Section 7.11 of
RFC 5440 describes the encoding of the Local Protection Desired (L) flag. The Protection Enforcement (E) flag, which extends the L flag, is specified below.
Bit |
Description |
Reference |
6 |
Protection Enforcement |
RFC 9488 |
7 |
Local Protection Desired |
RFC 5440 |
Table 1: Codespace of the Flag Field (LSPA Object)
The following shows the format of the LSPA object as defined in [
RFC 5440] with the addition of the E flag defined in this document:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Exclude-any |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Include-any |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Include-all |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Setup Prio | Holding Prio | Flags |E|L| Reserved |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
// Optional TLVs //
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
-
Flags (8 bits):
-
-
L (Local Protection Desired):
-
This flag is defined in [RFC 5440]and further updated by this document. When set to 1, protection isdesired. When set to 0, protection is not desired. The enforcement of theprotection is identified via the E flag.
-
E (Protection Enforcement):
-
This flag controls the strictnesswith which the PCE must apply the L flag. When set to 1, the value of the Lflag needs to be respected during resource selection by the PCE. When the E flagis set to 0, an attempt to respect the value of the L flag is made; however,the PCE could relax or ignore the L flag when computing a path. Thestatements below indicate preference when the E flag is set to 0 incombination with the L flag value.
When both the L flag and E flag are set to 1, then the PCE
MUST consider the protection eligibility as a PROTECTION MANDATORY constraint.
When the L flag is set to 1 and the E flag is set to 0, then the PCE
MUST consider the protection eligibility as a PROTECTION PREFERRED constraint.
When both the L flag and E flag are set to 0, then the PCE
SHOULD consider the protection eligibility as an UNPROTECTED PREFERRED constraint but
MAY consider the protection eligibility as an UNPROTECTED MANDATORY constraint. An example of when the latter behavior might be chosen is if the PCE has some means (outside the scope of this document) to detect that it is interacting with a legacy PCC that expects the legacy behavior.
When the L flag is set to 0 and the E flag is set to 1, then the PCE
MUST consider the protection eligibility as an UNPROTECTED MANDATORY constraint.
If a PCE is unable to infer the protection status of a resource, the PCE
MAY use local policy to define protected status assumptions. When computing a Segment Routing path, it is
RECOMMENDED that a PCE assume a Node SID is protected. It is also
RECOMMENDED that a PCE assume an Adjacency SID is protected if the backup flag advertised with the Adjacency SID is set.
This section outlines considerations for the E flag bit in the message passing between the PCC and the PCE that are not supported by the entity. The requirements for the PCE and the PCC implementing this document are described at the end.
For a PCC or PCE that does not yet support this document, the E flag is ignored and set to 0 in PCRpt and/or PCUpd messages as per [
RFC 5440] for PCC-initiated LSPs or as per [
RFC 8281] for PCE-initiated LSPs. It is important to note that [
RFC 8231] and [
RFC 8281] permit the LSPA object [
RFC 5440] to be included in PCUpd messages for PCC-initiated and PCE-initiated LSPs.
For PCC-initiated LSPs, the E flag (and L flag) in a PCUpd message is an echo from the previous PCRpt message; however, the bit value is ignored on the PCE from the previous PCRpt message, so the E flag value set in the PCUpd message is 0. A PCE that does not support this document sends PCUpd messages with the E flag set to 0 for PCC-initiated LSPs even if set to 1 in the prior PCReq or PCRpt message.
A PCC that does not support this document sends PCRpt messages with the E flag set to 0 for PCE-initiated LSPs even if set to 1 in the prior PCInitiate or PCUpd message.
For a PCC that does support this document, the E flag
MAY be set to 1 depending on local configuration. If communicating with a PCE that does not yet support this document, the PCE follows the behavior specified in [
RFC 5440] and ignores the E flag. Thus, a computed path might not respect the enforcement constraint.
For PCC-initiated LSPs, the PCC
SHOULD ignore the E flag value received from the PCE in a PCUpd message as it may be communicating with a PCE that does not support this document.
For PCE-initiated LSPs, the PCC
MAY process the E flag value received from the PCE in a PCUpd message. The PCE
SHOULD ignore the E flag value received from the PCC in a PCRpt message as it may be communicating with a PCC that does not support this document.