolean | +--ro ihl? boolean | +--ro flags? boolean | +--ro offset? boolean | +--ro identification? boolean | +--ro source-prefix? boolean | +--ro destination-prefix? boolean | +--ro fragment? boolean +--ro ipv6 | +--ro dscp? boolean | +--ro ecn? boolean | +--ro length? boolean | +--ro hoplimit? boolean | +--ro protocol? boolean | +--ro destination-prefix? boolean | +--ro source-prefix? boolean | +--ro flow-label? boolean | +--ro fragment? boolean +--ro tcp | +--ro sequence-number? boolean | +--ro acknowledgement-number? boolean | +--ro data-offset? boolean | +--ro reserved? boolean | +--ro flags? boolean | +--ro window-size? boolean | +--ro urgent-pointer? boolean | +--ro options? boolean | +--ro flags-bitmask? boolean | +--ro source-port? boolean | +--ro destination-port? boolean | +--ro port-range? boolean +--ro udp | +--ro length? boolean | +--ro source-port? boolean | +--ro destination-port? boolean | +--ro port-range? boolean +--ro icmp +--ro type? boolean +--ro code? boolean +--ro rest-of-header? boolean
module ietf-dots-data-channel { yang-version 1.1; namespace "urn:ietf:params:xml:ns:yang:ietf-dots-data-channel"; prefix data-channel; import ietf-inet-types { prefix inet; reference "Section 4 of RFC 6991"; } import ietf-access-control-list { prefix ietf-acl; reference "RFC 8519: YANG Data Model for Network Access Control Lists (ACLs)"; } import ietf-packet-fields { prefix packet-fields; reference "RFC 8519: YANG Data Model for Network Access Control Lists (ACLs)"; } organization "IETF DDoS Open Threat Signaling (DOTS) Working Group"; contact "WG Web: <https://datatracker.ietf.org/wg/dots/> WG List: <mailto:dots@ietf.org> Editor: Mohamed Boucadair <mailto:mohamed.boucadair@orange.com> Editor: Konda, Tirumaleswar Reddy.K <mailto:TirumaleswarReddy_Konda@McAfee.com> Author: Jon Shallow <mailto:jon.shallow@nccgroup.com> Author: Kaname Nishizuka <mailto:kaname@nttv6.jp> Author: Liang Xia <mailto:frank.xialiang@huawei.com> Author: Prashanth Patil <mailto:praspati@cisco.com> Author: Andrew Mortensen <mailto:amortensen@arbor.net> Author: Nik Teague <mailto:nteague@ironmountain.co.uk>"; description "This module contains YANG definition for configuring aliases for resources and filtering rules using DOTS data channel. Copyright (c) 2020 IETF Trust and the persons identified as authors of the code. All rights reserved. Redistribution and use in source and binary forms, with or without modification, is permitted pursuant to, and subject to the license terms contained in, the Simplified BSD License set forth in Section 4.c of the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info). This version of this YANG module is part of RFC 8783; see the RFC itself for full legal notices."; revision 2020-05-28 { description "Initial revision."; reference "RFC 8783: Distributed Denial-of-Service Open Threat Signaling (DOTS) Data Channel Specification"; } typedef activation-type { type enumeration { enum activate-when-mitigating { value 1; description "The Access Control List (ACL) is installed only when a mitigation is active for the DOTS client."; } enum immediate { value 2; description "The ACL is immediately activated."; } enum deactivate { value 3; description "The ACL is maintained by the DOTS server, but it is deactivated."; } } description "Indicates the activation type of an ACL."; } typedef operator { type bits { bit not { position 0; description "If set, logical negation of operation."; } bit match { position 1; description "Match bit. This is a bitwise match operation defined as '(data & value) == value'."; } bit any { position 3; description "Any bit. This is a match on any of the bits in bitmask. It evaluates to 'true' if any of the bits in the value mask are set in the data, i.e., '(data & value) != 0'."; } } description "Specifies how to apply the defined bitmask. 'any' and 'match' bits must not be set simultaneously."; } grouping tcp-flags { leaf operator { type operator; default "match"; description "Specifies how to interpret the TCP flags."; } leaf bitmask { type uint16; mandatory true; description "The bitmask matches the last 4 bits of byte 12 and byte 13 of the TCP header. For clarity, the 4 bits of byte 12 corresponding to the TCP data offset field are not included in any matching."; } description "Operations on TCP flags."; } typedef fragment-type { type bits { bit df { position 0; description "Don't fragment bit for IPv4. Must be set to 0 when it appears in an IPv6 filter."; } bit isf { position 1; description "Is a fragment."; } bit ff { position 2; description "First fragment."; } bit lf { position 3; description "Last fragment."; } } description "Different fragment types to match against."; } grouping target { description "Specifies the targets of the mitigation request."; leaf-list target-prefix { type inet:ip-prefix; description "IPv4 or IPv6 prefix identifying the target."; } list target-port-range { key "lower-port"; description "Port range. When only lower-port is present, it represents a single port number."; leaf lower-port { type inet:port-number; mandatory true; description "Lower port number of the port range."; } leaf upper-port { type inet:port-number; must '. >= ../lower-port' { error-message "The upper-port number must be greater than or equal to the lower-port number."; } description "Upper port number of the port range."; } } leaf-list target-protocol { type uint8; description "Identifies the target protocol number. Values are taken from the IANA protocol registry: https://www.iana.org/assignments/protocol-numbers/ For example, 6 for TCP or 17 for UDP."; } leaf-list target-fqdn { type inet:domain-name; description "FQDN identifying the target."; } leaf-list target-uri { type inet:uri; description "URI identifying the target."; } } grouping fragment-fields { leaf operator { type operator; default "match"; description "Specifies how to interpret the fragment type."; } leaf type { type fragment-type; mandatory true; description "Indicates what fragment type to look for."; } description "Operations on fragment types."; } grouping aliases { description "Top-level container for aliases."; list alias { key "name"; description "List of aliases."; leaf name { type string; description "The name of the alias."; } uses target; leaf pending-lifetime { type int32; units "minutes"; config false; description "Indicates the pending validity lifetime of the alias entry."; } } } grouping ports { choice source-port { container source-port-range-or-operator { uses packet-fields:port-range-or-operator; description "Source port definition."; } description "Choice of specifying the source port or referring to a group of source port numbers."; } choice destination-port { container destination-port-range-or-operator { uses packet-fields:port-range-or-operator; description "Destination port definition."; } description "Choice of specifying a destination port or referring to a group of destination port numbers."; } description "Choice of specifying a source or destination port numbers."; } grouping access-lists { description "Specifies the ordered set of Access Control Lists."; list acl { key "name"; ordered-by user; description "An ACL is an ordered list of Access Control Entries (ACE). Each ACE has a list of match criteria and a list of actions."; leaf name { type string { length "1..64"; } description "The name of the access list."; reference "RFC 8519: YANG Data Model for Network Access Control Lists (ACLs)"; } leaf type { type ietf-acl:acl-type; description "Type of access control list. Indicates the primary intended type of match criteria (e.g., IPv4, IPv6) used in the list instance."; reference "RFC 8519: YANG Data Model for Network Access Control Lists (ACLs)"; } leaf activation-type { type activation-type; default "activate-when-mitigating"; description "Indicates the activation type of an ACL. An ACL can be deactivated, installed immediately, or installed when a mitigation is active."; } leaf pending-lifetime { type int32; units "minutes"; config false; description "Indicates the pending validity lifetime of the ACL entry."; } container aces { description "The Access Control Entries container contains a list of ACEs."; list ace { key "name"; ordered-by user; description "List of access list entries."; leaf name { type string { length "1..64"; } description "A unique name identifying this ACE."; reference "RFC 8519: YANG Data Model for Network Access Control Lists (ACLs)"; } container matches { description "The rules in this set determine what fields will be matched upon before any action is taken on them. If no matches are defined in a particular container, then any packet will match that container. If no matches are specified at all in an ACE, then any packet will match the ACE."; reference "RFC 8519: YANG Data Model for Network Access Control Lists (ACLs)"; choice l3 { container ipv4 { when "derived-from(../../../../type, " + "'ietf-acl:ipv4-acl-type')"; uses packet-fields:acl-ip-header-fields; uses packet-fields:acl-ipv4-header-fields; container fragment { description "Indicates how to handle IPv4 fragments."; uses fragment-fields; } description "Rule set that matches IPv4 header."; } container ipv6 { when "derived-from(../../../../type, " + "'ietf-acl:ipv6-acl-type')"; uses packet-fields:acl-ip-header-fields; uses packet-fields:acl-ipv6-header-fields; container fragment { description "Indicates how to handle IPv6 fragments."; uses fragment-fields; } description "Rule set that matches IPv6 header."; } description "Either IPv4 or IPv6."; } choice l4 { container tcp { uses packet-fields:acl-tcp-header-fields; container flags-bitmask { description "Indicates how to handle TCP flags."; uses tcp-flags; } uses ports; description "Rule set that matches TCP header."; } container udp { uses packet-fields:acl-udp-header-fields; uses ports; description "Rule set that matches UDP header."; } container icmp { uses packet-fields:acl-icmp-header-fields; description "Rule set that matches ICMP/ICMPv6 header."; } description "Can be TCP, UDP, or ICMP/ICMPv6"; } } container actions { description "Definitions of action for this ACE."; leaf forwarding { type identityref { base ietf-acl:forwarding-action; } mandatory true; description "Specifies the forwarding action per ACE."; reference "RFC 8519: YANG Data Model for Network Access Control Lists (ACLs)"; } leaf rate-limit { when "../forwarding = 'ietf-acl:accept'" { description "Rate-limit is valid only when accept action is used."; } type decimal64 { fraction-digits 2; } units "bytes per second"; description "Specifies how to rate-limit the traffic."; } } container statistics { config false; description "Aggregate statistics."; uses ietf-acl:acl-counters; } } } } } container dots-data { description "Main container for DOTS data channel."; list dots-client { key "cuid"; description "List of DOTS clients."; leaf cuid { type string; description "A unique identifier that is generated by a DOTS client to prevent request collisions."; reference "RFC 8782: Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Specification"; } leaf cdid { type string; description "A client domain identifier conveyed by a server-domain DOTS gateway to a remote DOTS server."; reference "RFC 8782: Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Specification"; } container aliases { description "Set of aliases that are bound to a DOTS client."; uses aliases; } container acls { description "Access lists that are bound to a DOTS client."; uses access-lists; } } container capabilities { config false; description "Match capabilities"; leaf-list address-family { type enumeration { enum ipv4 { description "IPv4 is supported."; } enum ipv6 { description "IPv6 is supported."; } } description "Indicates the IP address families supported by the DOTS server."; } leaf-list forwarding-actions { type identityref { base ietf-acl:forwarding-action; } description "Supported forwarding action(s)."; } leaf rate-limit { type boolean; description "Support of rate-limit action."; } leaf-list transport-protocols { type uint8; description "Upper-layer protocol associated with a filtering rule. Values are taken from the IANA protocol registry: https://www.iana.org/assignments/protocol-numbers/ For example, this field contains 1 for ICMP, 6 for TCP 17 for UDP, or 58 for ICMPv6."; } container ipv4 { description "Indicates IPv4 header fields that are supported to enforce ACLs."; leaf dscp { type boolean; description "Support of filtering based on Differentiated Services Code Point (DSCP)."; } leaf ecn { type boolean; description "Support of filtering based on Explicit Congestion Notification (ECN)."; } leaf length { type boolean; description "Support of filtering based on the Total Length."; } leaf ttl { type boolean; description "Support of filtering based on the Time to Live (TTL)."; } leaf protocol { type boolean; description "Support of filtering based on protocol field."; } leaf ihl { type boolean; description "Support of filtering based on the Internet Header Length (IHL)."; } leaf flags { type boolean; description "Support of filtering based on the 'flags'."; } leaf offset { type boolean; description "Support of filtering based on the 'offset'."; } leaf identification { type boolean; description "Support of filtering based on the 'identification'."; } leaf source-prefix { type boolean; description "Support of filtering based on the source prefix."; } leaf destination-prefix { type boolean; description "Support of filtering based on the destination prefix."; } leaf fragment { type boolean; description "Indicates the capability of a DOTS server to enforce filters on IPv4 fragments. That is, the match functionality based on the Layer 3 'fragment' clause is supported."; } } container ipv6 { description "Indicates IPv6 header fields that are supported to enforce ACLs."; leaf dscp { type boolean; description "Support of filtering based on DSCP."; } leaf ecn { type boolean; description "Support of filtering based on ECN."; } leaf length { type boolean; description "Support of filtering based on the Payload Length."; } leaf hoplimit { type boolean; description "Support of filtering based on the Hop Limit."; } leaf protocol { type boolean; description "Support of filtering based on the Next Header field."; } leaf destination-prefix { type boolean; description "Support of filtering based on the destination prefix."; } leaf source-prefix { type boolean; description "Support of filtering based on the source prefix."; } leaf flow-label { type boolean; description "Support of filtering based on the Flow Label."; } leaf fragment { type boolean; description "Indicates the capability of a DOTS server to enforce filters on IPv6 fragments."; } } container tcp { description "Set of TCP fields that are supported by the DOTS server to enforce filters."; leaf sequence-number { type boolean; description "Support of filtering based on the TCP sequence number."; } leaf acknowledgement-number { type boolean; description "Support of filtering based on the TCP acknowledgement number."; } leaf data-offset { type boolean; description "Support of filtering based on the TCP data-offset."; } leaf reserved { type boolean; description "Support of filtering based on the TCP reserved field."; } leaf flags { type boolean; description "Support of filtering, as defined in RFC 8519, based on the TCP flags."; } leaf window-size { type boolean; description "Support of filtering based on the TCP window size."; } leaf urgent-pointer { type boolean; description "Support of filtering based on the TCP urgent pointer."; } leaf options { type boolean; description "Support of filtering based on the TCP options."; } leaf flags-bitmask { type boolean; description "Support of filtering based on the TCP flags bitmask."; } leaf source-port { type boolean; description "Support of filtering based on the source port number."; } leaf destination-port { type boolean; description "Support of filtering based on the destination port number."; } leaf port-range { type boolean; description "Support of filtering based on a port range. This includes filtering based on a source port range, destination port range, or both. All operators (i.e, less than or equal to, greater than or equal to, equal to, and not equal to) are supported. In particular, this means that the implementation supports filtering based on source-port-range-or-operator and destination-port-range-or-operator."; } } container udp { description "Set of UDP fields that are supported by the DOTS server to enforce filters."; leaf length { type boolean; description "Support of filtering based on the UDP length."; } leaf source-port { type boolean; description "Support of filtering based on the source port number."; } leaf destination-port { type boolean; description "Support of filtering based on the destination port number."; } leaf port-range { type boolean; description "Support of filtering based on a port range. This includes filtering based on a source port range, destination port range, or both. All operators (i.e, less than or equal, greater than or equal, equal to, and not equal to) are supported. In particular, this means that the implementation supports filtering based on source-port-range-or-operator and destination-port-range-or-operator."; } } container icmp { description "Set of ICMP/ICMPv6 fields that are supported by the DOTS server to enforce filters."; leaf type { type boolean; description "Support of filtering based on the ICMP/ICMPv6 type."; } leaf code { type boolean; description "Support of filtering based on the ICMP/ICMPv6 code."; } leaf rest-of-header { type boolean; description "Support of filtering based on the ICMP four-byte field / the ICMPv6 message body."; } } } } }
POST /restconf/data/ietf-dots-data-channel:dots-data HTTP/1.1 Host: {host}:{port} Content-Type: application/yang-data+json { "ietf-dots-data-channel:dots-client": [ { "cuid": "string" } ] }
POST /restconf/data/ietf-dots-data-channel:dots-data HTTP/1.1 Host: {host}:{port} Content-Type: application/yang-data+json { "ietf-dots-data-channel:dots-client": [ { "cuid": "string", "cdid": "string" } ] }
POST /restconf/data/ietf-dots-data-channel:dots-data HTTP/1.1 Host: example.com Content-Type: application/yang-data+json { "ietf-dots-data-channel:dots-client": [ { "cuid": "dz6pHjaADkaFTbjr0JGBpw", "cdid": "7eeaf349529eb55ed50113" } ] }
PUT /restconf/data/ietf-dots-data-channel:dots-data\ /dots-client=dz6pHjaADkaFTbjr0JGBpw HTTP/1.1 Host: example.com Content-Type: application/yang-data+json { "ietf-dots-data-channel:dots-client": [ { "cuid": "dz6pHjaADkaFTbjr0JGBpw" } ] }
DELETE /restconf/data/ietf-dots-data-channel:dots-data\ /dots-client=dz6pHjaADkaFTbjr0JGBpw HTTP/1.1 Host: example.com
POST /restconf/data/ietf-dots-data-channel:dots-data\ /dots-client=cuid HTTP/1.1 Host: {host}:{port} Content-Type: application/yang-data+json { "ietf-dots-data-channel:aliases": { "alias": [ { "name": "string", "target-prefix": [ "string" ], "target-port-range": [ { "lower-port": integer, "upper-port": integer } ], "target-protocol": [ integer ], "target-fqdn": [ "string" ], "target-uri": [ "string" ] } ] } }
POST /restconf/data/ietf-dots-data-channel:dots-data\ /dots-client=dz6pHjaADkaFTbjr0JGBpw HTTP/1.1 Host: example.com Content-Type: application/yang-data+json { "ietf-dots-data-channel:aliases": { "alias": [ { "name": "https1", "target-protocol": [ 6 ], "target-prefix": [ "2001:db8:6401::1/128", "2001:db8:6401::2/128" ], "target-port-range": [ { "lower-port": 443 } ] } ] } }
GET /restconf/data/ietf-dots-data-channel:dots-data\ /dots-client=dz6pHjaADkaFTbjr0JGBpw\ /aliases?content=all HTTP/1.1 Host: example.com Accept: application/yang-data+json
{ "ietf-dots-data-channel:aliases": { "alias": [ { "name": "Server1", "target-protocol": [ 6 ], "target-prefix": [ "2001:db8:6401::1/128", "2001:db8:6401::2/128" ], "target-port-range": [ { "lower-port": 443 } ], "pending-lifetime": 3596 }, { "name": "Server2", "target-protocol": [ 6 ], "target-prefix": [ "2001:db8:6401::10/128", "2001:db8:6401::20/128" ], "target-port-range": [ { "lower-port": 80 } ], "pending-lifetime": 9869 } ] } }
GET /restconf/data/ietf-dots-data-channel:dots-data\ /dots-client=dz6pHjaADkaFTbjr0JGBpw\ /aliases/alias=Server2?content=all HTTP/1.1 Host: example.com Accept: application/yang-data+json
DELETE /restconf/data/ietf-dots-data-channel:dots-data\ /dots-client=dz6pHjaADkaFTbjr0JGBpw\ /aliases/alias=Server1 HTTP/1.1 Host: example.com
GET /restconf/data/ietf-dots-data-channel:dots-data\ /capabilities HTTP/1.1 Host: example.com Accept: application/yang-data+json
{ "ietf-dots-data-channel:capabilities": { "address-family": ["ipv4", "ipv6"], "forwarding-actions": ["drop", "accept"], "rate-limit": true, "transport-protocols": [1, 6, 17, 58], "ipv4": { "length": true, "protocol": true, "destination-prefix": true, "source-prefix": true, "fragment": true }, "ipv6": { "length": true, "protocol": true, "destination-prefix": true, "source-prefix": true, "fragment": true }, "tcp": { "flags-bitmask": true, "source-port": true, "destination-port": true, "port-range": true }, "udp": { "length": true, "source-port": true, "destination-port": true, "port-range": true }, "icmp": { "type": true, "code": true } } }
POST /restconf/data/ietf-dots-data-channel:dots-data\ /dots-client=dz6pHjaADkaFTbjr0JGBpw HTTP/1.1 Host: example.com Content-Type: application/yang-data+json { "ietf-dots-data-channel:acls": { "acl": [ { "name": "sample-ipv4-acl", "type": "ipv4-acl-type", "activation-type": "activate-when-mitigating", "aces": { "ace": [ { "name": "rule1", "matches": { "ipv4": { "destination-ipv4-network": "198.51.100.0/24", "source-ipv4-network": "192.0.2.0/24" } }, "actions": { "forwarding": "drop" } } ] } } ] } }
PUT /restconf/data/ietf-dots-data-channel:dots-data\ /dots-client=paL8p4Zqo4SLv64TLPXrxA/acls\ /acl=test-acl-ipv6-udp HTTP/1.1 Host: example.com Content-Type: application/yang-data+json { "ietf-dots-data-channel:acls": { "acl": [ { "name": "test-acl-ipv6-udp", "type": "ipv6-acl-type", "activation-type": "immediate", "aces": { "ace": [ { "name": "my-test-ace", "matches": { "ipv6": { "destination-ipv6-network": "2001:db8:6401::2/127", "source-ipv6-network": "2001:db8:1234::/96", "protocol": 17, "flow-label": 10000 }, "udp": { "source-port-range-or-operator": { "operator": "lte", "port": 80 }, "destination-port-range-or-operator": { "operator": "neq", "port": 1010 } } }, "actions": { "forwarding": "accept" } } ] } } ] } }
GET /restconf/data/ietf-dots-data-channel:dots-data\ /dots-client=dz6pHjaADkaFTbjr0JGBpw\ /acls?content=all HTTP/1.1 Host: example.com Accept: application/yang-data+json
{ "ietf-dots-data-channel:acls": { "acl": [ { "name": "test-acl-ipv6-udp", "type": "ipv6-acl-type", "activation-type": "immediate", "pending-lifetime":9080, "aces": { "ace": [ { "name": "my-test-ace", "matches": { "ipv6": { "destination-ipv6-network": "2001:db8:6401::2/127", "source-ipv6-network": "2001:db8:1234::/96", "protocol": 17, "flow-label": 10000 }, "udp": { "source-port-range-or-operator": { "operator": "lte", "port": 80 }, "destination-port-range-or-operator": { "operator": "neq", "port": 1010 } } }, "actions": { "forwarding": "accept" } } ] } } ] } }
GET /restconf/data/ietf-dots-data-channel:dots-data\ /dots-client=paL8p4Zqo4SLv64TLPXrxA/acls\ /acl=test-acl-ipv6-udp?content=config HTTP/1.1 Host: example.com Accept: application/yang-data+json
{ "ietf-dots-data-channel:acls": { "acl": [ { "name": "test-acl-ipv6-udp", "type": "ipv6-acl-type", "activation-type": "immediate", "aces": { "ace": [ { "name": "my-test-ace", "matches": { "ipv6": { "destination-ipv6-network": "2001:db8:6401::2/127", "source-ipv6-network": "2001:db8:1234::/96", "protocol": 17, "flow-label": 10000 }, "udp": { "source-port-range-or-operator": { "operator": "lte", "port": 80 }, "destination-port-range-or-operator": { "operator": "neq", "port": 1010 } } }, "actions": { "forwarding": "accept" } } ] } } ] } }
GET /restconf/data/ietf-dots-data-channel:dots-data\ /dots-client=paL8p4Zqo4SLv64TLPXrxA/acls\ /acl=test-acl-ipv6-udp?content=non-config HTTP/1.1 Host: example.com Accept: application/yang-data+json
{ "ietf-dots-data-channel:acls": { "acl": [ { "name": "test-acl-ipv6-udp", "pending-lifetime": 8000, "aces": { "ace": [ { "name": "my-test-ace" } ] } } ] } }
DELETE /restconf/data/ietf-dots-data-channel:dots-data\ /dots-client=dz6pHjaADkaFTbjr0JGBpw/acls\ /acl=sample-ipv4-acl HTTP/1.1 Host: example.com
HTTP/1.1 204 No Content Server: Apache Date: Fri, 27 Jul 2018 10:05:15 GMT Cache-Control: no-cache Content-Type: application/yang-data+json Content-Length: 0 Connection: Keep-Alive
POST /restconf/data/ietf-dots-data-channel:dots-data\ /dots-client=dz6pHjaADkaFTbjr0JGBpw HTTP/1.1 Host: example.com Content-Type: application/yang-data+json { "ietf-dots-data-channel:acls": { "acl": [ { "name": "dns-fragments", "type": "ipv4-acl-type", "aces": { "ace": [ { "name": "drop-all-fragments", "matches": { "ipv4": { "fragment": { "operator": "match", "type": "isf" } } }, "actions": { "forwarding": "drop" } }, { "name": "allow-dns-packets", "matches": { "ipv4": { "destination-ipv4-network": "198.51.100.0/24" }, "udp": { "destination-port-range-or-operator": { "operator": "eq", "port": 53 } }, "actions": { "forwarding": "accept" } } } ] } } ] } }
POST /restconf/data/ietf-dots-data-channel:dots-data\ /dots-client=dz6pHjaADkaFTbjr0JGBpw HTTP/1.1 Host: example.com Content-Type: application/yang-data+json { "ietf-dots-data-channel:acls": { "acl": [ { "name": "dns-fragments", "type": "ipv6-acl-type", "aces": { "ace": [ { "name": "drop-all-fragments", "matches": { "ipv6": { "fragment": { "operator": "match", "type": "isf" } } }, "actions": { "forwarding": "drop" } }, { "name": "allow-dns-packets", "matches": { "ipv6": { "destination-ipv6-network": "2001:db8::/32" }, "udp": { "destination-port-range-or-operator": { "operator": "eq", "port": 53 } } }, "actions": { "forwarding": "accept" } } ] } } ] } }
PUT /restconf/data/ietf-dots-data-channel:dots-data\ /dots-client=paL8p4Zqo4SLv64TLPXrxA/acls\ /acl=tcp-flags-example HTTP/1.1 Host: example.com Content-Type: application/yang-data+json { "ietf-dots-data-channel:acls": { "acl": [{ "name": "tcp-flags-example", "activation-type": "immediate", "aces": { "ace": [{ "name": "null-attack", "matches": { "tcp": { "flags-bitmask": { "operator": "not any", "bitmask": 4095 } } }, "actions": { "forwarding": "drop" } }] } }] } }
PUT /restconf/data/ietf-dots-data-channel:dots-data\ /dots-client=paL8p4Zqo4SLv64TLPXrxA/acls\ /acl=tcp-flags-example HTTP/1.1 Host: example.com Content-Type: application/yang-data+json { "ietf-dots-data-channel:acls": { "acl": [{ "name": "tcp-flags-example", "activation-type": "activate-when-mitigating", "aces": { "ace": [{ "name": "rate-limit-syn", "matches": { "tcp": { "flags-bitmask": { "operator": "match", "bitmask": 2 } } }, "actions": { "forwarding": "accept", "rate-limit": "20.00" } }] } }] } }
PUT /restconf/data/ietf-dots-data-channel:dots-data\ /dots-client=paL8p4Zqo4SLv64TLPXrxA/acls\ /acl=tcp-flags-example HTTP/1.1 Host: example.com Content-Type: application/yang-data+json { "ietf-dots-data-channel:acls": { "acl": [{ "name": "tcp-flags-example", "type": "ipv4-acl-type", "activation-type": "activate-when-mitigating", "aces": { "ace": [{ "name": "rate-limit-ack", "matches": { "tcp": { "flags-bitmask": { "operator": "match", "bitmask": 16 } } }, "actions": { "forwarding": "accept", "rate-limit": "20.00" } }] } }] } }