<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc comments="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-teas-yang-te-42" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="TE YANG Data Model">A YANG Data Model for Traffic Engineering Tunnels, Label Switched Paths, and Interfaces</title>

    <author initials="T." surname="Saad" fullname="Tarek Saad">
      <organization>Cisco Systems Inc</organization>
      <address>
        <email>tsaad.net@gmail.com</email>
      </address>
    </author>
    <author initials="R." surname="Gandhi" fullname="Rakesh Gandhi">
      <organization>Cisco Systems Inc</organization>
      <address>
        <email>rgandhi@cisco.com</email>
      </address>
    </author>
    <author initials="X." surname="Liu" fullname="Xufeng Liu">
      <organization>Alef Edge</organization>
      <address>
        <email>xufeng.liu.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="V. P." surname="Beeram" fullname="Vishnu Pavan Beeram">
      <organization>Juniper Networks</organization>
      <address>
        <email>vbeeram@juniper.net</email>
      </address>
    </author>
    <author initials="I." surname="Bryskin" fullname="Igor Bryskin">
      <organization>Individual</organization>
      <address>
        <email>i_bryskin@yahoo.com</email>
      </address>
    </author>

    <date year="2026" month="February" day="24"/>

    
    <workgroup>TEAS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 56?>

<t>This document defines a YANG data model for the provisioning and management of
Traffic Engineering (TE) tunnels, Label Switched Paths (LSPs), and interfaces.
The model covers data that is independent of any technology or dataplane encapsulation
and is divided into two YANG modules that cover device-specific, and device independent
data.</t>

<t>This model covers data for configuration, operational state, remote procedural
calls, and event notifications.</t>



    </abstract>



  </front>

  <middle>


<?line 67?>

<section anchor="introduction"><name>Introduction</name>

<t>This document defines a YANG data model intended for the provisioning and management
of point-to-point Traffic Engineering (TE) tunnels, Label Switched Paths (LSPs),
and interfaces. The modeling of point-to-multipoint TE Tunnels <xref target="RFC4875"/>
and Segment-Routing (SR) Policies <xref target="RFC9256"/> falls outside the scope of this
document.</t>

<t>The data model described herein is divided into two YANG modules. The 'ietf-te'
module contains generic, device-independent data, and the 'ietf-te-device'
module addresses device-specific data.</t>

<t>This document outlines the high-level relationships between the YANG modules it
defines and other external protocol YANG modules. The TE YANG data
model intentionally excludes data specific to any signaling protocol, 
such as RSVP-TE (<xref target="RFC3209"/>, <xref target="RFC3473"/>), or Segment-Routing TE (SR-TE) 
<xref target="RFC9256"/> with the
expectation that such technology models will be defined in separate documents
and will augment the generic TE model as needed.</t>

</section>
<section anchor="terms-and-conventions"><name>Terms and Conventions</name>

<section anchor="terminology"><name>Terminology</name>

<t>The following terms are defined in <xref target="RFC6241"/> and are used in this specification:</t>

<t><list style="symbols">
  <t>client</t>
  <t>configuration data</t>
  <t>state data</t>
</list></t>

<t>This document also makes use of the following terminology introduced in the
YANG Data Modeling Language <xref target="RFC7950"/>:</t>

<t><list style="symbols">
  <t>augment</t>
  <t>data model</t>
  <t>data node</t>
</list></t>

</section>
<section anchor="prefixes-in-data-node-names"><name>Prefixes in Data Node Names</name>

<t>In this document, names of data nodes and other data model objects are prefixed
using the standard prefix associated with the corresponding YANG imported
modules, as shown in <xref target="tab1"/>.</t>

<texttable title="Prefixes and corresponding YANG modules" anchor="tab1">
      <ttcol align='left'>Prefix</ttcol>
      <ttcol align='left'>YANG module</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>yang</c>
      <c>ietf-yang-types</c>
      <c><xref target="RFC9911"/></c>
      <c>inet</c>
      <c>ietf-inet-types</c>
      <c><xref target="RFC9911"/></c>
      <c>rt-types</c>
      <c>ietf-routing-types</c>
      <c><xref target="RFC8294"/></c>
      <c>te-types</c>
      <c>ietf-te-types</c>
      <c><xref target="I-D.draft-ietf-teas-rfc8776-update"/></c>
      <c>te-packet-types</c>
      <c>ietf-te-packet-types</c>
      <c><xref target="I-D.draft-ietf-teas-rfc8776-update"/></c>
      <c>te</c>
      <c>ietf-te</c>
      <c>this document</c>
      <c>te-dev</c>
      <c>ietf-te-device</c>
      <c>this document</c>
</texttable>

</section>
<section anchor="model-tree-diagrams"><name>Model Tree Diagrams</name>

<t>The tree diagrams extracted from the modules defined in this document are given in
subsequent sections as per the syntax defined in <xref target="RFC8340"/>.</t>

</section>
</section>
<section anchor="design-considerations"><name>Design Considerations</name>

<t>This document describes a generic TE YANG data model that is independent of
any dataplane technology.  One of the design objectives is to allow specific
data plane technology models to reuse the TE generic data model and possibly
augment it with technology-specific data.</t>

<t>The elements of the generic TE YANG data model, including TE Tunnels, LSPs, and
interfaces have leafs that identify the technology layer where they reside.
For example, the LSP encoding type can identify the technology associated with a
TE Tunnel or LSP.</t>

<t>Also, the generic TE YANG data model does not cover signaling protocol data.
The signaling protocols used to instantiate TE LSPs are outside the scope of this
document and expected to be covered by augmentations defined in other documents.</t>

<t>The following other design considerations are taken into account with respect to data
organization:</t>

<t><list style="symbols">
  <t>The device independent TE data is defined in the 'ietf-te' module, and
can be used to manage data off a device, such as a TE controller. When the
model is used to manage a specific device, the model contains the TE Tunnels
originating from the specific device.  When the model is used to manage a TE
controller, the 'tunnel' list contains all TE Tunnels and TE tunnel segments
originating from devices that the TE controller manages.</t>
  <t>The device-specific TE data is defined in the 'ietf-te-device' module.</t>
  <t>Minimal elements in the model are designated as "mandatory" to
allow freedom to vendors to adapt the data model to their specific product
implementation.</t>
  <t>Suitable defaults are specified for all configurable elements.</t>
  <t>Where TE functions or features might be optional within the
deployed TE network, the model declares them as optional.</t>
</list></t>

</section>
<section anchor="model-overview"><name>Model Overview</name>

<t>The data model defined in this document cover the core TE features that are
commonly supported by different vendor implementations. The support of extended
or vendor specific TE features is expected to either be in augmentations, or
deviations to this model that are defined in separate documents.</t>

<section anchor="module-relationship"><name>Module Relationship</name>

<t>The generic TE YANG data model, defined in the 'ietf-te' YANG module, provides
device-independent building blocks that are agnostic of specific technologies
or control plane instances. The TE device YANG data model, defined in the
'ietf-te-device' YANG module, augments the 'ietf-te' YANG module as illustrated in
<xref target="figctrl"/> by including device-specific data such as TE interface attributes and
local TE node timers.</t>

<t>The TE data models for specific instances of data plane technology and
signaling protocols are outside the scope of this document.  They could be
defined in separate YANG modules that augment the generic TE YANG data model.</t>

<figure title="Relationship of TE modules with signaling protocol modules" anchor="figctrl"><artwork><![CDATA[
     TE generic     +---------+
     module         | ietf-te |o-------------+
                    +---------+               \
                        o  o                   \
                        |   \                   \
                        |    \ TE device module  \
                        |     +----------------+  \
                        |     | ietf-te-device |   \
                        |     +----------------+    \
                        |        o                   \
                        |        |                    \
                        |        |                     \
                    +---------------+          +---------------+
     RSVP-TE module | ietf-rsvp-te^ |o         | ietf-te-mpls^ |
                    +---------------+ \        +---------------+
                        |              \
                        |               \
                        |                \
                        |                 \
                        |                  \
                        o                +-------------------+
                    +------------+       | ietf-rsvp-otn-te^ |
     RSVP module    | ietf-rsvp^ |       +-------------------+
                    +------------+         RSVP-TE with OTN
                                              extensions

                   X---oY indicates that module X augments module Y
                   ^ indicates a module defined in other documents

]]></artwork></figure>

</section>
</section>
<section anchor="te-yang-model"><name>TE YANG Model</name>

<t>The generic TE YANG data model defined in the 'ietf-te' module supports the management and
operation of a TE network. This includes creating, modifying, and retrieving
information about TE Tunnels, LSPs, and interfaces and their associated
attributes (e.g.  Administrative-Groups (AGs), Shared Risk Link Groups (SRLGs), etc.).</t>

<t>A full tree diagram of the TE YANG data model is shown in <xref target="AppendixB"/>.</t>

<section anchor="relationship-between-te-tunnel-lsp-and-path"><name>Relationship Between TE Tunnel, LSP, and Path</name>

<t>The TE YANG model is built around several core constructs: TE tunnel, TE path,
and LSP. These concepts are central to the model's structure and functionality.</t>

<t>TE Tunnel:</t>

<ul empty="true"><li>
  <t>In this context, a TE tunnel represents a logical construct that
defines an engineered connectivity service between two endpoints in the
network, typically an ingress (source) and an egress (destination). A tunnel is
characterized by its attributes (such as name, encoding, and constraints) and
serves as the container for the forwarding resources used to realize the
desired connectivity.</t>
</li></ul>

<t>TE Path:</t>

<ul empty="true"><li>
  <t>A path refers to a specific sequence of nodes and links through the
network that traffic will follow to traverse the TE tunnel from source to
destination. A TE tunnel may have one or more associated TE paths, such as a primary
TE path (the preferred path) and secondary TE paths (used for protection or
restoration). Each path specifies the constraints, preferences, and
optimization criteria that guide its computation and selection.</t>
</li></ul>

<t>LSP:</t>

<ul empty="true"><li>
  <t>An LSP is an actual, instantiated connection in the
data plane that follows a computed TE path through the network. It is the result
of signaling protocols (such as RSVP-TE or Segment Routing) setting up
forwarding state along the TE path, enabling the tunnel to carry traffic.</t>
</li></ul>

<t>The relationship among these concepts is as follows:</t>

<t>A TE tunnel is the high-level logical object that defines the desired
connectivity and its properties.  Each TE tunnel can have one or more TE paths,
which define candidate or active routes through the network that may be used to
realize the tunnel's connectivity, subject to certain constraints and
preferences.  For each TE path selected for use, one or more LSPs are instantiated
in the network to realize the forwarding state necessary to carry traffic along
the specified TE path.</t>

<t>In summary, a TE tunnel defines the service, a TE path defines how to achieve the
service, and an LSP is the instantiated mechanism that actually provides the
service in the forwarding plane.</t>

</section>
<section anchor="module-structure"><name>Module Structure</name>

<t>The 'te' container is the top level container in the 'ietf-te' module. The
presence of the 'te' container enables TE function system-wide.  Further
descriptions of containers that exist under the 'te' top level container are
provided in the following sections.</t>

<t>The three containers grouped under the 'te'
container are shown in <xref target="fig-highlevel"/> and described below.</t>

<t>globals:</t>

<ul empty="true"><li>
  <t>The 'globals' container maintains the set of global TE attributes that can be
applicable to TE Tunnels and interfaces. Refer to <xref target="TeGlobals"/> for further details.</t>
</li></ul>

<t>tunnels:</t>

<ul empty="true"><li>
  <t>The 'tunnels' container includes the list of TE Tunnels that are instantiated.
Refer to <xref target="TE_TUNNELS"/> for further details on the properties of a TE Tunnel.</t>
</li></ul>

<t>lsps:</t>

<ul empty="true"><li>
  <t>The 'lsps' container includes the list of TE LSPs that are instantiated for
TE Tunnels. Refer to <xref target="TE_LSPS"/> for further details on the properties of a TE LSP.</t>
</li></ul>

<t>The model also contains two Remote Procedure Calls (RPCs) as shown
in <xref target="AppendixB"/> and described below.</t>

<t>tunnels-path-compute:</t>

<ul empty="true"><li>
  <t>An RPC to request path computation for a specific TE Tunnel.
The RPC allows requesting path computation using atomic and stateless operation.
A tunnel may also be configured in 'compute-only' mode to provide stateful path updates
- see <xref target="TE_TUNNELS"/> for further details.</t>
</li></ul>

<t>tunnels-action:</t>

<ul empty="true"><li>
  <t>An RPC to request a specific action (e.g. reoptimize, or tear-and-setup) to be taken
on a specific tunnel or all tunnels.</t>
</li></ul>

<figure title="TE Tunnel model high-level YANG tree view" anchor="fig-highlevel"><artwork><![CDATA[
module: ietf-te
  +--rw te!
     +--rw globals
     |     ...
     +--rw tunnels
     |     ...
     +--ro lsps
           ...

  rpcs:
    +---x tunnels-path-compute
    |  +---w input
    |  |     ...
    |  +--ro output
    |        ...
    +---x tunnels-actions
       +---w input
       |     ...
       +--ro output
             ...

]]></artwork></figure>

<section anchor="TeGlobals"><name>TE Globals</name>

<t>The 'globals' container covers properties that control a TE feature's
behavior system-wide, and its respective state as shown in <xref target="fig-globals"/>
and described in the text that follows.</t>

<figure title="TE globals YANG subtree high-level structure" anchor="fig-globals"><artwork><![CDATA[
     +--rw globals
     |  +--rw named-admin-groups
     |  |  +--rw named-admin-group* [name]
     |  |        ...
     |  +--rw named-srlgs
     |  |  +--rw named-srlg* [name]
     |  |        ...
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
]]></artwork></figure>

<t>named-admin-groups:</t>

<ul empty="true"><li>
  <t>A YANG container for the list of named (extended) administrative groups that may be applied
to TE links.</t>
</li></ul>

<t>named-srlgs:</t>

<ul empty="true"><li>
  <t>A YANG container for the list of named SRLGs that may be
applied to TE links.</t>
</li></ul>

<t>named-path-constraints:</t>

<ul empty="true"><li>
  <t>A YANG container for a list of named path constraints. Each named path constraint is
composed of a set of constraints that can be applied during path computation.
A named path constraint can be applied to multiple TE Tunnels. Path constraints may also
be specified directly under the TE Tunnel. The path constraints specified under
the TE Tunnel take precedence over the path constraints 
derived from the referenced named path constraint. A named path constraint entry can be
formed of the path constraints shown in <xref target="fig-named-constraints"/>:</t>
</li></ul>

<figure title="Named path constraints YANG subtree" anchor="fig-named-constraints"><artwork><![CDATA[
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
     |             {te-types:named-path-constraints}?
     |        +--rw name                             string
     |        +--rw te-bandwidth
     |        |     ...
     |        +--rw link-protection?                 identityref
     |        +--rw setup-priority?                  uint8
     |        +--rw hold-priority?                   uint8
     |        +--rw signaling-type?                  identityref
     |        +--rw path-metric-bounds
     |        |     ...
     |        +--rw path-affinities-values
     |        |     ...
     |        +--rw path-affinity-names
     |        |     ...
     |        +--rw path-srlgs-lists
     |        |     ...
     |        +--rw path-srlgs-names
     |        |     ...
     |        +--rw disjointness?
     |        |       te-path-disjointness
     |        +--rw explicit-route-objects
     |        |     ...
     |        +--rw path-in-segment!
     |        |     ...
     |        +--rw path-out-segment!
     |              ...

]]></artwork></figure>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>name: A YANG leaf that holds the named path constraint entry. This is unique in the list and used as a key.</t>
    <t>te-bandwidth: A YANG container that holds the technology-agnostic TE bandwidth constraint.</t>
    <t>link-protection: A YANG leaf that holds the link protection type constraint required for the links to be included in the computed path.</t>
    <t>setup/hold priority: YANG leafs that hold the LSP setup and hold admission priority as defined in <xref target="RFC3209"/>.</t>
    <t>signaling-type: A YANG leaf that holds the LSP setup type, such as RSVP-TE or SR.</t>
    <t>path-metric-bounds: A YANG container that holds the set of metric bounds applicable on the
computed TE tunnel path.</t>
    <t>path-affinities-values: A YANG container that holds the set of affinity values and
mask to be used during path computation.</t>
    <t>path-affinity-names: A YANG container that holds the set of named affinity constraints and
corresponding inclusion or exclusion instructions for each to be used during path computation.</t>
    <t>path-srlgs-lists: A YANG container that holds the set of SRLG values and
corresponding inclusion or exclusion instructions to be used during path computation.</t>
    <t>path-srlgs-names: A YANG container that holds the set of named SRLG constraints and
corresponding inclusion or exclusion instructions for each to be used during path computation.</t>
    <t>disjointness: The level of resource disjointness constraint that the secondary path
of a TE tunnel has to adhere to.</t>
    <t>explicit-route-objects: A YANG container that holds path constraints in the form of route entries present in the following two lists:
    <list style="symbols">
        <t>'route-object-exclude-always': a list of route entries that are always excluded from the path computation. The exclusion of a route entry in this list during path computation is not order sensitive. The route entries in this list have a 'strict' hop-type as described in <xref target="RFC4874"/> section 3.1.</t>
        <t>'route-object-include-exclude': a list of route entries to include or exclude for the path computation. For route entries in this list that are to be excluded, the hop-type is only allowed to be 'strict' as described in <xref target="RFC4874"/> section 3.1.<br />
The constraint type (include or exclude) is specified with each route entry. The path computation considers route entry constraints in the order they appear in this list. Once a route entry constraint is consumed from this list, it is not considered any further in the computation of the TE path.<br />
The 'route-object-include-exclude' is used to configure constraints on which route objects (e.g., nodes, links) are included or excluded in the path computation.<br />
The interpretation of an empty 'route-object-include-exclude' list depends on the TE Tunnel (end-to-end or Tunnel Segment) and on the specific path, according to the following rules:<br />
        <list style="numbers" type="1">
            <t>An empty 'route-object-include-exclude' list for the primary path of an end-to-end TE Tunnel indicates that there are no route objects to be included or excluded in the path computation.</t>
            <t>An empty 'route-object-include-exclude' list for the primary path of a TE Tunnel Segment indicates that no primary LSP is required for that TE Tunnel Segment.</t>
            <t>An empty 'route-object-include-exclude' list for a reverse path means it always follows the forward path (i.e., the TE Tunnel is co-routed). When the 'route-object-include-exclude' list is not empty, the reverse path is routed independently of the forward path.</t>
            <t>An empty 'route-object-include-exclude' list for the secondary (forward) path of a TE Tunnel segment indicates that the secondary path has the same endpoints as the primary path.</t>
          </list></t>
      </list></t>
    <t>path-in-segment: A YANG container that contains a list of label restrictions
that have to be taken into consideration when stitching to another tunnel
segment such as at a domain boundary.  The TE tunnel segment in this case
is being stitched to the upstream TE tunnel segment.</t>
    <t>path-out-segment: A YANG container that contains a list of label restrictions
that have to be taken into consideration when stitching to another tunnel
segment such as at a domain boundary.  The TE tunnel segment in this case
is being stitched to the downstream TE tunnel segment.</t>
  </list></t>
</li></ul>

</section>
<section anchor="TE_TUNNELS"><name>TE Tunnels</name>

<t>The 'tunnels' container holds the list of TE Tunnels that are provisioned on
ingress router devices in the network as shown in <xref target="fig-te-tunnel"/>.</t>

<figure title="TE Tunnel YANG subtree structure" anchor="fig-te-tunnel"><artwork><![CDATA[
module: ietf-te
  +--rw te
     +--rw tunnels
        +--rw tunnel* [name]
           +--rw name                            string
           +--rw alias?                          string
           +--rw identifier?                     uint32
           +--rw color?                          uint32
           +--rw description?                    string
           +--rw admin-state?                    identityref
           +--ro operational-state?              identityref
           +--rw encoding?                       identityref
           +--rw switching-type?                 identityref
           +--rw source
           |     ...
           +--rw destination
           |     ...
           +--rw bidirectional?                  boolean
           +--rw controller
           |     ...
           +--rw reoptimize-timer?               uint16
           +--rw association-objects
           |     ...
           +--rw protection
           |     ...
           +--rw restoration
           |     ...
           +--rw network-id?                     nw:network-id
           +--rw te-topology-identifier
           |     ...
           +--rw te-bandwidth
           |     ...
           +--rw link-protection?                identityref
           +--rw setup-priority?                 uint8
           +--rw hold-priority?                  uint8
           +--rw signaling-type?                 identityref
           +--rw hierarchy
           |     ...
           +--rw primary-paths
           |     ...
           +--rw secondary-paths
           |     ...
           +--rw secondary-reverse-paths
           |     ...
           +---x tunnel-action
           |     ...
           +---x protection-external-commands
                 ...

]]></artwork></figure>

<t>When the model is used to manage a specific device, the 'tunnel' list contains
the TE Tunnels originating from the specific device. When the model is used to
manage a TE controller, the 'tunnel' list contains all TE Tunnels and TE
tunnel segments originating from devices that the TE controller manages.</t>

<t>The TE Tunnel model allows the configuration and management of the following TE
tunnel objects:</t>

<t>TE Tunnel:</t>

<ul empty="true"><li>
  <t>A YANG container of one or more TE LSPs established between the source and destination
TE Tunnel termination points.</t>
</li></ul>

<t>TE Path:</t>

<ul empty="true"><li>
  <t>An engineered path that once instantiated in the forwarding plane can be used
to forward traffic from the source to the destination TE Tunnel termination points.</t>
</li></ul>

<t>TE LSP:</t>

<ul empty="true"><li>
  <t>A TE LSP is a connection-oriented service established over a TE Path
and that allows the delivery of traffic between the TE Tunnel source and
destination termination points.</t>
</li></ul>

<t>TE Tunnel Segment:</t>

<ul empty="true"><li>
  <t>A segment of a TE Tunnel that is stitched with other segments in order to provision an end-to-end tunnel.</t>
</li></ul>

<t>The TE Tunnel has a number of attributes that are set directly under the
tunnel (as shown in <xref target="fig-te-tunnel"/>). The main attributes of a TE Tunnel are described below:</t>

<t>name:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the name of a TE Tunnel.  The name of the
TE Tunnel uniquely identifies the tunnel within the TE tunnel list.  The name
of the TE Tunnel can be formatted as a Uniform Resource Indicator (URI) by
including the namespace to ensure uniqueness of the name among all the TE
Tunnels present on devices and controllers. The configured TE Tunnels can
be reported with the name of the device embedded within the TE Tunnel name.
For TE Tunnels initiated by the controller, the controller is responsible
to ensure that TE Tunnel names are unique.</t>
</li></ul>

<t>alias:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds an alternate name to the TE tunnel. Unlike the TE tunnel
name, the alias can be modified at any time during the lifetime of the TE tunnel.</t>
</li></ul>

<t>identifier:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds an identifier of the tunnel. This identifier is unique among tunnels
originated from the same ingress device.</t>
</li></ul>

<t>color:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the color associated with the TE tunnel. The color is used
to map or steer services that carry matching color onto the TE tunnel as described in
<xref target="RFC9012"/>.</t>
</li></ul>

<t>admin-state:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the tunnel administrative state.</t>
</li></ul>

<t>operational-state:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the tunnel operational state.</t>
</li></ul>

<t>encoding/switching:</t>

<ul empty="true"><li>
  <t>The 'encoding' and 'switching-type' are YANG leafs that define the specific
technology in which the tunnel operates in as described in <xref target="RFC3945"/>.</t>
</li></ul>

<t>source/destination:</t>

<ul empty="true"><li>
  <t>YANG containers that hold the tunnel source and destination node endpoint identities, including:</t>
</li></ul>

<ul empty="true"><li>
  <t><list style="symbols">
    <t>te-node-id:  A YANG leaf that holds the TE node identifier (as defined in <xref target="I-D.draft-ietf-teas-rfc8776-update"/>) of the source
 or destination of the TE Tunnel.</t>
    <t>node-id: A YANG leaf that holds the node identifier (as defined in <xref target="RFC8345"/>) of the source or
 destination of the TE Tunnel.</t>
    <t>tunnel-tp-id: A YANG leaf that holds the identifier of the source or destination of the TE Tunnel
Termination Points (TTPs) as defined in <xref target="RFC8795"/>. The TTP identifiers are optional
on nodes that have a single TTP per node. For example, TTP identifiers are optional for packet
(IP/MPLS) routers.</t>
  </list></t>
</li></ul>

<t>bidirectional:</t>

<ul empty="true"><li>
  <t>A YANG leaf that when present indicates the LSP of a TE Tunnel is bidirectional
as defined in <xref target="rfc3473"/>.</t>
</li></ul>

<t>controller:</t>

<ul empty="true"><li>
  <t>A YANG container that holds tunnel data relevant to an optional external TE controller that
may initiate or control a tunnel. This target node may be augmented by external modules, for example, to add data for Path Computation Element Protocol (PCEP) initiated and/or
delegated tunnels.</t>
</li></ul>

<t>reoptimize-timer:</t>

<ul empty="true"><li>
  <t>A YANG leaf to set the interval period for tunnel reoptimization.</t>
</li></ul>

<t>association-objects:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the set of associations of the TE Tunnel to other
TE Tunnels. Associations at the TE Tunnel level apply to all paths of the TE
Tunnel. The TE tunnel associations can be overridden by associations
configured directly under the TE Tunnel path.</t>
</li></ul>

<t>protection:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the TE Tunnel protection properties.</t>
</li></ul>

<t>restoration:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the TE Tunnel restoration properties.</t>
</li></ul>

<t>te-topology-identifier:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the topology identifier associated with the topology where paths for the TE tunnel are computed as defined in <xref target="RFC8795"/>.</t>
</li></ul>

<t>network-id:</t>

<ul empty="true"><li>
  <t>A YANG leaf that can optionally be used to identify the network topology where paths for the TE tunnel are computed as defined in <xref target="RFC8345"/>.</t>
</li></ul>

<t>hierarchy:</t>

<ul empty="true"><li>
  <t>A YANG container that holds hierarchy related properties of the TE Tunnel. A TE LSP
  can be set up in MPLS or Generalized MPLS (GMPLS) networks to be used as
  a TE link to carry traffic in other (client) networks <xref target="RFC6107"/>.  In this
  case, the model introduces the TE Tunnel hierarchical link endpoint parameters
  to identify the specific link in the client layer that the underlying TE Tunnel is
  associated with. The hierarchy container includes the following:</t>
</li></ul>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>dependency-tunnels: A hierarchical set of TE Tunnels either provisioned or
to be provisioned in the immediate lower layer, upon which the
current TE Tunnel relies for multi-layer path computation. A dependency TE
Tunnel is provisioned if it has been selected by path computation to support
at least one client-layer TE Tunnel. When a dependency TE Tunnel is
provisioned, it makes the TE link operational in the client layer's network
topology, enabling the provisioning of TE Tunnels in the client layer.</t>
  </list></t>
</li></ul>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>hierarchical-link: A YANG container that holds the identity of the
hierarchical link (in the client layer) that is supported by this TE Tunnel.
The endpoints of the hierarchical link are defined by TE tunnel source and
destination node endpoints. The hierarchical link can be identified by its source
and destination link termination point identifiers.</t>
  </list></t>
</li></ul>

<t>primary-paths:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the list of primary paths.
A primary path is identified by 'name'. A primary path is selected from the list
to instantiate a primary forwarding LSP for the tunnel.  The list of primary
paths is visited by order of preference. A primary path has the following
attributes:</t>
</li></ul>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>primary-reverse-path: A YANG container that holds properties of the
primary reverse path. The reverse path is applicable to
bidirectional TE Tunnels.</t>
  </list></t>
</li></ul>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>candidate-secondary-paths: A YANG container that holds a list of candidate
secondary paths which may be used for the primary path to support path
protection. The candidate secondary paths reference paths from the
tunnel secondary paths list.  The preference of the secondary paths is
specified within the list and dictates the order of visiting the secondary
path from the list. The attributes of a secondary path can be defined
separately from the primary path. The attributes of a secondary path will be
inherited from the associated 'active' primary when not explicitly defined
for the secondary path.</t>
  </list></t>
</li></ul>

<ul empty="true"><li>

</li></ul>

<t>secondary-paths:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the set of secondary paths. A secondary path is
 identified by 'name'. A secondary path can be referenced from the TE Tunnel's
'candidate-secondary-path' list.</t>
</li></ul>

<t>secondary-reverse-paths:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the set of secondary reverse paths. A secondary reverse
path is identified by 'name'. A secondary reverse path can be referenced from the
TE Tunnel's 'candidate-secondary-reverse-paths' list. A secondary reverse path is modeled with
the same data attributes as those of the primary path.</t>
</li></ul>

<t>The following set of common path attributes are shared for primary (forward and reverse) and secondary paths:</t>

<t>path-computation-method:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the method used for computing the TE path.</t>
</li></ul>

<t>path-computation-server:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the path computation server properties when the path is
 externally queried.</t>
</li></ul>

<t>compute-only:</t>

<ul empty="true"><li>
  <t>A path of a TE Tunnel is, by default, provisioned so that it can be instantiated
  in the forwarding plane so that it can carry traffic.
  In some cases, a TE path may be configured only for the
  purpose of computing a path and reporting it without the need to instantiate
  the LSP or commit any resources. In such a case, the path is configured in
  'compute-only' mode to distinguish it from the default behavior. A
  'compute-only' path is configured as usual with the associated per-path
  constraints and properties on a device or TE controller. The device or TE
  controller computes the feasible paths subject to configured constraints.
  A client may query the 'compute-only' computed path properties 'on-demand',
  or alternatively, can subscribe to be notified of computed paths and
  whenever the path properties change.</t>
</li></ul>

<t>use-path-computation:</t>

<ul empty="true"><li>
  <t>A YANG leaf that indicates whether or not path computation is to
  be used for a specified path.</t>
</li></ul>

<t>lockdown:</t>

<ul empty="true"><li>
  <t>A YANG leaf that when set indicates the existing path should not
be globally repaired or reoptimized.</t>
</li></ul>

<t>path-scope:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies whether the path is a segment or an end-to-end path.</t>
</li></ul>

<t>preference:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the preference for the path, used to
choose between paths in a list.  The lower the number, the higher the
preference. Paths with the same preference are treated as equal
and other methods are used to choose between them.</t>
</li></ul>

<t>k-requested-paths:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the number of k-shortest paths requested from the path
  computation server, which are returned in order based on their computed optimization
  objective costs.</t>
</li></ul>

<t>association-objects:</t>

<ul empty="true"><li>
  <t>A YANG container that holds a list of tunnel association properties.</t>
</li></ul>

<t>optimizations:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the optimization objectives
  that path computation will use to select a path.</t>
</li></ul>

<t>named-path-constraint:</t>

<ul empty="true"><li>
  <t>A YANG leafref that references an entry from the global list of named path constraints.</t>
</li></ul>

<t>te-bandwidth:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the path bandwidth (see <xref target="I-D.draft-ietf-teas-rfc8776-update"/>).</t>
</li></ul>

<t>link-protection:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the link protection type required for the links to
be included in the computed path (see <xref target="I-D.draft-ietf-teas-rfc8776-update"/>).</t>
</li></ul>

<t>setup/hold-priority:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>signaling-type:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. This value overrides
the provided one in the referenced named-path-constraint.</t>
</li></ul>

<t>path-metric-bounds:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-affinities-values:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-affinity-names:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-srlgs-lists:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-srlgs-names:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>disjointness:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>explicit-route-objects:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-in-segment:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-out-segment:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>computed-paths-properties:</t>

<ul empty="true"><li>
  <t>A YANG container that holds properties for the list of computed paths.</t>
</li></ul>

<t>computed-path-error-infos:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the list of path computation error information. The
TE system populates entries in this list whenever an error is encountered during the computation of the TE path.</t>
</li></ul>

<t>path-compute-info:</t>

<ul empty="true"><li>
  <t>A YANG grouping that contains leafs representing the path attributes that are passed to the TE path computation engine
to be considered during the path computation. This includes:</t>

  <t><list style="symbols">
    <t>path constraints,</t>
    <t>path optimization objectives, and</t>
    <t>path associations</t>
  </list></t>

  <t>Note, unless overridden under a specific path of the TE tunnel, the TE tunnel's primary path constraints, optimization objectives, and associations are inherited by the primary reverse path, secondary path and secondary reverse path.</t>
</li></ul>

<t>lsps:</t>

<ul empty="true"><li>
  <t>A YANG container that holds a list of LSPs that have been instantiated for this specific path.</t>
</li></ul>

<t>In addition to the path common attributes, the primary path has the following
attributes that are not present in the secondary path:</t>

<t><list style="symbols">
  <t>Only the primary path contains the list of 'candidate-secondary-paths' that
can protect the primary path.</t>
  <t>Only the primary path can contain a primary-reverse-path associated with the
primary path (and its associated list of
'candidate-secondary-reverse-path').</t>
</list></t>

<t>lsp-provisioning-error-infos:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the list of LSP provisioning error information. The
TE system populates entries in this list whenever an error is encountered during the LSP provisioning.</t>
</li></ul>

</section>
<section anchor="TE_LSPS"><name>TE LSPs</name>

<t>The 'lsps' container includes the set of TE LSPs that have been instantiated.
A TE LSP is identified by a 3-tuple ('tunnel-name', 'lsp-id', 'node').</t>

<t>When the model is used to manage a specific device, the 'lsps' list contains all TE
LSPs that traverse the device (including ingressing, transiting and egressing the device).</t>

<t>When the model is used to manage a TE controller, the 'lsps' list
contains the TE LSPs on devices managed by the controller that act as ingress, and may optionally include
TE LSPs on devices managed by the controller that act as transit or egress role.</t>

</section>
</section>
<section anchor="tree-diagram"><name>Tree Diagram</name>

<t><xref target="fig-te-tree"/> shows the tree diagram of depth=4 for the generic TE YANG data model defined in
the 'ietf-te' module. The full tree diagram is shown in <xref target="AppendixB"/>.</t>

<figure title="Tree diagram of depth-4 of TE Tunnel YANG data model" anchor="fig-te-tree"><artwork><![CDATA[
module: ietf-te
  +--rw te
     +--rw enable?    boolean
     +--rw globals
     |  +--rw named-admin-groups
     |  |  +--rw named-admin-group* [name]
     |  |          {te-types:extended-admin-groups,
     |  |           te-types:named-extended-admin-groups}?
     |  |        ...
     |  +--rw named-srlgs
     |  |  +--rw named-srlg* [name] {te-types:named-srlg-groups}?
     |  |        ...
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
     |             {te-types:named-path-constraints}?
     |           ...
     +--rw tunnels
     |  +--rw tunnel* [name]
     |     +--rw name                            string
     |     +--rw alias?                          string
     |     +--rw identifier?                     uint32
     |     +--rw color?                          uint32
     |     +--rw description?                    string
     |     +--rw admin-state?                    identityref
     |     +--ro operational-state?              identityref
     |     +--rw encoding?                       identityref
     |     +--rw switching-type?                 identityref
     |     +--rw source
     |     |     ...
     |     +--rw destination
     |     |     ...
     |     +--rw bidirectional?                  boolean
     |     +--rw controller
     |     |     ...
     |     +--rw reoptimize-timer?               uint16
     |     +--rw association-objects
     |     |     ...
     |     +--rw protection
     |     |     ...
     |     +--rw restoration
     |     |     ...
     |     +--rw network-id?                     nw:network-id
     |     +--rw te-topology-identifier
     |     |     ...
     |     +--rw te-bandwidth
     |     |     ...
     |     +--rw link-protection?                identityref
     |     +--rw setup-priority?                 uint8
     |     +--rw hold-priority?                  uint8
     |     +--rw signaling-type?                 identityref
     |     +--rw hierarchy
     |     |     ...
     |     +--rw primary-paths
     |     |     ...
     |     +--rw secondary-paths
     |     |     ...
     |     +--rw secondary-reverse-paths
     |     |     ...
     |     +---x tunnel-action
     |     |     ...
     |     +---x protection-external-commands
     |           ...
     +--ro lsps
        +--ro lsp* [tunnel-name lsp-id node]
           +--ro tunnel-name                         string
           +--ro lsp-id                              uint16
           +--ro node
           |       te-types:te-node-id
           +--ro source?
           |       te-types:te-node-id
           +--ro destination?
           |       te-types:te-node-id
           +--ro tunnel-id?                          uint16
           +--ro extended-tunnel-id?
           |       yang:dotted-quad
           +--ro operational-state?                  identityref
           +--ro signaling-type?                     identityref
           +--ro origin-type?                        enumeration
           +--ro lsp-resource-status?                enumeration
           +--ro lockout-of-normal?                  boolean
           +--ro freeze?                             boolean
           +--ro lsp-protection-role?                enumeration
           +--ro lsp-protection-state?               identityref
           +--ro ingress-node-id?
           |       te-types:te-node-id
           +--ro egress-node-id?
           |       te-types:te-node-id
           +--ro lsp-actual-route-information
                 ...

  rpcs:
    +---x tunnels-path-compute
    |  +---w input
    |  |  +---w path-compute-info
    |  +--ro output
    |     +--ro path-compute-result
    +---x tunnels-actions
       +---w input
       |  +---w tunnel-info
       |  |  +---w (filter-type)
       |  |        ...
       |  +---w action-info
       |     +---w action?       identityref
       |     +---w disruptive?   empty
       +--ro output
          +--ro action-result?   identityref

]]></artwork></figure>

</section>
<section anchor="yang-module"><name>YANG Module</name>

<t>The generic TE YANG module 'ietf-te' imports the following modules:</t>

<t><list style="symbols">
  <t>ietf-te-types defined in <xref target="I-D.draft-ietf-teas-rfc8776-update"/></t>
  <t>ietf-yang-types and ietf-inet-types defined in <xref target="RFC9911"/></t>
  <t>ietf-network and ietf-network-topology defined in <xref target="RFC8345"/></t>
</list></t>

<t>This module references the following documents:
<xref target="RFC4206"/>, <xref target="RFC4427"/>,
<xref target="RFC4872"/>, <xref target="RFC3209"/>, <xref target="RFC6780"/>,
<xref target="RFC7471"/>, <xref target="RFC9012"/>, <xref target="RFC8570"/>,
<xref target="RFC8232"/>, <xref target="RFC7271"/>, <xref target="RFC8234"/>, <xref target="RFC4655"/>, <xref target="RFC8231"/>, <xref target="RFC7308"/>, <xref target="RFC8345"/>, <xref target="RFC9256"/>, and <xref target="ITU_G.808.1"/>.</t>

<figure><artwork><![CDATA[
<CODE BEGINS> file "ietf-te@2026-02-24.yang"
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-te";

  prefix te;

  /* Import TE generic types */

  import ietf-te-types {
    prefix te-types;
    reference
      "draft-ietf-teas-rfc8776-update: Common YANG Data Types
       for Traffic Engineering.";
  }
  import ietf-yang-types {
    prefix yang;
    reference
      "RFC 9911: Common YANG Data Types.";
  }

  import ietf-network {
    prefix "nw";
    reference "RFC 8345: A YANG Data Model for Network Topologies";
  }

  import ietf-network-topology {
    prefix "nt";
    reference "RFC 8345: A YANG Data Model for Network Topologies";
  }

  organization
    "IETF Traffic Engineering Architecture and Signaling (TEAS)
     Working Group.";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/teas/>
     WG List:  <mailto:teas@ietf.org>

     Editor:   Tarek Saad
               <mailto:tsaad.net@gmail.com>

     Editor:   Rakesh Gandhi
               <mailto:rgandhi@cisco.com>

     Editor:   Vishnu Pavan Beeram
               <mailto:vbeeram@juniper.net>

     Editor:   Xufeng Liu
               <mailto: xufeng.liu.ietf@gmail.com>

     Editor:   Igor Bryskin
               <mailto:i_bryskin@yahoo.com>";

  description
    "YANG data module for TE configuration, state, and RPCs.

     Copyright (c) 2025 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     All revisions of IETF and IANA published modules can be found at
     the "YANG Parameters" registry group:
     https://www.iana.org/assignments/yang-parameters.

     This version of this YANG module is part of RFC XXXX; see
     the RFC itself for full legal notices.";

  // RFC Ed.: replace XXXX with actual RFC number and remove this
  // note.
  // RFC Ed.: update the date below with the date of RFC publication
  // and remove this note.

  revision 2025-02-24 {
    description
      "Initial revision for the TE generic YANG module.";
    reference
      "RFCXXXX: A YANG Data Model for Traffic Engineering Tunnels,
       Label Switched Paths, and Interfaces.";
  }

  typedef tunnel-ref {
    type leafref {
      path "/te:te/te:tunnels/te:tunnel/te:name";
      require-instance false;
    }
    description
      "This type is used by data models that need to reference
       a configured TE tunnel.";
  }

  /**
   * TE tunnel generic groupings
   */

  grouping path-common-properties {
    description
      "Common path attributes.";
    leaf name {
      type string;
      description
        "TE path name.";
    }
    leaf symbolic-name {
      type string;
      description
        "The symbolic path name is a human-readable string that
         identifies an LSP in the network.  The symbolic path name
         must remain constant throughout an LSP's lifetime.";
      reference
        "RFC 8231: Path Computation Element Communication Protocol 
                   (PCEP) Extensions for Stateful PCE,
                   Section 7.3.2";
    }
    leaf path-computation-method {
      type identityref {
        base te-types:path-computation-method;
      }
      default "te-types:path-locally-computed";
      description
        "The method used for computing the path, either
         locally computed, queried from a server or not
         computed at all (explicitly configured).";
    }
    container path-computation-server {
      when "derived-from-or-self(../path-computation-method, "
         + "'te-types:path-externally-queried')" {
        description
        "The IP address or the TE identifier of the external
         path computation server.";
      }
      uses te-types:te-generic-node-id;
      description
        "Address of the external path computation
         server.";
    }
    leaf compute-only {
      when "../use-path-computation = 'true'" {
        description
          "Applicable when path computation is requested.";
      }
      type empty;
      description
        "When present, the path is computed, but no resources
         are committed or reserved in the network. The path may
         be recomputed upon topology changes.";
    }
    leaf use-path-computation {
      when "derived-from-or-self(../path-computation-method, "
         + "'te-types:path-locally-computed')";
      type boolean;
      default "true";
      description
        "When 'true' indicates the path is dynamically computed
         and/or validated against the Traffic-Engineering Database
         (TED), and when 'false' indicates no path expansion or
         validation against the TED is required.";
    }
    leaf lockdown {
      type empty;
      description
        "When present, indicates the existing path should not be
         globally repaired or reoptimized.";
    }
    leaf path-scope {
      type identityref {
        base te-types:path-scope-type;
      }
      default "te-types:path-scope-end-to-end";
      config false;
      description
        "Indicates whether the path is a segment or portion of
         the full path, or is an end-to-end path for
         the TE Tunnel.";
    }
  }

  grouping path-compute-info {
    description
      "Attributes used for path computation request.";
    uses tunnel-associations-properties;
    uses te-types:generic-path-optimization;
    leaf named-path-constraint {
      if-feature "te-types:named-path-constraints";
      type leafref {
        path "/te:te/te:globals/te:named-path-constraints/"
           + "te:named-path-constraint/te:name";
      }
      description
        "Reference to a globally defined named path constraint set.";
    }
    uses path-constraints-common;
  }

  grouping path-forward-properties {
    description
      "The path preference.";
    leaf preference {
      type uint8 {
        range "1..255";
      }
      default "1";
      description
        "Specifies a preference for this path. The lower the number
         higher the preference.";
    }
    leaf co-routed {
      when "/te:te/te:tunnels/te:tunnel/te:bidirectional = 'true'" {
        description
          "Applicable to bidirectional tunnels only.";
      }
      type boolean;
      default "false";
      description
        "When set to true, indicates whether the reverse path must
         be co-routed with the primary.";
    }
  }

  grouping k-requested-paths {
    description
      "The k-shortest paths requests.";
    leaf k-requested-paths {
      type uint8;
      default "1";
      description
        "The number of k-shortest paths requested from the path
         computation server, which are returned in order based on
         their computed optimization objective costs.";
    }
  }

  grouping path-state {
    description
      "TE per path state parameters.";
    uses path-computation-response;
    container lsp-provisioning-error-infos {
      config false;
      description
        "LSP provisioning error information.";
      list lsp-provisioning-error-info {
        description
          "List of LSP provisioning error info entries.";
        leaf error-reason {
          type identityref {
            base te-types:lsp-provisioning-error-reason;
          }
          description
            "LSP provision error type.";
        }
        leaf error-description {
          type string;
          description
            "The textual representation of the error that occurred
             during LSP provisioning.";
        }
        leaf error-timestamp {
          type yang:date-and-time;
          description
            "Timestamp of when the reported error occurred.";
        }
        leaf error-node-id {
          type te-types:te-node-id;
          description
            "Node identifier of node where error occurred.";
        }
        leaf error-link-id {
          type te-types:te-tp-id;
          description
            "Link ID where the error occurred.";
        }
        leaf lsp-id {
          type uint16;
          description
            "The LSP-ID for which LSP provisioning error was
             returned.";
        }
      }
    }
    container lsps {
      config false;
      description
        "The TE LSPs container.";
      list lsp {
        key "node lsp-id";
        description
          "List of LSPs associated with the tunnel.";
        leaf tunnel-name {
          type leafref {
            path "/te:te/te:lsps/te:lsp/te:tunnel-name";
          }
          description "TE tunnel name.";
        }
        leaf node {
          type leafref {
            path "/te:te/te:lsps/te:lsp[tunnel-name="
               + "current()/../te:tunnel-name][lsp-id="
               + "current()/../te:lsp-id]/te:node";
          }
          description "The node where the LSP state resides.";
        }
        leaf lsp-id {
          type leafref {
            path "/te:te/te:lsps/te:lsp[tunnel-name="
               + "current()/../tunnel-name]/te:lsp-id";
          }
          description "The TE LSP identifier.";
        }
        leaf state-change-timestamp {
          type yang:date-and-time;
          description
            "Indicates the time at which the LSP operational
             state was last updated.";
        }
      }
    }
  }

  grouping path-computation-response {
    description
      "Attributes reported by path computation response.";
    container computed-paths-properties {
      config false;
      description
        "Computed path properties container.";
      list computed-path-properties {
        key "k-index";
        description
          "List of computed paths.";
        leaf k-index {
          type uint8;
          description
            "The k-th path returned from the computation server.
             A lower k value path is more optimal than higher k
             value paths";
        }
        uses te-types:generic-path-properties {
          augment "path-properties" {
            description
              "additional path properties returned by path
               computation.";
            uses te-types:te-bandwidth;
            leaf disjointness-type {
              type te-types:te-path-disjointness;
              description
                "The type of resource disjointness.
                 When reported for a primary path, it represents the
                 minimum level of disjointness of all the secondary
                 paths. When reported for a secondary path, it
                 represents the disjointness of the secondary path.";
            }
            leaf last-computed-timestamp {
              type yang:date-and-time;
              description
                "Timestamp of when the path was last computed.";
            }
          }
        }
      }
    }
    container computed-path-error-infos {
      config false;
      description
        "Path computation information container.";
      list computed-path-error-info {
        description
          "List of path computation info entries.";
        leaf error-description {
          type string;
          description
            "Textual representation of the error that occurred
             during path computation.";
        }
        leaf error-timestamp {
          type yang:date-and-time;
          description
            "Timestamp of last path computation attempt.";
        }
        leaf error-reason {
          type identityref {
            base te-types:path-computation-error-reason;
          }
          description
            "Reason for the path computation error.";
        }
      }
    }
  }

  grouping protection-restoration-properties {
    description
      "Protection and restoration parameters.";
    container protection {
      description
        "Protection parameters.";
      leaf protection-type {
        type identityref {
          base te-types:lsp-protection-type;
        }
        default "te-types:lsp-protection-unprotected";
        description
          "LSP protection type.";
      }
      leaf protection-reversion-disable {
        type boolean;
        default "false";
        description
          "Disable protection reversion to working path.";
      }
      leaf hold-off-time {
        type uint32;
        units "milliseconds";
        description
          "The time between the declaration of an SF or SD condition
           and the initialization of the protection switching
           algorithm.";
        reference
          "RFC 4427: Recovery (Protection and Restoration)
                     Terminology for Generalized Multi-Protocol
                     Label Switching (GMPLS).";
      }
      leaf wait-to-revert {
        type uint16;
        units "seconds";
        description
          "Time to wait before attempting LSP reversion.";
        reference
          "RFC 4427: Recovery (Protection and Restoration)
                     Terminology for Generalized Multi-Protocol
                     Label Switching (GMPLS).";
      }
      leaf aps-signal-id {
        type uint8 {
          range "1..255";
        }
        default "1";
        description
          "The Automatic Protection Switching (APS) signal number
           used to reference the traffic of this tunnel. The default
           value for normal traffic is 1.
           The default value for extra-traffic is 255. If not
           specified, non-default values can be assigned by the
           server, if and only if, the server controls both
            endpoints.";
        reference
          "ITU_G.808.1: Generic protection switching - Linear trail
                        and subnetwork protection.";
      }
    }
    container restoration {
      description
        "Restoration parameters.";
      leaf restoration-type {
        type identityref {
          base te-types:lsp-restoration-type;
        }
        description
          "LSP restoration type.";
      }
      leaf restoration-scheme {
        type identityref {
          base te-types:restoration-scheme-type;
        }
        description
          "LSP restoration scheme.";
      }
      leaf restoration-reversion-disable {
        type boolean;
        default "false";
        description
          "When 'true', disables restoration reversion to the working
           path.";
      }
      leaf hold-off-time {
        type uint32;
        units "milliseconds";
        description
          "The time between the declaration of an SF or SD condition
           and the initialization of the protection switching
           algorithm.";
        reference
          "RFC 4427: Recovery (Protection and Restoration)
                     Terminology for Generalized Multi-Protocol
                     Label Switching (GMPLS).";
      }
      leaf wait-to-restore {
        type uint16;
        units "seconds";
        description
          "Time to wait before attempting LSP restoration.";
        reference
          "RFC 4427: Recovery (Protection and Restoration)
                     Terminology for Generalized Multi-Protocol
                     Label Switching (GMPLS).";
      }
      leaf wait-to-revert {
        type uint16;
        units "seconds";
        description
          "Time to wait before attempting LSP reversion.";
        reference
          "RFC 4427: Recovery (Protection and Restoration)
                     Terminology for Generalized Multi-Protocol
                     Label Switching (GMPLS).";
      }
    }
  }

  grouping tunnel-associations-properties {
    description
      "TE tunnel association grouping.";
    container association-objects {
      description
        "TE tunnel associations.";
      list association-object {
        key "association-key";
        unique "type id source/id source/type";
        description
          "List of association base objects.";
        reference
          "RFC 4872: RSVP-TE Extensions in Support of End-to-End
                     Generalized Multi-Protocol Label Switching
                     (GMPLS) Recovery.";
        leaf association-key {
          type string;
          description
            "Association key used to identify a specific
             association in the list";
        }
        leaf type {
          type identityref {
            base te-types:association-type;
          }
          description
            "Association type.";
          reference
            "RFC 4872: RSVP-TE Extensions in Support of End-to-End
                       Generalized Multi-Protocol Label Switching
                       (GMPLS) Recovery.";
        }
        leaf id {
          type uint16;
          description
            "Association identifier.";
          reference
            "RFC 4872: RSVP-TE Extensions in Support of End-to-End
                        Generalized Multi-Protocol Label Switching
                        (GMPLS) Recovery.";
        }
        container source {
          uses te-types:te-generic-node-id;
          description
            "Association source.";
          reference
            "RFC 4872: RSVP-TE Extensions in Support of End-to-End
                       Generalized Multi-Protocol Label Switching
                       (GMPLS) Recovery.";
        }
      }
      list association-object-extended {
        key "association-key";
        unique
          "type id source/id source/type global-source extended-id";
        description
          "List of extended association objects.";
        reference
          "RFC 6780: RSVP ASSOCIATION Object Extensions";
        leaf association-key {
          type string;
          description
            "Association key used to identify a specific
             association in the list";
        }
        leaf type {
          type identityref {
            base te-types:association-type;
          }
          description
            "Association type.";
          reference
            "RFC 4427: Recovery (Protection and Restoration)
                       Terminology for Generalized Multi-Protocol
                       Label Switching (GMPLS)
             RFC 6780: RSVP ASSOCIATION Object Extensions";
        }
        leaf id {
          type uint16;
          description
            "Association identifier.";
          reference
            "RFC 4427: Recovery (Protection and Restoration)
                       Terminology for Generalized Multi-Protocol
                       Label Switching (GMPLS)
             RFC 6780: RSVP ASSOCIATION Object Extensions";
        }
        container source {
          uses te-types:te-generic-node-id;
          description
            "Association source.";
          reference
            "RFC 4427: Recovery (Protection and Restoration)
                       Terminology for Generalized Multi-Protocol
                       Label Switching (GMPLS)
             RFC 6780: RSVP ASSOCIATION Object Extensions";
        }
        leaf global-source {
          type uint32;
          description
            "Association global source.";
          reference
            "RFC 6780: RSVP ASSOCIATION Object Extensions";
        }
        leaf extended-id {
          type yang:hex-string;
          description
            "Association extended identifier.";
          reference
            "RFC 6780: RSVP ASSOCIATION Object Extensions";
        }
      }
    }
  }

  grouping tunnel-end-point {
    description
      "Common grouping used to specify the tunnel source and 
      destination end-points.";
    leaf node-id {
      type nw:node-id;
      description
        "The TE tunnel end-point node identifier";
    }
    leaf te-node-id {
      type te-types:te-node-id;
      description
        "The TE tunnel end-point TE node identifier";
    }
    leaf tunnel-tp-id {
      when "../node-id or ../te-node-id" {
        description
          "The TE tunnel termination point identifier is local to 
          a node";
      }
      type binary;
      description
        "The TE tunnel end-point TE tunnel termination point 
        identifier";
    }
  }

  /* Some of the groupings defined in this module are re-used
   * in path-computation YANG model
   * defined in [I-D.ietf-teas-yang-path-computation] */
  grouping tunnel-common-attributes {
    description
      "Common grouping to define the TE tunnel parameters";
    container source {
      description
        "TE tunnel source end-point.";
      uses tunnel-end-point;
    }
    container destination {
      description
        "TE tunnel destination end-point.";
      uses tunnel-end-point;
    }
    leaf bidirectional {
      type boolean;
      default "false";
      description
        "When 'true', it indicates a bidirectional tunnel";
    }
  }

  /* This grouping is re-used in path-computation YANG
   * model defined in [I-D.ietf-teas-yang-path-computation] */
  grouping tunnel-hierarchy-properties {
    description
      "A grouping for TE tunnel hierarchy information.";
    container hierarchy {
      description
        "Container for TE hierarchy related information.";
      container dependency-tunnels {
        description
          "List of tunnels that this tunnel can be potentially
           dependent on.";
        list dependency-tunnel {
          key "name";
          description
            "A tunnel entry that this tunnel can potentially depend
             on.";
          leaf name {
            type tunnel-ref;
            description
              "Dependency tunnel name. The tunnel may not have been
               instantiated yet.";
          }
          uses te-types:encoding-and-switching-type;
        }
      }
      container hierarchical-link {
        description
          "Identifies a hierarchical link (in client layer)
           that this tunnel is associated with. By default, the
           topology of the hierarchical link is the same topology of
           the tunnel;";
        reference
          "RFC 4206: Label Switched Paths (LSP) Hierarchy with
                     Generalized Multi-Protocol Label Switching
                     (GMPLS) Traffic Engineering (TE)";
        leaf enable {
          type boolean;
          default "false";
          description
            "When 'true', enables the hierarchical link properties
             supported by this tunnel";
        }
        leaf local-node-id {
          type nw:node-id;
          description
            "The local node identifier.";
        }
        leaf local-te-node-id {
          type te-types:te-node-id;
          description
            "The local TE node identifier.";
        }
        leaf local-link-tp-id {
          type nt:tp-id;
          description
            "The local link termination point identifier.";
          reference
            "RFC 8345: A YANG Data Model for Network Topologies";
        }
        leaf local-te-link-tp-id {
          type te-types:te-tp-id;
          description
            "The local TE link termination point identifier.";
        }
        leaf remote-node-id {
          type nw:node-id;
          description
            "The remote node identifier.";
        }
        leaf remote-link-tp-id {
          type nt:tp-id;
          description
            "The remote link termination point identifier.";
          reference
            "RFC 8345: A YANG Data Model for Network Topologies";
        }
        leaf remote-te-link-tp-id {
          type te-types:te-tp-id;
          description
            "The remote TE link termination point identifier.";
        }
        leaf remote-te-node-id {
          type te-types:te-node-id;
          description
            "Remote TE node identifier.";
        }
        leaf link-id {
          type nt:link-id;
          description
            "A network topology assigned identifier to the link";
          reference
            "RFC 8345: A YANG Data Model for Network Topologies";
        }
        leaf network-id {
          type nw:network-id;
          description
            "The network topology identifier where the hierarchical 
            link supported by this TE tunnel is instantiated.";
        }
        uses te-types:te-topology-identifier {
          description
            "The TE topology identifier where the hierarchical link
             supported by this TE tunnel is instantiated.";
        }
      }
    }
  }

  grouping path-constraints-common {
    description
      "Global named path constraints configuration
       grouping.";
    uses te-types:common-path-constraints-attributes;
    uses te-types:generic-path-disjointness;
    uses te-types:path-constraints-route-objects;
    container path-in-segment {
      presence "The end-to-end tunnel starts in a previous domain;
                this tunnel is a segment in the current domain.";
      description
        "If an end-to-end tunnel crosses multiple domains using
         the same technology, some additional constraints have to be
         taken in consideration in each domain.
         This TE tunnel segment is stitched to the upstream TE tunnel
         segment.";
      uses te-types:label-set-info;
    }
    container path-out-segment {
      presence
        "The end-to-end tunnel is not terminated in this domain;
         this tunnel is a segment in the current domain.";
      description
        "If an end-to-end tunnel crosses multiple domains using
         the same technology, some additional constraints have to be
         taken in consideration in each domain.
         This TE tunnel segment is stitched to the downstream TE
         tunnel segment.";
      uses te-types:label-set-info;
    }
  }

  /**
   * TE container
   */

  container te {
    description
      "TE global container.";
    leaf enable {
      type boolean;
      description
        "When 'true', the TE component features are enabled.";
    }

    /* TE Global Data */
    container globals {
      description
        "Globals TE system-wide configuration data container.";
      container named-admin-groups {
        description
          "TE named admin groups container.";
        list named-admin-group {
          if-feature "te-types:extended-admin-groups";
          if-feature "te-types:named-extended-admin-groups";
          key "name";
          description
            "List of named TE admin-groups.";
          leaf name {
            type string;
            description
              "A name that uniquely identifies a TE
               interface named admin-group.";
          }
          leaf bit-position {
            type uint32;
            description
              "Bit-position value for a named Administrative Group
               (AG).  The value is an integer that represents one of
               the bit positions in the administrative group bitmask.
               Values for bit-positions between 0 and 31 are inter-
               preted as the original 32 bit AGs. Values of bit-
               positions >=32 are interpreted as Extended
               Administrative Group (EAG) values as per RFC 7308.";
            reference
              "RFC 3209: RSVP-TE: Extensions to RSVP for LSP Tunnels
               RFC 7308: Extended Administrative Groups in MPLS
                         Traffic Engineering (MPLS-TE)";
          }


        }
      }
      container named-srlgs {
        description
          "TE named SRLGs container.";
        list named-srlg {
          if-feature "te-types:named-srlg-groups";
          key "name";
          description
            "A list of named SRLG groups.";
          leaf name {
            type string;
            description
              "A name that uniquely identifies a TE
               interface named SRLG.";
          }
          leaf value {
            type te-types:srlg;
            description
              "An SRLG value.";
          }
          leaf cost {
            type uint32;
            description
              "The cost associated with an SRLG. This is used as
               a penalty during path computation when the TE path
               traverses a link with this SRLG.";
          }
        }
      }
      container named-path-constraints {
        description
          "TE named path constraints container.";
        list named-path-constraint {
          if-feature "te-types:named-path-constraints";
          key "name";
          leaf name {
            type string;
            description
              "A name that uniquely identifies a
               path constraint set.";
          }
          uses path-constraints-common;
          description
            "A list of named path constraints.";
        }
      }
    }

    /* TE Tunnel Data */
    container tunnels {
      description
        "Tunnels TE configuration data container.";
      list tunnel {
        key "name";
        description
          "The list of TE tunnels.";
        leaf name {
          type string;
          description
            "TE tunnel name.";
        }
        leaf alias {
          type string;
          description
            "An alternate name of the TE tunnel that can be modified
             anytime during its lifetime.";
        }
        leaf identifier {
          type uint32;
          description
            "A numeric identifier for the tunnel, unique within the
             scope of the ingress node. While the 'name' leaf serves
             as a     human-readable management key, this
             'identifier' corresponds to the Tunnel ID used in
             control plane signaling (e.g., the RSVP-TE SESSION
             object as defined in RFC 3209), allowing for
             correlation between management state and network-wide 
             signaling.";
          reference
            "RFC 3209: RSVP-TE: Extensions to RSVP for LSP Tunnels";
        }
        leaf color {
          type uint32;
          description
            "A TE Tunnel [RFC3209] can be associated with an intent
             or objective (e.g., low latency) by tagging it with a
             color.  This color attribute is used as a guiding
             criterion for mapping services onto the TE Tunnel
             [RFC9012][RFC9256].";
          reference
            "RFC 9012: The BGP Tunnel Encapsulation Attribute";
        }
        leaf description {
          type string;
          default "None";
          description
            "Textual description for this TE tunnel.";
        }
        leaf admin-state {
          type identityref {
            base te-types:tunnel-admin-state-type;
          }
          default "te-types:tunnel-admin-state-up";
          description
            "TE tunnel administrative state.";
        }
        leaf operational-state {
          type identityref {
            base te-types:tunnel-state-type;
          }
          config false;
          description
            "TE tunnel operational state.";
        }
        leaf state-change-timestamp {
          type yang:date-and-time;
          description
            "Indicates the time at which the TE tunnel's operational
             state was last updated.";
        }
        uses te-types:encoding-and-switching-type;
        uses tunnel-common-attributes;
        container controller {
          description
            "Contains tunnel data relevant to external controllers.
             This target node may be augmented by external modules,
             for example, to add data for PCEP initiated and/or
             delegated tunnels.";
          leaf protocol-origin {
            type identityref {
              base te-types:protocol-origin-type;
            }
            description
              "The protocol origin for instantiating the tunnel.";
          }
          leaf controller-entity-id {
            type string;
            description
              "An identifier that is associated with the entity that
               controls the tunnel as defined in RFC 8232.";
            reference
              "RFC 8232: Optimizations of Label Switched Path State
                         Synchronization Procedures for a Stateful
                         PCE";
          }
        }
        leaf reoptimize-timer {
          type uint16;
          units "seconds";
          description
            "Frequency of reoptimization of a traffic-engineered
             LSP. A value of 0 means that the LSP is never
             reoptimized";
        }
        uses tunnel-associations-properties;
        uses protection-restoration-properties;
        uses te-types:tunnel-constraints;
        uses tunnel-hierarchy-properties;
        container primary-paths {
          description
            "The set of primary paths.";
          reference
            "RFC 4872: RSVP-TE Extensions in Support of End-to-End
                       Generalized Multi-Protocol Label Switching
                       (GMPLS) Recovery.";
          list primary-path {
            key "name";
            description
              "List of primary paths for this tunnel.";
            leaf active {
              type boolean;
              config false;
              description
                "When 'true', indicates an active path has been
                 selected from the primary paths list.";
            }
            uses path-common-properties;
            uses path-forward-properties;
            uses k-requested-paths;
            uses path-compute-info;
            uses path-state;
            container primary-reverse-path {
              when "../../../te:bidirectional = 'true'";
              description
                "The reverse primary path properties.";
              uses path-common-properties;
              uses path-compute-info;
              uses path-state;
              container candidate-secondary-reverse-paths {
                description
                  "The set of referenced candidate reverse secondary
                   paths from the full set of secondary reverse paths
                   which may be used for this primary path.";
                list candidate-secondary-reverse-path {
                  key "secondary-reverse-path";
                  ordered-by user;
                  description
                    "List of candidate secondary reverse paths";
                  leaf secondary-reverse-path {
                    type leafref {
                      path "../../../../../../"
                         + "te:secondary-reverse-paths/"
                         + "te:secondary-reverse-path/te:name";
                    }
                    description
                      "A reference to the secondary reverse path that
                       may be utilized when the containing primary
                       reverse path is in use.";
                  }
                  leaf active {
                    type boolean;
                    config false;
                    description
                      "When 'true', indicates an active path has been
                       selected from the secondary reverse paths
                       list.";
                  }
                }
              }
            }
            container candidate-secondary-paths {
              description
                "The set of candidate secondary paths which may be
                 used for this primary path. When secondary paths are
                 specified in the list the path of the secondary LSP
                 in use must be restricted to those paths
                 referenced.
                 The priority of the secondary paths is specified
                 within the list. Higher priority values are less
                 preferred - that is to say that a path with priority
                 0 is the most preferred path. In the case that the
                 list is empty, any secondary path may be
                 utilized when the current primary path is in use.";
              list candidate-secondary-path {
                key "secondary-path";
                ordered-by user;
                description
                  "List of candidate secondary paths for this
                   tunnel.";
                leaf secondary-path {
                  type leafref {
                    path "../../../../../te:secondary-paths/"
                       + "te:secondary-path/te:name";
                  }
                  description
                    "A reference to the secondary path that may be
                     utilized when the containing primary path is
                     in use.";
                }
                leaf active {
                  type boolean;
                  config false;
                  description
                    "When 'true', indicates an active path has been
                     selected from the candidate secondary paths.";
                }
              }
            }
          }
        }
        container secondary-paths {
          description
            "The set of secondary paths.";
          reference
            "RFC 4872: RSVP-TE Extensions in Support of End-to-End
                       Generalized Multi-Protocol Label Switching
                       (GMPLS) Recovery.";
          list secondary-path {
            key "name";
            description
              "List of secondary paths for this tunnel.";
            uses path-common-properties;
            leaf preference {
              type uint8 {
                range "1..255";
              }
              default "1";
              description
                "Specifies a preference for this path. The lower the
                 number, the higher the preference.";
            }
            leaf secondary-reverse-path {
              type leafref {
                path "../../../"
                   + "te:secondary-reverse-paths/"
                   + "te:secondary-reverse-path/te:name";
              }
              description
                "A reference to the reverse secondary path when
                 co-routed with the secondary path.";
            }
            uses path-compute-info;
            uses protection-restoration-properties;
            uses path-state;
          }
        }
        container secondary-reverse-paths {
          description
            "The set of secondary reverse paths.";
          list secondary-reverse-path {
            key "name";
            description
              "List of secondary paths for this tunnel.";
            uses path-common-properties;
            leaf preference {
              type uint8 {
                range "1..255";
              }
              default "1";
              description
                "Specifies a preference for this path. The lower the
                 number higher the preference. Paths that have the
                 same preference will be activated together.";
            }
            uses path-compute-info;
            uses protection-restoration-properties;
            uses path-state;
          }
        }
        action tunnel-action {
          description
            "Action commands to manipulate the TE tunnel state.";
          reference
            "RFC 3209: RSVP-TE: Extensions to RSVP for LSP Tunnels,
             Section 2.5";
          input {
            leaf action-type {
              type identityref {
                base te-types:tunnel-action-type;
              }
              description
                "The action to be invoked on the TE tunnel.";
            }
          }
          output {
            leaf action-result {
              type identityref {
                base te-types:te-action-result;
              }
              description
                "The result of the tunnel action operation.";
            }
          }
        }
        action protection-external-commands {
          description
            "Actions to manipulate the protection external
             commands of the TE tunnel.";
          reference
            "RFC 4427: Recovery (Protection and Restoration)
             Terminology for Generalized Multi-Protocol Label
             Switching (GMPLS)";
          input {
            leaf protection-external-command {
              type identityref {
                base te-types:protection-external-commands;
              }
              description
                "Protection external command.";
            }
            leaf ingress-node {
              type boolean;
              default "true";
              description
                "When 'true', indicates that the action is
                 applied on the ingress node.
                 By default, the action applies to the ingress
                 node";
            }
            leaf egress-node {
              type boolean;
              default "false";
              description
                "When 'true', indicates that the action is
                 applied on the egress node. By default,
                 the action applies to the ingress node.";
            }
            leaf path-name {
              type string;
              description
                "The name of the path that the external command
                applies to.";
            }
            leaf path-type {
              type te-types:path-type;
              description
                "The type of the path that the external command
                applies to.";
            }
            leaf traffic-type {
              type enumeration {
                enum normal-traffic {
                  description
                    "The manual-switch or forced-switch command
                     applies to the normal traffic (this Tunnel).";
                }
                enum null-traffic {
                  description
                    "The manual-switch or forced-switch command
                     applies to the null traffic.";
                }
                enum extra-traffic {
                  description
                    "The manual-switch or forced-switch command
                     applies to the extra traffic (the extra-traffic
                     Tunnel sharing protection bandwidth with this
                     Tunnel).";
                }
              }
              description
                "Indicates whether the manual-switch or forced-switch
                 commands applies to the normal traffic, the null
                 traffic or the extra-traffic.";
              reference
                "RFC 4427: Recovery (Protection and Restoration)
                           Terminology for Generalized Multi-Protocol
                           Label Switching (GMPLS).";
            }
            leaf extra-traffic-tunnel-ref {
              type tunnel-ref;
              description
                "In case there are multiple extra-traffic tunnels
                 sharing protection bandwidth with this Tunnel
                 (m:n protection), represents which extra-traffic
                 Tunnel the manual-switch or forced-switch to
                 extra-traffic command applies to.";
            }
          }
        }
      }
    }

    /* TE LSPs Data */
    container lsps {
      config false;
      description
        "TE LSPs state container.";
      list lsp {
        key "tunnel-name lsp-id node";
        unique "source destination tunnel-id lsp-id "
          + "extended-tunnel-id";
        description
          "List of LSPs associated with the tunnel.";
        leaf tunnel-name {
          type string;
          description "The TE tunnel name.";
        }
        leaf lsp-id {
          type uint16;
          description
            "An identifier unique in the context of the LSP head-end.
             For example, as used in the RSVP-TE SENDER_TEMPLATE and
             FILTER_SPEC objects. The value can be changed to allow a
             sender to share resources with itself.";
          reference
            "RFC 3209";
        }
        leaf node {
          type te-types:te-node-id;
          description
            "The node where the LSP state is retrieved.";
        }
        leaf source {
          type te-types:te-node-id;
          description
            "The address of the ingress LSP endpoint that identifies
             the start of the tunnel. This typically corresponds to
             the Tunnel Sender Address extracted from the RSVP-TE 
             SENDER_TEMPLATE object.";
          reference
            "RFC 3209: RSVP-TE: Extensions to RSVP for LSP Tunnels";
        }
        leaf destination {
          type te-types:te-node-id;
          description
            "The address of the egress LSP endpoint that identifies
             the end of the tunnel. This typically corresponds to
             the Tunnel Endpoint Address extracted from the RSVP-TE 
             SESSION object.";
          reference
            "RFC 3209: RSVP-TE: Extensions to RSVP for LSP Tunnels";
        }
        leaf tunnel-id {
          type uint16;
          description
            "An identifier of the tunnel that remains constant over
             the life of the tunnel. For example, this may be the
             Tunnel ID extracted from RSVP-TE SESSION object.";
          reference
            "RFC 3209";
        }
        leaf extended-tunnel-id {
          type yang:dotted-quad;
          description
            "A qualifier used to ensure the global uniqueness of the
             tunnel identifier. It carries a 4-byte or 16-byte value,
             typically corresponding to the Extended Tunnel ID
             extracted from the RSVP-TE SESSION object as defined in
             RFC 3209.";
          reference
            "RFC 3209";
        }
        leaf operational-state {
          type identityref {
            base te-types:lsp-state-type;
          }
          description
            "The LSP operational state.";
        }
        leaf signaling-type {
          type identityref {
            base te-types:path-signaling-type;
          }
          description
            "The signaling protocol used to set up this LSP.";
        }
        leaf origin-type {
          type enumeration {
            enum ingress {
              description
                "Origin ingress.";
            }
            enum egress {
              description
                "Origin egress.";
            }
            enum transit {
              description
                "Origin transit.";
            }
          }
          description
            "The origin of the LSP relative to the location of the
             local switch in the path.";
        }
        leaf lsp-resource-status {
          type enumeration {
            enum primary {
              description
                "A primary LSP is a fully established LSP for which
                 the resource allocation has been committed at the
                 data plane.";
            }
            enum secondary {
              description
                "A secondary LSP is an LSP that has been provisioned
                 in the control plane only; e.g. resource allocation
                 has not been committed at the data plane.";
            }
          }
          description
            "LSP resource allocation state.";
          reference
            "RFC 4872, section 4.2.1";
        }
        leaf lockout-of-normal {
          type boolean;
          description
            "When set to 'true', it represents a lockout of normal
             traffic external command. When set to 'false', it
             represents a clear lockout of normal traffic external
             command. The lockout of normal traffic command applies
             to this Tunnel.";
          reference
            "RFC 4427";
        }
        leaf freeze {
          type boolean;
          description
            "When set to 'true', it represents a freeze external
             command.  When set to 'false', it represents a clear
             freeze external command. The freeze command applies to
             all the Tunnels which are sharing the protection
             resources with this Tunnel.";
          reference
            "RFC 4427";
        }
        leaf lsp-protection-role {
          type enumeration {
            enum working {
              description
                "A working LSP must be a primary LSP whilst a
                 protecting LSP can be either a primary or a
                 secondary LSP. Also, known as protected LSPs when
                 working LSPs are associated with protecting LSPs.";
            }
            enum protecting {
              description
                "A secondary LSP is an LSP that has been provisioned
                 in the control plane only; e.g. resource allocation
                 has not been committed at the data plane.";
            }
          }
          description
            "LSP role type.";
          reference
            "RFC 4872, section 4.2.1";
        }
        leaf lsp-protection-state {
          type identityref {
            base te-types:lsp-protection-state;
          }
          config false;
          description
            "The reported protection state controlling which
             tunnel is using the resources of the protecting LSP.";
        }
        leaf ingress-node-id {
          type te-types:te-node-id;
          description
            "Indicates the te-node-id of the ingress node of the TE
             tunnel or tunnel segment when the protection action is
             applied to the ingress node or the Wait To Restore (WTR)
             timer is active.
             This is set to '0.0.0.0' when the controller is not
             aware of the te-node-id of ingress-node.";
        }
        leaf egress-node-id {
          type te-types:te-node-id;
          description
            "Indicates the te-node-id of the egress node of the TE
             tunnel or tunnel segment when the protection action is
             applied to the ingress node or the WTR timer is active.
             This is set to '0.0.0.0' when the controller is not
             aware of the te-node-id of ingress-node.";
        }
        container lsp-actual-route-information {
          description
            "RSVP recorded route object information.";
          list lsp-actual-route-information {
            when "../../origin-type = 'ingress'" {
              description
                "Applicable on ingress LSPs only.";
            }
            key "index";
            description
              "Record route list entry.";
            uses te-types:record-route-state;
          }
        }
      }
    }
  }

  /* TE Tunnel RPCs/execution Data */

  rpc tunnels-path-compute {
    description
      "This RPC is a generic API whose
       input and output parameters are expected to be provided by
       augments to this module.";
    reference
      "RFC 4655: A Path Computation Element (PCE)-Based
       Architecture.";
    input {
      container path-compute-info {
        /* 
         * An external path compute module may augment this
         * target.
         */
        description
          "RPC input information.";
      }
    }
    output {
      container path-compute-result {
        /* 
         * An external path compute module may augment this
         * target.
         */
        description
          "RPC output information.";
      }
    }
  }

  rpc tunnels-actions {
    description
      "RPC that manipulates the state of a TE tunnel.";
    reference
      "RFC 3209: RSVP-TE: Extensions to RSVP for LSP Tunnels,
       Section 2.5";
    input {
      container tunnel-info {
        description
          "TE tunnel information.";
        choice filter-type {
          mandatory true;
          description
            "Filter choice.";
          case all-tunnels {
            leaf all {
              type empty;
              mandatory true;
              description
                "When present, applies the action on all TE
                 tunnels.";
            }
          }
          case one-tunnel {
            leaf tunnel {
              type tunnel-ref;
              description
                "Apply action on the specific TE tunnel.";
            }
          }
        }
      }
      container action-info {
        description
          "TE tunnel action information.";
        leaf action {
          type identityref {
            base te-types:tunnel-action-type;
          }
          description
            "The action type.";
        }
        leaf disruptive {
          when "derived-from-or-self(../action, "
             + "'te-types:tunnel-action-reoptimize')";
          type empty;
          description
            "Specifies whether reoptimization operations,
             particularly when multiple tunnels are involved,
             are permitted to cause traffic disruption on some
             TE tunnels.";
        }
      }
    }
    output {
      leaf action-result {
        type identityref {
          base te-types:te-action-result;
        }
        description
          "The result of the tunnel action operation.";
      }
    }
  }
}
<CODE ENDS>
]]></artwork></figure>

</section>
</section>
<section anchor="te-device-yang-model"><name>TE Device YANG Model</name>

<t>The device TE YANG module 'ietf-te-device' models data that is specific to
managing a TE device.  This module augments the generic TE YANG module.</t>

<section anchor="module-structure-1"><name>Module Structure</name>

<t>The 'ietf-te-device' module defines the configuration and operational state data
that is specific to the device, including those related to the TE subsystem, tunnels, LSPs, and interfaces.</t>

<section anchor="te-device-globals-tunnels-and-lsps"><name>TE Device Globals, Tunnels and LSPs</name>

<t>The 'ietf-te-device' module augments the generic 'ietf-te' module at the
'globals', 'tunnels', and 'lsps' levels to include the device-specific
configurations and operational state.</t>

<t><xref target="fig-if-te-01"/> shows the
'ietf-te-device' subtree generated with depth=4 that describes those
augmentations.</t>

<figure title="TE Device Augmentations to Globals, Tunnels, and LSPs YANG Subtree" anchor="fig-if-te-01"><artwork><![CDATA[
module: ietf-te-device

  augment /te:te/te:globals:
    +--rw lsp-install-interval?        uint32
    +--rw lsp-cleanup-interval?        uint32
    +--rw lsp-invalidation-interval?   uint32
  augment /te:te/te:tunnels/te:tunnel:
    +--rw path-invalidation-action?    identityref
    +--rw lsp-install-interval?        uint32
    +--rw lsp-cleanup-interval?        uint32
    +--rw lsp-invalidation-interval?   uint32
  augment /te:te/te:lsps/te:lsp:
    +--ro lsp-timers
    |  +--ro uptime?            uint32
    |  +--ro time-to-install?   uint32
    |  +--ro time-to-destroy?   uint32
    +--ro downstream-info
    |     ..
    +--ro upstream-info
          ..
]]></artwork></figure>

<t>The following is the description of the augmented data at each level.</t>

<t>Global Timers (Augmenting /te:te/te:globals):</t>

<t>These are device-specific global configuration parameters related to LSP timers, applied system-wide.</t>

<dl>
  <dt>lsp-install-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, before a newly provisioned LSP is installed into the forwarding plane to carry traffic.</t>
  </dd>
  <dt>lsp-cleanup-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, before an LSP is completely removed from the system after it is no longer in use.</t>
  </dd>
  <dt>lsp-invalidation-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, during which a TE LSP's path is considered invalid before any corrective action is taken.</t>
  </dd>
</dl>

<t>Tunnel Device-Dependent Attributes (Augmenting /te:te/te:tunnels/te:tunnel).</t>

<t>These are device-specific configuration parameters that apply to individual TE Tunnels:</t>

<dl>
  <dt>path-invalidation-action</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional identityref that specifies the action to be taken when a TE Tunnel's path is deemed invalid (e.g., tear down, recompute).</t>
  </dd>
  <dt>lsp-install-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, for this specific TE Tunnel before its LSPs are installed into the forwarding plane. This value can override the global lsp-install-interval.</t>
  </dd>
  <dt>lsp-cleanup-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, for this specific TE Tunnel before its LSPs are cleaned up. This value can override the global lsp-cleanup-interval.</t>
  </dd>
  <dt>lsp-invalidation-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, for this specific TE Tunnel during which its path is considered invalid before action is taken. This value can override the global lsp-invalidation-interval.</t>
  </dd>
</dl>

<t>LSP Device-Dependent State (Augmenting /te:te/te:lsps/te:lsp).</t>

<t>These are read-only operational state parameters providing device-specific details for individual LSPs:</t>

<dl>
  <dt>lsp-timers</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>A container that holds various timer-related operational state for an LSP, applicable primarily to ingress LSPs.</t>
  </dd>
  <dt>uptime</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that indicates the total time, in seconds, that the LSP has been operational.</t>
  </dd>
  <dt>time-to-install</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that indicates the remaining time, in seconds, for a new LSP to be fully instantiated and ready to carry traffic.</t>
  </dd>
  <dt>time-to-destroy</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that indicates the remaining time, in seconds, before an existing LSP is torn down.</t>
  </dd>
  <dt>downstream-info</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>A container that holds information about the downstream neighbor and label for the LSP, applicable when the LSP is not at its egress.</t>
  </dd>
  <dt>upstream-info</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>A container that holds information about the upstream neighbor and label for the LSP, applicable when the LSP is not at its ingress.</t>
  </dd>
</dl>

</section>
<section anchor="te-device-interfaces"><name>TE Device Interfaces</name>

<t><xref target="fig-if-te-02"/> shows the TE interface subtree from the TE device module 'ietf-te-device' with depth=4.
The full tree diagram is shown in <xref target="AppendixB"/>.</t>

<figure title="TE interfaces YANG subtree from the TE device YANG data model" anchor="fig-if-te-02"><artwork><![CDATA[
module: ietf-te-device

  augment /te:te:
    +--rw interfaces
       +--rw threshold-type?            enumeration
       +--rw delta-percentage?          rt-types:percentage
       +--rw threshold-specification?   enumeration
       +--rw up-thresholds*             rt-types:percentage
       +--rw down-thresholds*           rt-types:percentage
       +--rw up-down-thresholds*        rt-types:percentage
       +--rw interface* [name]
          +--rw name                                if:interface-ref
          +--rw te-metric?
          |       te-types:te-metric
          +--rw (admin-group-type)?
          |  +--:(value-admin-groups)
          |  |     ...
          |  +--:(named-admin-groups)
          |        ...
          +--rw (srlg-type)?
          |  +--:(value-srlgs)
          |  |     ...
          |  +--:(named-srlgs)
          |        ...
          +--rw threshold-type?                     enumeration
          +--rw delta-percentage?
          |       rt-types:percentage
          +--rw threshold-specification?            enumeration
          +--rw up-thresholds*
          |       rt-types:percentage
          +--rw down-thresholds*
          |       rt-types:percentage
          +--rw up-down-thresholds*
          |       rt-types:percentage
          +--rw switching-capabilities* [switching-capability]
          |  +--rw switching-capability    identityref
          |  +--rw encoding?               identityref
          +--ro te-advertisements-state
             +--ro flood-interval?           uint32
             +--ro last-flooded-time?        uint32
             +--ro next-flooded-time?        uint32
             +--ro last-flooded-trigger?     enumeration
             +--ro advertised-level-areas* [level-area]
                   ...

]]></artwork></figure>

<t>The main elements under the interfaces container are:</t>

<t>threshold-type:</t>

<ul empty="true"><li>
  <t>An optional enumeration that specifies the type of thresholding mechanism used for flooding bandwidth updates for all TE interfaces on the device. Options include 'delta' (flooding on a change greater than a specified delta) or 'threshold-crossed' (flooding when bandwidth crosses a defined threshold).</t>
</li></ul>

<t>delta-percentage:</t>

<ul empty="true"><li>
  <t>An optional percentage value, used when threshold-type is 'delta', indicating the change in reservable bandwidth that triggers an IGP update for all TE interfaces.</t>
</li></ul>

<t>threshold-specification:</t>

<ul empty="true"><li>
  <t>An optional enumeration, used when threshold-type is 'threshold-crossed', to define whether a single set of 'mirrored-up-down' thresholds or separate 'separate-up-down' thresholds are used for increasing and decreasing bandwidth. This applies globally to all TE interfaces.</t>
</li></ul>

<t>up-thresholds:</t>

<ul empty="true"><li>
  <t>A list of percentage values, used with 'separate-up-down' thresholding, that define the points at which bandwidth updates are triggered when the reservable bandwidth is increasing across all TE interfaces.</t>
</li></ul>

<t>down-thresholds:</t>

<ul empty="true"><li>
  <t>A list of percentage values, used with 'separate-up-down' thresholding, that define the points at which bandwidth updates are triggered when the reservable bandwidth is decreasing across all TE interfaces.</t>
</li></ul>

<t>up-down-thresholds:</t>

<ul empty="true"><li>
  <t>A list of percentage values, used with 'mirrored-up-down' thresholding, that define the points at which bandwidth updates are triggered for both increasing and decreasing reservable bandwidth across all TE interfaces.</t>
</li></ul>

<t>interface:</t>

<ul empty="true"><li>
  <t>A list of individual TE interfaces configured on the device. Each entry represents a network interface enabled for Traffic Engineering and contains its specific attributes and state. A TE interface is identified by the 'name' leaf, which references an existing network interface on the device.</t>
</li></ul>

<ul empty="true"><li>
  <t>name:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A leaf that uniquely identifies the TE interface, referencing an existing network interface.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>te-metric:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>An optional leaf that holds the TE metric value associated with this specific interface, used during path computation.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>admin-group-type:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A choice node that allows configuring administrative groups for the interface using either direct values or named references.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>value-admin-groups:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A choice for defining administrative groups using direct bitmask values.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>named-admin-groups:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A list of named administrative groups applied to this TE interface, referencing globally defined named administrative groups.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>srlg-type:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A choice node that allows configuring SRLGs for the interface using either direct values or named references.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>value-srlgs:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>A list of direct SRLG values that this link is a part of.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>named-srlgs:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>A list of named SRLGs applied to this interface, referencing globally defined named SRLGs.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>threshold-type:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>An optional enumeration, similar to the global threshold-type, but specifically for this individual TE interface, allowing per-interface override of the global bandwidth flooding behavior.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>delta-percentage:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>An optional percentage value, specific to this interface, used when its threshold-type is 'delta'.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>threshold-specification:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>An optional enumeration, specific to this interface, used when its threshold-type is 'threshold-crossed'.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>up-thresholds:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A list of percentage values, specific to this interface, used with 'separate-up-down' thresholding for increasing bandwidth.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>down-thresholds:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A list of percentage values, specific to this interface, used with 'separate-up-down' thresholding for decreasing bandwidth.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>up-down-thresholds:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A list of percentage values, specific to this interface, used with 'mirrored-up-down' thresholding for both increasing and decreasing bandwidth.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>switching-capabilities:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A list of switching capabilities supported by this interface.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>switching-capability:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An identityref indicating a specific switching capability (e.g., Packet, Lambda, Fiber).</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>encoding:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An optional identityref indicating the LSP encoding type supported by this capability on the interface.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>te-advertisements-state:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A read-only container that provides operational state information related to how this TE interface's attributes are advertised.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>flood-interval:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An optional leaf indicating the configured periodic flooding interval for this interface.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>last-flooded-time:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An optional leaf showing the time elapsed since the last advertisement flood for this interface.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>next-flooded-time:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An optional leaf showing the time remaining until the next scheduled advertisement flood for this interface.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>last-flooded-trigger:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An optional enumeration indicating the event that triggered the last advertisement flood (e.g., link-up, bandwidth-change, periodic-timer).</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>advertised-level-areas:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>A list of IGP level-areas in which this TE interface's link state information is advertised.</t>
    </li></ul>
  </li></ul>
</li></ul>

</section>
</section>
<section anchor="tree-diagram-1"><name>Tree Diagram</name>

<t><xref target="fig-te-dev-tree"/> shows the tree diagram of the device TE YANG data model defined in
the 'ietf-te-device' module.</t>

<figure title="TE Tunnel device model YANG tree diagram" anchor="fig-te-dev-tree"><artwork><![CDATA[
module: ietf-te-device

  augment /te:te:
    +--rw interfaces
       +--rw threshold-type?            enumeration
       +--rw delta-percentage?          rt-types:percentage
       +--rw threshold-specification?   enumeration
       +--rw up-thresholds*             rt-types:percentage
       +--rw down-thresholds*           rt-types:percentage
       +--rw up-down-thresholds*        rt-types:percentage
       +--rw interface* [name]
          +--rw name                                if:interface-ref
          +--rw te-metric?
          |       te-types:te-metric
          +--rw (admin-group-type)?
          |  +--:(value-admin-groups)
          |  |  +--rw (value-admin-group-type)?
          |  |     +--:(admin-groups)
          |  |     |  +--rw admin-group?
          |  |     |          te-types:admin-group
          |  |     +--:(extended-admin-groups)
          |  |              {te-types:extended-admin-groups}?
          |  |        +--rw extended-admin-group?
          |  |                te-types:extended-admin-group
          |  +--:(named-admin-groups)
          |     +--rw named-admin-groups* [named-admin-group]
          |             {te-types:extended-admin-groups,
          |              te-types:named-extended-admin-groups}?
          |        +--rw named-admin-group    leafref
          +--rw (srlg-type)?
          |  +--:(value-srlgs)
          |  |  +--rw values* [value]
          |  |     +--rw value    uint32
          |  +--:(named-srlgs)
          |     +--rw named-srlgs* [named-srlg]
          |             {te-types:named-srlg-groups}?
          |        +--rw named-srlg    leafref
          +--rw threshold-type?                     enumeration
          +--rw delta-percentage?
          |       rt-types:percentage
          +--rw threshold-specification?            enumeration
          +--rw up-thresholds*
          |       rt-types:percentage
          +--rw down-thresholds*
          |       rt-types:percentage
          +--rw up-down-thresholds*
          |       rt-types:percentage
          +--rw switching-capabilities* [switching-capability]
          |  +--rw switching-capability    identityref
          |  +--rw encoding?               identityref
          +--ro te-advertisements-state
             +--ro flood-interval?           uint32
             +--ro last-flooded-time?        uint32
             +--ro next-flooded-time?        uint32
             +--ro last-flooded-trigger?     enumeration
             +--ro advertised-level-areas* [level-area]
                +--ro level-area    uint32
  augment /te:te/te:globals:
    +--rw lsp-install-interval?        uint32
    +--rw lsp-cleanup-interval?        uint32
    +--rw lsp-invalidation-interval?   uint32
  augment /te:te/te:tunnels/te:tunnel:
    +--rw path-invalidation-action?    identityref
    +--rw lsp-install-interval?        uint32
    +--rw lsp-cleanup-interval?        uint32
    +--rw lsp-invalidation-interval?   uint32
  augment /te:te/te:lsps/te:lsp:
    +--ro lsp-timers
    |  +--ro uptime?            uint32
    |  +--ro time-to-install?   uint32
    |  +--ro time-to-destroy?   uint32
    +--ro downstream-info
    |  +--ro nhop?                 te-types:te-tp-id
    |  +--ro outgoing-interface?   if:interface-ref
    |  +--ro neighbor
    |  |  +--ro id?     te-gen-node-id
    |  |  +--ro type?   enumeration
    |  +--ro label?                rt-types:generalized-label
    +--ro upstream-info
       +--ro phop?       te-types:te-tp-id
       +--ro neighbor
       |  +--ro id?     te-gen-node-id
       |  +--ro type?   enumeration
       +--ro label?      rt-types:generalized-label

  rpcs:
    +---x link-state-update
       +---w input
          +---w (filter-type)
             +--:(match-all)
             |  +---w all          empty
             +--:(match-one-interface)
                +---w interface?   if:interface-ref

]]></artwork></figure>

</section>
<section anchor="yang-module-1"><name>YANG Module</name>

<t>The 'ietf-te-device' module imports the following modules:</t>

<t><list style="symbols">
  <t>ietf-interfaces defined in <xref target="RFC8343"/></t>
  <t>ietf-routing-types defined in <xref target="RFC8294"/></t>
  <t>ietf-te-types defined in <xref target="I-D.draft-ietf-teas-rfc8776-update"/></t>
  <t>ietf-te defined in this document</t>
</list></t>

<figure><artwork><![CDATA[
<CODE BEGINS> file "ietf-te-device@2026-02-24.yang"
module ietf-te-device {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-te-device";

  prefix te-dev;

  /* Import TE module */

  import ietf-te {
    prefix te;
    reference
      "RFCXXXX: A YANG Data Model for Traffic Engineering Tunnels,
       Label Switched Paths, and Interfaces.";
  }

  /* Import TE types */

  import ietf-te-types {
    prefix te-types;
    reference
      "draft-ietf-teas-rfc8776-update: Common YANG Data Types
       for Traffic Engineering.";
  }
  import ietf-interfaces {
    prefix if;
    reference
      "RFC8343: A YANG Data Model for Interface Management";
  }
  import ietf-routing-types {
    prefix rt-types;
    reference
      "RFC8294: Common YANG Data Types for the Routing Area";
  }

  organization
    "IETF Traffic Engineering Architecture and Signaling (TEAS)
     Working Group";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/teas/>
     WG List:  <mailto:teas@ietf.org>

     Editor:   Tarek Saad
               <mailto:tsaad.net@gmail.com>

     Editor:   Rakesh Gandhi
               <mailto:rgandhi@cisco.com>

     Editor:   Vishnu Pavan Beeram
               <mailto:vbeeram@juniper.net>

     Editor:   Himanshu Shah
               <mailto:hshah@ciena.com>

     Editor:   Xufeng Liu
               <mailto: xufeng.liu.ietf@gmail.com>

     Editor:   Igor Bryskin
               <mailto:i_bryskin@yahoo.com>";

  description
    "This module defines a data model for TE device configurations,
     state, and RPCs.

     Copyright (c) 2025 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
     for full legal notices.";

  // RFC Ed.: replace XXXX with actual RFC number and remove this
  // note.
  // RFC Ed.: update the date below with the date of RFC publication
  // and remove this note.

  revision 2025-02-24 {
    description
      "Initial revision for the TE device YANG module.";
    reference
      "RFCXXXX: A YANG Data Model for Traffic Engineering Tunnels
       and Interfaces";
  }

  grouping lsp-device-timers {
    description
      "Device TE LSP timers configs.";
    leaf lsp-install-interval {
      type uint32;
      units "seconds";
      description
        "TE LSP installation delay time.";
    }
    leaf lsp-cleanup-interval {
      type uint32;
      units "seconds";
      description
        "TE LSP cleanup delay time.";
    }
    leaf lsp-invalidation-interval {
      type uint32;
      units "seconds";
      description
        "TE LSP path invalidation before taking action delay time.";
    }
  }

  grouping te-igp-flooding-bandwidth-config {
    description
      "Configurable items for igp flooding bandwidth
       threshold configuration.";
    leaf threshold-type {
      type enumeration {
        enum delta {
          description
            "'delta' indicates that the local
             system should flood IGP updates when a
             change in reserved bandwidth >= the specified
             delta occurs on the interface.";
        }
        enum threshold-crossed {
          description
            "THRESHOLD-CROSSED indicates that
             the local system should trigger an update (and
             hence flood) the reserved bandwidth when the
             reserved bandwidth changes such that it crosses,
             or becomes equal to one of the threshold values.";
        }
      }
      description
        "The type of threshold that should be used to specify the
         values at which bandwidth is flooded. 'delta' indicates that
         the local system should flood IGP updates when a change in
         reserved bandwidth >= the specified delta occurs on the
         interface. Where 'threshold-crossed' is specified, the local
         system should trigger an update (and hence flood) the
         reserved bandwidth when the reserved bandwidth changes such
         that it crosses, or becomes equal to one of the threshold
         values.";
    }
    leaf delta-percentage {
      when "../threshold-type = 'delta'" {
        description
          "The percentage delta can only be specified when the
           threshold type is specified to be a percentage delta of
           the reserved bandwidth.";
      }
      type rt-types:percentage;
      description
        "The percentage of the maximum-reservable-bandwidth
         considered as the delta that results in an IGP update
         being flooded.";
    }
    leaf threshold-specification {
      when "../threshold-type = 'threshold-crossed'" {
        description
          "The selection of whether mirrored or separate threshold
           values are to be used requires user-specified thresholds
           to be set.";
      }
      type enumeration {
        enum mirrored-up-down {
          description
            "mirrored-up-down indicates that a single set of
             threshold values should be used for both increasing
             and decreasing bandwidth when determining whether
             to trigger updated bandwidth values to be flooded
             in the IGP TE extensions.";
        }
        enum separate-up-down {
          description
            "separate-up-down indicates that a separate
             threshold values should be used for the increasing
             and decreasing bandwidth when determining whether
             to trigger updated bandwidth values to be flooded
             in the IGP TE extensions.";
        }
      }
      description
        "This value specifies whether a single set of threshold
         values should be used for both increasing and decreasing
         bandwidth when determining whether to trigger updated
         bandwidth values to be flooded in the IGP TE extensions.
         'mirrored-up-down' indicates that a single value (or set of
         values) should be used for both increasing and decreasing
         values, where 'separate-up-down' specifies that the
         increasing and decreasing values will be separately
         specified.";
    }
    leaf-list up-thresholds {
      when "../threshold-type = 'threshold-crossed'"
         + "and ../threshold-specification = 'separate-up-down'" {
        description
          "A list of up-thresholds can only be specified when the
           bandwidth update is triggered based on crossing a
           threshold and separate up and down thresholds are
           required.";
      }
      type rt-types:percentage;
      description
        "The thresholds (expressed as a percentage of the maximum
         reservable bandwidth) at which bandwidth updates are to be
         triggered when the bandwidth is increasing.";
    }
    leaf-list down-thresholds {
      when "../threshold-type = 'threshold-crossed'"
         + "and ../threshold-specification = 'separate-up-down'" {
        description
          "A list of down-thresholds can only be specified when the
           bandwidth update is triggered based on crossing a
           threshold and separate up and down thresholds are
           required.";
      }
      type rt-types:percentage;
      description
        "The thresholds (expressed as a percentage of the maximum
         reservable bandwidth) at which bandwidth updates are to be
         triggered when the bandwidth is decreasing.";
    }
    leaf-list up-down-thresholds {
      when "../threshold-type = 'threshold-crossed'"
         + "and ../threshold-specification = 'mirrored-up-down'" {
        description
          "A list of thresholds corresponding to both increasing
           and decreasing bandwidths can be specified only when an
           update is triggered based on crossing a threshold, and
           the same up and down thresholds are required.";
      }
      type rt-types:percentage;
      description
        "The thresholds (expressed as a percentage of the maximum
         reservable bandwidth of the interface) at which bandwidth
         updates are flooded - used both when the bandwidth is
         increasing and decreasing.";
    }
  }

  /**
   * TE device augmentations
   */
  augment "/te:te" {
    description
      "TE global container.";
    /* TE Interface Configuration Data */
    container interfaces {
      description
        "Configuration data model for TE interfaces.";
      uses te-igp-flooding-bandwidth-config;
      list interface {
        key "name";
        description
          "The list of interfaces enabled for TE.";
        leaf name {
          type if:interface-ref;
          description
            "The reference to interface enabled for TE.";
        }
        /* TE interface parameters */
        leaf te-metric {
          type te-types:te-metric;
          description
            "TE interface metric.";
        }
        choice admin-group-type {
          description
            "TE interface administrative groups
             representation type.";
          case value-admin-groups {
            choice value-admin-group-type {
              description
                "The type of admin-groups.";
              case admin-groups {
                description
                  "Administrative group/Resource
                   class.";
                leaf admin-group {
                  type te-types:admin-group;
                  description
                    "TE interface administrative group.";
                }
              }
              case extended-admin-groups {
                if-feature "te-types:extended-admin-groups";
                description
                  "Extended administrative group/Resource
                   class.";
                leaf extended-admin-group {
                  type te-types:extended-admin-group;
                  description
                    "TE interface extended administrative group.";
                }
              }
            }
          }
          case named-admin-groups {
            list named-admin-groups {
              if-feature "te-types:extended-admin-groups";
              if-feature "te-types:named-extended-admin-groups";
              key "named-admin-group";
              description
                "A list of named admin-group entries.";
              leaf named-admin-group {
                type leafref {
                  path "../../../../te:globals/"
                     + "te:named-admin-groups/te:named-admin-group/"
                     + "te:name";
                }
                description
                  "A named admin-group entry.";
              }
            }
          }
        }
        choice srlg-type {
          description
            "Choice of SRLG configuration.";
          case value-srlgs {
            list values {
              key "value";
              description
                "List of SRLG values that
                 this link is part of.";
              leaf value {
                type uint32 {
                  range "0..4294967295";
                }
                description
                  "Value of the SRLG";
              }
            }
          }
          case named-srlgs {
            list named-srlgs {
              if-feature "te-types:named-srlg-groups";
              key "named-srlg";
              description
                "A list of named SRLG entries.";
              leaf named-srlg {
                type leafref {
                  path "../../../../te:globals/"
                     + "te:named-srlgs/te:named-srlg/te:name";
                }
                description
                  "A named SRLG entry.";
              }
            }
          }
        }
        uses te-igp-flooding-bandwidth-config;
        list switching-capabilities {
          key "switching-capability";
          description
            "List of interface capabilities for this interface.";
          leaf switching-capability {
            type identityref {
              base te-types:switching-capabilities;
            }
            description
              "Switching Capability for this interface.";
          }
          leaf encoding {
            type identityref {
              base te-types:lsp-encoding-types;
            }
            description
              "Encoding supported by this interface.";
          }
        }
        container te-advertisements-state {
          config false;
          description
            "TE interface advertisements state container.";
          leaf flood-interval {
            type uint32;
            description
              "The periodic flooding interval.";
          }
          leaf last-flooded-time {
            type uint32;
            units "seconds";
            description
              "Time elapsed since last flooding in seconds.";
          }
          leaf next-flooded-time {
            type uint32;
            units "seconds";
            description
              "Time remained for next flooding in seconds.";
          }
          leaf last-flooded-trigger {
            type enumeration {
              enum link-up {
                description
                  "Link-up flooding trigger.";
              }
              enum link-down {
                description
                  "Link-down flooding trigger.";
              }
              enum threshold-up {
                description
                  "Bandwidth reservation up threshold.";
              }
              enum threshold-down {
                description
                  "Bandwidth reservation down threshold.";
              }
              enum bandwidth-change {
                description
                  "Bandwidth capacity change.";
              }
              enum user-initiated {
                description
                  "Initiated by user.";
              }
              enum srlg-change {
                description
                  "SRLG property change.";
              }
              enum periodic-timer {
                description
                  "Periodic timer expired.";
              }
            }
            default "periodic-timer";
            description
              "Trigger for the last flood.";
          }
          list advertised-level-areas {
            key "level-area";
            description
              "List of level-areas that the TE interface is
               advertised in.";
            leaf level-area {
              type uint32;
              description
                "The IGP area or level where the TE interface link
                 state is advertised in.";
            }
          }
        }
      }
    }
  }

  /* TE globals device augmentation */

  augment "/te:te/te:globals" {
    description
      "Global TE device specific configuration parameters.";
    uses lsp-device-timers;
  }

  /* TE tunnels device configuration augmentation */

  augment "/te:te/te:tunnels/te:tunnel" {
    description
      "Tunnel device dependent augmentation.";
    leaf path-invalidation-action {
      type identityref {
        base te-types:path-invalidation-action-type;
      }
      description
        "Tunnel path invalidation action.";
    }
    uses lsp-device-timers;
  }

  /* TE LSPs device state augmentation */

  augment "/te:te/te:lsps/te:lsp" {
    description
      "TE LSP device dependent augmentation.";
    container lsp-timers {
      when "../te:origin-type = 'ingress'" {
        description
          "Applicable to ingress LSPs only.";
      }
      description
        "Ingress LSP timers.";
      leaf uptime {
        type uint32;
        units "seconds";
        description
          "The LSP uptime.";
      }
      leaf time-to-install {
        type uint32;
        units "seconds";
        description
          "The time remaining for a new LSP to be instantiated
           in forwarding to carry traffic.";
      }
      leaf time-to-destroy {
        type uint32;
        units "seconds";
        description
          "The time remaining for an existing LSP to be torn down.";
      }
    }
    container downstream-info {
      when "../te:origin-type != 'egress'" {
        description
          "Downstream information of the LSP.";
      }
      description
        "Downstream information.";
      leaf nhop {
        type te-types:te-tp-id;
        description
          "Downstream next-hop address.";
      }
      leaf outgoing-interface {
        type if:interface-ref;
        description
          "Downstream interface.";
      }
      container neighbor {
        uses te-types:te-generic-node-id;
        description
          "Downstream neighbor address.";
      }
      leaf label {
        type rt-types:generalized-label;
        description
          "Downstream label.";
      }
    }
    container upstream-info {
      when "../te:origin-type != 'ingress'" {
        description
          "Upstream information of the LSP.";
      }
      description
        "Upstream information.";
      leaf phop {
        type te-types:te-tp-id;
        description
          "Upstream next-hop or previous-hop address.";
      }
      container neighbor {
        uses te-types:te-generic-node-id;
        description
          "Upstream neighbor address.";
      }
      leaf label {
        type rt-types:generalized-label;
        description
          "Upstream label.";
      }
    }
  }

  /* TE interfaces RPCs/execution Data */

  rpc link-state-update {
    description
      "Triggers a link state update for the specific interface.";
    input {
      choice filter-type {
        mandatory true;
        description
          "Filter choice.";
        case match-all {
          leaf all {
            type empty;
            mandatory true;
            description
              "Match all TE interfaces.";
          }
        }
        case match-one-interface {
          leaf interface {
            type if:interface-ref;
            description
              "Match a specific TE interface.";
          }
        }
      }
    }
  }
}
<CODE ENDS>
]]></artwork></figure>

</section>
</section>
<section anchor="notifications"><name>Notifications</name>

<t>Notifications are a key component of any topology data model.</t>

<t><xref target="RFC8639"/> and <xref target="RFC8641"/> define a subscription mechanism and a push
mechanism for YANG datastores.  These mechanisms currently allow the
user to:</t>

<t><list style="symbols">
  <t>Subscribe to notifications on a per-client basis.</t>
  <t>Specify subtree filters or XML Path Language (XPath) filters so
that only contents of interest will be sent.</t>
  <t>Specify either periodic or on-demand notifications.</t>
</list></t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document registers the following URIs in the IETF XML registry
<xref target="RFC3688"/>.
Following the format in <xref target="RFC3688"/>, the following registrations are
requested to be made.</t>

<figure><artwork><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-te
   Registrant Contact:  The IESG.
   XML: N/A, the requested URI is an XML namespace.

   URI: urn:ietf:params:xml:ns:yang:ietf-te-device
   Registrant Contact:  The IESG.
   XML: N/A, the requested URI is an XML namespace.
]]></artwork></figure>

<t>This document registers two YANG modules in the YANG Module Names
registry <xref target="RFC6020"/>.</t>

<figure><artwork><![CDATA[
   Name:       ietf-te
   Namespace:  urn:ietf:params:xml:ns:yang:ietf-te
   Prefix:     te
   Reference:  RFCXXXX
   Maintained by IANA: N

   Name:       ietf-te-device
   Namespace:  urn:ietf:params:xml:ns:yang:ietf-te-device
   Prefix:     te-device
   Reference:  RFCXXXX
   Maintained by IANA: N
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The YANG module specified in this document defines a schema for data that is
designed to be accessed via YANG-based management protocols, such as
NETCONF <xref target="RFC6241"/> and RESTCONF <xref target="RFC8040"/>. These YANG-based management
protocols (1) have to use a secure transport layer
(e.g., SSH <xref target="RFC6242"/>, TLS <xref target="RFC8446"/>, and QUIC <xref target="RFC9000"/>) and (2) have
to use mutual authentication.</t>

<t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/> provides the
means to restrict access for particular NETCONF or RESTCONF users to a
preconfigured subset of all available NETCONF or RESTCONF protocol operations
and content.</t>

<t>There are a number of data nodes defined in this YANG module that are
writable/creatable/deletable (i.e., config true, which is the default). These
data nodes may be considered sensitive or vulnerable in some network
environments. Write operations (e.g., edit-config) to these data nodes without
proper protection can have a negative effect on network operations. These are
the subtrees and data nodes and their sensitivity/vulnerability:</t>

<t>"/te/globals":  This module specifies the global TE configurations on a device.
Unauthorized access to this container could cause the device to ignore packets
it should receive and process.</t>

<t>"/te/tunnels":  This list specifies the configuration and state of TE Tunnels
present on the device or controller.  Unauthorized access to this list could
cause the device to ignore packets it should receive and process. An attacker
may also use state to derive information about the network topology,
and subsequently orchestrate further attacks.</t>

<t>"/te/interfaces":  This list specifies the configuration and state TE interfaces
on a device. Unauthorized access to this list could cause the device to ignore packets it
should receive and process.</t>

<t>Some of the readable data nodes in this YANG module may be considered sensitive
or vulnerable in some network environments. It is thus important to control
read access (e.g., via get, get-config, or notification) to these data nodes.
These are the subtrees and data nodes and their sensitivity/vulnerability:</t>

<t>"/te/lsps": this list contains information state about established LSPs in the network.
An attacker can use this information to derive information about the network topology,
and subsequently orchestrate further attacks.</t>

<t>Some of the RPC operations in this YANG module may be considered sensitive or
vulnerable in some network environments. It is thus important to control access
to these operations. These are the operations and their
sensitivity/vulnerability:</t>

<t>"/te/tunnels-actions": using this RPC, an attacker can modify existing paths that
may be carrying live traffic, and hence result in interruption to services
carried over the network.</t>

<t>"/te/tunnels-path-compute": using this RPC, an attacker can retrieve sensitive
information about the network provider which can be used to orchestrate further
attacks.</t>

<t>The YANG module defines a set of identities, types, and groupings. These nodes
are intended to be reused by other YANG modules. The module by itself does not
expose any data nodes that are writable, data nodes that contain read-only
state, or RPCs.  As such, there are no additional security issues related to
the YANG module that need to be considered.</t>

<t>Modules that use the groupings that are defined in this document should
identify the corresponding security considerations. For example, reusing some
of these groupings will expose privacy-related information (e.g.,
'node-example').</t>

</section>
<section anchor="acknowledgement"><name>Acknowledgement</name>

<t>The authors would like to thank the  members of the multivendor YANG design
team who are involved in the definition of this model.</t>

<t>The authors would like to thank Tom Petch and Adrian Farrel for reviewing and
providing useful feedback about the document. The authors would also like to
thank Loa Andersson, Lou Berger, Sergio Belotti, Italo Busi, Carlo Perocchio,
Francesco Lazzeri, Aihua Guo, Dhruv Dhody, and Raqib Jones for providing
feedback on this document.</t>

</section>
<section anchor="contributors"><name>Contributors</name>

<figure><artwork><![CDATA[
   Oscar Gonzalez de Dios
   Telefonica

   Email: oscar.gonzalezdedios@telefonica.com

   Himanshu Shah
   Ciena

   Email: hshah@ciena.com


   Xia Chen
   Huawei Technologies

   Email: jescia.chenxia@huawei.com


   Bin Wen
   Comcast

   Email: Bin_Wen@cable.comcast.com

]]></artwork></figure>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

<reference anchor="ITU_G.808.1" >
  <front>
    <title>Generic protection switching - Linear trail and subnetwork protection</title>
    <author >
      <organization>ITU-T Recommendation G.808.1</organization>
    </author>
    <date year="2014" month="May"/>
  </front>
  <seriesInfo name="https://www.itu.int/rec/T-REC-G.808.1-201405-I" value=""/>
</reference>


<reference anchor="RFC9256">
  <front>
    <title>Segment Routing Policy Architecture</title>
    <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
    <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
    <author fullname="D. Voyer" initials="D." surname="Voyer"/>
    <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
    <author fullname="P. Mattes" initials="P." surname="Mattes"/>
    <date month="July" year="2022"/>
    <abstract>
      <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
      <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9256"/>
  <seriesInfo name="DOI" value="10.17487/RFC9256"/>
</reference>
<reference anchor="RFC3209">
  <front>
    <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
    <author fullname="D. Awduche" initials="D." surname="Awduche"/>
    <author fullname="L. Berger" initials="L." surname="Berger"/>
    <author fullname="D. Gan" initials="D." surname="Gan"/>
    <author fullname="T. Li" initials="T." surname="Li"/>
    <author fullname="V. Srinivasan" initials="V." surname="Srinivasan"/>
    <author fullname="G. Swallow" initials="G." surname="Swallow"/>
    <date month="December" year="2001"/>
    <abstract>
      <t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching). Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels. A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3209"/>
  <seriesInfo name="DOI" value="10.17487/RFC3209"/>
</reference>
<reference anchor="RFC3473">
  <front>
    <title>Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) Extensions</title>
    <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
    <date month="January" year="2003"/>
    <abstract>
      <t>This document describes extensions to Multi-Protocol Label Switching (MPLS) Resource ReserVation Protocol - Traffic Engineering (RSVP-TE) signaling required to support Generalized MPLS. Generalized MPLS extends the MPLS control plane to encompass time-division (e.g., Synchronous Optical Network and Synchronous Digital Hierarchy, SONET/SDH), wavelength (optical lambdas) and spatial switching (e.g., incoming port or fiber to outgoing port or fiber). This document presents a RSVP-TE specific description of the extensions. A generic functional description can be found in separate documents. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3473"/>
  <seriesInfo name="DOI" value="10.17487/RFC3473"/>
</reference>
<reference anchor="RFC6241">
  <front>
    <title>Network Configuration Protocol (NETCONF)</title>
    <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
    <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
    <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
    <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
    <date month="June" year="2011"/>
    <abstract>
      <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6241"/>
  <seriesInfo name="DOI" value="10.17487/RFC6241"/>
</reference>
<reference anchor="RFC7950">
  <front>
    <title>The YANG 1.1 Data Modeling Language</title>
    <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
    <date month="August" year="2016"/>
    <abstract>
      <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7950"/>
  <seriesInfo name="DOI" value="10.17487/RFC7950"/>
</reference>
<reference anchor="RFC9911">
  <front>
    <title>Common YANG Data Types</title>
    <author fullname="J. Schönwälder" initials="J." role="editor" surname="Schönwälder"/>
    <date month="December" year="2025"/>
    <abstract>
      <t>This document defines a collection of common data types to be used with the YANG data modeling language. It includes several new type definitions and obsoletes RFC 6991.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9911"/>
  <seriesInfo name="DOI" value="10.17487/RFC9911"/>
</reference>
<reference anchor="RFC8294">
  <front>
    <title>Common YANG Data Types for the Routing Area</title>
    <author fullname="X. Liu" initials="X." surname="Liu"/>
    <author fullname="Y. Qu" initials="Y." surname="Qu"/>
    <author fullname="A. Lindem" initials="A." surname="Lindem"/>
    <author fullname="C. Hopps" initials="C." surname="Hopps"/>
    <author fullname="L. Berger" initials="L." surname="Berger"/>
    <date month="December" year="2017"/>
    <abstract>
      <t>This document defines a collection of common data types using the YANG data modeling language. These derived common types are designed to be imported by other modules defined in the routing area.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8294"/>
  <seriesInfo name="DOI" value="10.17487/RFC8294"/>
</reference>

<reference anchor="I-D.draft-ietf-teas-rfc8776-update">
   <front>
      <title>Common YANG Data Types for Traffic Engineering</title>
      <author fullname="Italo Busi" initials="I." surname="Busi">
         <organization>Huawei</organization>
      </author>
      <author fullname="Aihua Guo" initials="A." surname="Guo">
         <organization>Futurewei Technologies</organization>
      </author>
      <author fullname="Xufeng Liu" initials="X." surname="Liu">
         <organization>Alef Edge</organization>
      </author>
      <author fullname="Tarek Saad" initials="T." surname="Saad">
         <organization>Cisco Systems Inc.</organization>
      </author>
      <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
         <organization>Individual</organization>
      </author>
      <date day="18" month="February" year="2026"/>
      <abstract>
	 <t>   This document defines a collection of common data types, identities,
   and groupings in YANG data modeling language.  These derived common
   data types, identities and groupings are intended to be imported by
   other modules, e.g., those which model the Traffic Engineering (TE)
   configuration and state capabilities.

   This document obsoletes RFC 8776.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-teas-rfc8776-update-22"/>
   
</reference>
<reference anchor="RFC8340">
  <front>
    <title>YANG Tree Diagrams</title>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
    <date month="March" year="2018"/>
    <abstract>
      <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="215"/>
  <seriesInfo name="RFC" value="8340"/>
  <seriesInfo name="DOI" value="10.17487/RFC8340"/>
</reference>
<reference anchor="RFC9012">
  <front>
    <title>The BGP Tunnel Encapsulation Attribute</title>
    <author fullname="K. Patel" initials="K." surname="Patel"/>
    <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
    <author fullname="S. Sangli" initials="S." surname="Sangli"/>
    <author fullname="J. Scudder" initials="J." surname="Scudder"/>
    <date month="April" year="2021"/>
    <abstract>
      <t>This document defines a BGP path attribute known as the "Tunnel Encapsulation attribute", which can be used with BGP UPDATEs of various Subsequent Address Family Identifiers (SAFIs) to provide information needed to create tunnels and their corresponding encapsulation headers. It provides encodings for a number of tunnel types, along with procedures for choosing between alternate tunnels and routing packets into tunnels.</t>
      <t>This document obsoletes RFC 5512, which provided an earlier definition of the Tunnel Encapsulation attribute. RFC 5512 was never deployed in production. Since RFC 5566 relies on RFC 5512, it is likewise obsoleted. This document updates RFC 5640 by indicating that the Load-Balancing Block sub-TLV may be included in any Tunnel Encapsulation attribute where load balancing is desired.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9012"/>
  <seriesInfo name="DOI" value="10.17487/RFC9012"/>
</reference>
<reference anchor="RFC8345">
  <front>
    <title>A YANG Data Model for Network Topologies</title>
    <author fullname="A. Clemm" initials="A." surname="Clemm"/>
    <author fullname="J. Medved" initials="J." surname="Medved"/>
    <author fullname="R. Varga" initials="R." surname="Varga"/>
    <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
    <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
    <author fullname="X. Liu" initials="X." surname="Liu"/>
    <date month="March" year="2018"/>
    <abstract>
      <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8345"/>
  <seriesInfo name="DOI" value="10.17487/RFC8345"/>
</reference>
<reference anchor="RFC8795">
  <front>
    <title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
    <author fullname="X. Liu" initials="X." surname="Liu"/>
    <author fullname="I. Bryskin" initials="I." surname="Bryskin"/>
    <author fullname="V. Beeram" initials="V." surname="Beeram"/>
    <author fullname="T. Saad" initials="T." surname="Saad"/>
    <author fullname="H. Shah" initials="H." surname="Shah"/>
    <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
    <date month="August" year="2020"/>
    <abstract>
      <t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8795"/>
  <seriesInfo name="DOI" value="10.17487/RFC8795"/>
</reference>
<reference anchor="RFC4206">
  <front>
    <title>Label Switched Paths (LSP) Hierarchy with Generalized Multi-Protocol Label Switching (GMPLS) Traffic Engineering (TE)</title>
    <author fullname="K. Kompella" initials="K." surname="Kompella"/>
    <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
    <date month="October" year="2005"/>
    <abstract>
      <t>To improve scalability of Generalized Multi-Protocol Label Switching (GMPLS) it may be useful to aggregate Label Switched Paths (LSPs) by creating a hierarchy of such LSPs. A way to create such a hierarchy is by (a) a Label Switching Router (LSR) creating a Traffic Engineering Label Switched Path (TE LSP), (b) the LSR forming a forwarding adjacency (FA) out of that LSP (by advertising this LSP as a Traffic Engineering (TE) link into the same instance of ISIS/OSPF as the one that was used to create the LSP), (c) allowing other LSRs to use FAs for their path computation, and (d) nesting of LSPs originated by other LSRs into that LSP (by using the label stack construct).</t>
      <t>This document describes the mechanisms to accomplish this. [PROPOSED STANDARD]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4206"/>
  <seriesInfo name="DOI" value="10.17487/RFC4206"/>
</reference>
<reference anchor="RFC4872">
  <front>
    <title>RSVP-TE Extensions in Support of End-to-End Generalized Multi-Protocol Label Switching (GMPLS) Recovery</title>
    <author fullname="J.P. Lang" initials="J.P." role="editor" surname="Lang"/>
    <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
    <author fullname="D. Papadimitriou" initials="D." role="editor" surname="Papadimitriou"/>
    <date month="May" year="2007"/>
    <abstract>
      <t>This document describes protocol-specific procedures and extensions for Generalized Multi-Protocol Label Switching (GMPLS) Resource ReSerVation Protocol - Traffic Engineering (RSVP-TE) signaling to support end-to-end Label Switched Path (LSP) recovery that denotes protection and restoration. A generic functional description of GMPLS recovery can be found in a companion document, RFC 4426. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4872"/>
  <seriesInfo name="DOI" value="10.17487/RFC4872"/>
</reference>
<reference anchor="RFC6780">
  <front>
    <title>RSVP ASSOCIATION Object Extensions</title>
    <author fullname="L. Berger" initials="L." surname="Berger"/>
    <author fullname="F. Le Faucheur" initials="F." surname="Le Faucheur"/>
    <author fullname="A. Narayanan" initials="A." surname="Narayanan"/>
    <date month="October" year="2012"/>
    <abstract>
      <t>The RSVP ASSOCIATION object was defined in the context of GMPLS-controlled Label Switched Paths (LSPs). In this context, the object is used to associate recovery LSPs with the LSP they are protecting. This object also has broader applicability as a mechanism to associate RSVP state. This document defines how the ASSOCIATION object can be more generally applied. This document also defines Extended ASSOCIATION objects that, in particular, can be used in the context of the MPLS Transport Profile (MPLS-TP). This document updates RFC 2205, RFC 3209, and RFC 3473. It also generalizes the definition of the Association ID field defined in RFC 4872. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6780"/>
  <seriesInfo name="DOI" value="10.17487/RFC6780"/>
</reference>
<reference anchor="RFC7471">
  <front>
    <title>OSPF Traffic Engineering (TE) Metric Extensions</title>
    <author fullname="S. Giacalone" initials="S." surname="Giacalone"/>
    <author fullname="D. Ward" initials="D." surname="Ward"/>
    <author fullname="J. Drake" initials="J." surname="Drake"/>
    <author fullname="A. Atlas" initials="A." surname="Atlas"/>
    <author fullname="S. Previdi" initials="S." surname="Previdi"/>
    <date month="March" year="2015"/>
    <abstract>
      <t>In certain networks, such as, but not limited to, financial information networks (e.g., stock market data providers), network performance information (e.g., link propagation delay) is becoming critical to data path selection.</t>
      <t>This document describes common extensions to RFC 3630 "Traffic Engineering (TE) Extensions to OSPF Version 2" and RFC 5329 "Traffic Engineering Extensions to OSPF Version 3" to enable network performance information to be distributed in a scalable fashion. The information distributed using OSPF TE Metric Extensions can then be used to make path selection decisions based on network performance.</t>
      <t>Note that this document only covers the mechanisms by which network performance information is distributed. The mechanisms for measuring network performance information or using that information, once distributed, are outside the scope of this document.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7471"/>
  <seriesInfo name="DOI" value="10.17487/RFC7471"/>
</reference>
<reference anchor="RFC8570">
  <front>
    <title>IS-IS Traffic Engineering (TE) Metric Extensions</title>
    <author fullname="L. Ginsberg" initials="L." role="editor" surname="Ginsberg"/>
    <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
    <author fullname="S. Giacalone" initials="S." surname="Giacalone"/>
    <author fullname="D. Ward" initials="D." surname="Ward"/>
    <author fullname="J. Drake" initials="J." surname="Drake"/>
    <author fullname="Q. Wu" initials="Q." surname="Wu"/>
    <date month="March" year="2019"/>
    <abstract>
      <t>In certain networks, such as, but not limited to, financial information networks (e.g., stock market data providers), network-performance criteria (e.g., latency) are becoming as critical to data-path selection as other metrics.</t>
      <t>This document describes extensions to IS-IS Traffic Engineering Extensions (RFC 5305). These extensions provide a way to distribute and collect network-performance information in a scalable fashion. The information distributed using IS-IS TE Metric Extensions can then be used to make path-selection decisions based on network performance.</t>
      <t>Note that this document only covers the mechanisms with which network-performance information is distributed. The mechanisms for measuring network performance or acting on that information, once distributed, are outside the scope of this document.</t>
      <t>This document obsoletes RFC 7810.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8570"/>
  <seriesInfo name="DOI" value="10.17487/RFC8570"/>
</reference>
<reference anchor="RFC8232">
  <front>
    <title>Optimizations of Label Switched Path State Synchronization Procedures for a Stateful PCE</title>
    <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
    <author fullname="I. Minei" initials="I." surname="Minei"/>
    <author fullname="J. Medved" initials="J." surname="Medved"/>
    <author fullname="R. Varga" initials="R." surname="Varga"/>
    <author fullname="X. Zhang" initials="X." surname="Zhang"/>
    <author fullname="D. Dhody" initials="D." surname="Dhody"/>
    <date month="September" year="2017"/>
    <abstract>
      <t>A stateful Path Computation Element (PCE) has access to not only the information disseminated by the network's Interior Gateway Protocol (IGP) but also the set of active paths and their reserved resources for its computation. The additional Label Switched Path (LSP) state information allows the PCE to compute constrained paths while considering individual LSPs and their interactions. This requires a State Synchronization mechanism between the PCE and the network, the PCE and Path Computation Clients (PCCs), and cooperating PCEs. The basic mechanism for State Synchronization is part of the stateful PCE specification. This document presents motivations for optimizations to the base State Synchronization procedure and specifies the required Path Computation Element Communication Protocol (PCEP) extensions.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8232"/>
  <seriesInfo name="DOI" value="10.17487/RFC8232"/>
</reference>
<reference anchor="RFC7271">
  <front>
    <title>MPLS Transport Profile (MPLS-TP) Linear Protection to Match the Operational Expectations of Synchronous Digital Hierarchy, Optical Transport Network, and Ethernet Transport Network Operators</title>
    <author fullname="J. Ryoo" initials="J." role="editor" surname="Ryoo"/>
    <author fullname="E. Gray" initials="E." role="editor" surname="Gray"/>
    <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
    <author fullname="A. D'Alessandro" initials="A." surname="D'Alessandro"/>
    <author fullname="T. Cheung" initials="T." surname="Cheung"/>
    <author fullname="E. Osborne" initials="E." surname="Osborne"/>
    <date month="June" year="2014"/>
    <abstract>
      <t>This document describes alternate mechanisms to perform some of the functions of MPLS Transport Profile (MPLS-TP) linear protection defined in RFC 6378, and also defines additional mechanisms. The purpose of these alternate and additional mechanisms is to provide operator control and experience that more closely models the behavior of linear protection seen in other transport networks.</t>
      <t>This document also introduces capabilities and modes for linear protection. A capability is an individual behavior, and a mode is a particular combination of capabilities. Two modes are defined in this document: Protection State Coordination (PSC) mode and Automatic Protection Switching (APS) mode.</t>
      <t>This document describes the behavior of the PSC protocol including priority logic and state machine when all the capabilities associated with the APS mode are enabled.</t>
      <t>This document updates RFC 6378 in that the capability advertisement method defined here is an addition to that document.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7271"/>
  <seriesInfo name="DOI" value="10.17487/RFC7271"/>
</reference>
<reference anchor="RFC8234">
  <front>
    <title>Updates to MPLS Transport Profile (MPLS-TP) Linear Protection in Automatic Protection Switching (APS) Mode</title>
    <author fullname="J. Ryoo" initials="J." surname="Ryoo"/>
    <author fullname="T. Cheung" initials="T." surname="Cheung"/>
    <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
    <author fullname="I. Busi" initials="I." surname="Busi"/>
    <author fullname="G. Wen" initials="G." surname="Wen"/>
    <date month="August" year="2017"/>
    <abstract>
      <t>This document contains updates to MPLS Transport Profile (MPLS-TP) linear protection in Automatic Protection Switching (APS) mode defined in RFC 7271. The updates provide rules related to the initialization of the Protection State Coordination (PSC) Control Logic (in which the state machine resides) when operating in APS mode and clarify the operation related to state transition table lookup.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8234"/>
  <seriesInfo name="DOI" value="10.17487/RFC8234"/>
</reference>
<reference anchor="RFC4655">
  <front>
    <title>A Path Computation Element (PCE)-Based Architecture</title>
    <author fullname="A. Farrel" initials="A." surname="Farrel"/>
    <author fullname="J.-P. Vasseur" initials="J.-P." surname="Vasseur"/>
    <author fullname="J. Ash" initials="J." surname="Ash"/>
    <date month="August" year="2006"/>
    <abstract>
      <t>Constraint-based path computation is a fundamental building block for traffic engineering systems such as Multiprotocol Label Switching (MPLS) and Generalized Multiprotocol Label Switching (GMPLS) networks. Path computation in large, multi-domain, multi-region, or multi-layer networks is complex and may require special computational components and cooperation between the different network domains.</t>
      <t>This document specifies the architecture for a Path Computation Element (PCE)-based model to address this problem space. This document does not attempt to provide a detailed description of all the architectural components, but rather it describes a set of building blocks for the PCE architecture from which solutions may be constructed. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4655"/>
  <seriesInfo name="DOI" value="10.17487/RFC4655"/>
</reference>
<reference anchor="RFC8231">
  <front>
    <title>Path Computation Element Communication Protocol (PCEP) Extensions for Stateful PCE</title>
    <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
    <author fullname="I. Minei" initials="I." surname="Minei"/>
    <author fullname="J. Medved" initials="J." surname="Medved"/>
    <author fullname="R. Varga" initials="R." surname="Varga"/>
    <date month="September" year="2017"/>
    <abstract>
      <t>The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
      <t>Although PCEP explicitly makes no assumptions regarding the information available to the PCE, it also makes no provisions for PCE control of timing and sequence of path computations within and across PCEP sessions. This document describes a set of extensions to PCEP to enable stateful control of MPLS-TE and GMPLS Label Switched Paths (LSPs) via PCEP.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8231"/>
  <seriesInfo name="DOI" value="10.17487/RFC8231"/>
</reference>
<reference anchor="RFC7308">
  <front>
    <title>Extended Administrative Groups in MPLS Traffic Engineering (MPLS-TE)</title>
    <author fullname="E. Osborne" initials="E." surname="Osborne"/>
    <date month="July" year="2014"/>
    <abstract>
      <t>MPLS Traffic Engineering (MPLS-TE) advertises 32 administrative groups (commonly referred to as "colors" or "link colors") using the Administrative Group sub-TLV. This is defined for OSPFv2 (RFC 3630), OSPFv3 (RFC 5329) and IS-IS (RFC 5305).</t>
      <t>This document adds a sub-TLV to the IGP TE extensions, "Extended Administrative Group". This sub-TLV provides for additional administrative groups (link colors) beyond the current limit of 32.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7308"/>
  <seriesInfo name="DOI" value="10.17487/RFC7308"/>
</reference>
<reference anchor="RFC8343">
  <front>
    <title>A YANG Data Model for Interface Management</title>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <date month="March" year="2018"/>
    <abstract>
      <t>This document defines a YANG data model for the management of network interfaces. It is expected that interface-type-specific data models augment the generic interfaces data model defined in this document. The data model includes definitions for configuration and system state (status information and counters for the collection of statistics).</t>
      <t>The YANG data model in this document conforms to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
      <t>This document obsoletes RFC 7223.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8343"/>
  <seriesInfo name="DOI" value="10.17487/RFC8343"/>
</reference>
<reference anchor="RFC8639">
  <front>
    <title>Subscription to YANG Notifications</title>
    <author fullname="E. Voit" initials="E." surname="Voit"/>
    <author fullname="A. Clemm" initials="A." surname="Clemm"/>
    <author fullname="A. Gonzalez Prieto" initials="A." surname="Gonzalez Prieto"/>
    <author fullname="E. Nilsen-Nygaard" initials="E." surname="Nilsen-Nygaard"/>
    <author fullname="A. Tripathy" initials="A." surname="Tripathy"/>
    <date month="September" year="2019"/>
    <abstract>
      <t>This document defines a YANG data model and associated mechanisms enabling subscriber-specific subscriptions to a publisher's event streams. Applying these elements allows a subscriber to request and receive a continuous, customized feed of publisher-generated information.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8639"/>
  <seriesInfo name="DOI" value="10.17487/RFC8639"/>
</reference>
<reference anchor="RFC8641">
  <front>
    <title>Subscription to YANG Notifications for Datastore Updates</title>
    <author fullname="A. Clemm" initials="A." surname="Clemm"/>
    <author fullname="E. Voit" initials="E." surname="Voit"/>
    <date month="September" year="2019"/>
    <abstract>
      <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8641"/>
  <seriesInfo name="DOI" value="10.17487/RFC8641"/>
</reference>
<reference anchor="RFC3688">
  <front>
    <title>The IETF XML Registry</title>
    <author fullname="M. Mealling" initials="M." surname="Mealling"/>
    <date month="January" year="2004"/>
    <abstract>
      <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="81"/>
  <seriesInfo name="RFC" value="3688"/>
  <seriesInfo name="DOI" value="10.17487/RFC3688"/>
</reference>
<reference anchor="RFC6020">
  <front>
    <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
    <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
    <date month="October" year="2010"/>
    <abstract>
      <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6020"/>
  <seriesInfo name="DOI" value="10.17487/RFC6020"/>
</reference>
<reference anchor="RFC8040">
  <front>
    <title>RESTCONF Protocol</title>
    <author fullname="A. Bierman" initials="A." surname="Bierman"/>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <date month="January" year="2017"/>
    <abstract>
      <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8040"/>
  <seriesInfo name="DOI" value="10.17487/RFC8040"/>
</reference>
<reference anchor="RFC6242">
  <front>
    <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
    <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
    <date month="June" year="2011"/>
    <abstract>
      <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6242"/>
  <seriesInfo name="DOI" value="10.17487/RFC6242"/>
</reference>
<reference anchor="RFC8446">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2018"/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8446"/>
  <seriesInfo name="DOI" value="10.17487/RFC8446"/>
</reference>
<reference anchor="RFC9000">
  <front>
    <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
    <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
    <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9000"/>
  <seriesInfo name="DOI" value="10.17487/RFC9000"/>
</reference>
<reference anchor="RFC8341">
  <front>
    <title>Network Configuration Access Control Model</title>
    <author fullname="A. Bierman" initials="A." surname="Bierman"/>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <date month="March" year="2018"/>
    <abstract>
      <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
      <t>This document obsoletes RFC 6536.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="91"/>
  <seriesInfo name="RFC" value="8341"/>
  <seriesInfo name="DOI" value="10.17487/RFC8341"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC4875">
  <front>
    <title>Extensions to Resource Reservation Protocol - Traffic Engineering (RSVP-TE) for Point-to-Multipoint TE Label Switched Paths (LSPs)</title>
    <author fullname="R. Aggarwal" initials="R." role="editor" surname="Aggarwal"/>
    <author fullname="D. Papadimitriou" initials="D." role="editor" surname="Papadimitriou"/>
    <author fullname="S. Yasukawa" initials="S." role="editor" surname="Yasukawa"/>
    <date month="May" year="2007"/>
    <abstract>
      <t>This document describes extensions to Resource Reservation Protocol - Traffic Engineering (RSVP-TE) for the set up of Traffic Engineered (TE) point-to-multipoint (P2MP) Label Switched Paths (LSPs) in Multi- Protocol Label Switching (MPLS) and Generalized MPLS (GMPLS) networks. The solution relies on RSVP-TE without requiring a multicast routing protocol in the Service Provider core. Protocol elements and procedures for this solution are described.</t>
      <t>There can be various applications for P2MP TE LSPs such as IP multicast. Specification of how such applications will use a P2MP TE LSP is outside the scope of this document. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4875"/>
  <seriesInfo name="DOI" value="10.17487/RFC4875"/>
</reference>
<reference anchor="RFC4874">
  <front>
    <title>Exclude Routes - Extension to Resource ReserVation Protocol-Traffic Engineering (RSVP-TE)</title>
    <author fullname="CY. Lee" initials="CY." surname="Lee"/>
    <author fullname="A. Farrel" initials="A." surname="Farrel"/>
    <author fullname="S. De Cnodder" initials="S." surname="De Cnodder"/>
    <date month="April" year="2007"/>
    <abstract>
      <t>This document specifies ways to communicate route exclusions during path setup using Resource ReserVation Protocol-Traffic Engineering (RSVP-TE).</t>
      <t>The RSVP-TE specification, "RSVP-TE: Extensions to RSVP for LSP Tunnels" (RFC 3209) and GMPLS extensions to RSVP-TE, "Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) Extensions" (RFC 3473) allow abstract nodes and resources to be explicitly included in a path setup, but not to be explicitly excluded.</t>
      <t>In some networks where precise explicit paths are not computed at the head end, it may be useful to specify and signal abstract nodes and resources that are to be explicitly excluded from routes. These exclusions may apply to the whole path, or to parts of a path between two abstract nodes specified in an explicit path. How Shared Risk Link Groups (SRLGs) can be excluded is also specified in this document. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4874"/>
  <seriesInfo name="DOI" value="10.17487/RFC4874"/>
</reference>
<reference anchor="RFC3945">
  <front>
    <title>Generalized Multi-Protocol Label Switching (GMPLS) Architecture</title>
    <author fullname="E. Mannie" initials="E." role="editor" surname="Mannie"/>
    <date month="October" year="2004"/>
    <abstract>
      <t>Future data and transmission networks will consist of elements such as routers, switches, Dense Wavelength Division Multiplexing (DWDM) systems, Add-Drop Multiplexors (ADMs), photonic cross-connects (PXCs), optical cross-connects (OXCs), etc. that will use Generalized Multi-Protocol Label Switching (GMPLS) to dynamically provision resources and to provide network survivability using protection and restoration techniques.</t>
      <t>This document describes the architecture of GMPLS. GMPLS extends MPLS to encompass time-division (e.g., SONET/SDH, PDH, G.709), wavelength (lambdas), and spatial switching (e.g., incoming port or fiber to outgoing port or fiber). The focus of GMPLS is on the control plane of these various layers since each of them can use physically diverse data or forwarding planes. The intention is to cover both the signaling and the routing part of that control plane. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3945"/>
  <seriesInfo name="DOI" value="10.17487/RFC3945"/>
</reference>
<reference anchor="rfc3473">
  <front>
    <title>Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) Extensions</title>
    <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
    <date month="January" year="2003"/>
    <abstract>
      <t>This document describes extensions to Multi-Protocol Label Switching (MPLS) Resource ReserVation Protocol - Traffic Engineering (RSVP-TE) signaling required to support Generalized MPLS. Generalized MPLS extends the MPLS control plane to encompass time-division (e.g., Synchronous Optical Network and Synchronous Digital Hierarchy, SONET/SDH), wavelength (optical lambdas) and spatial switching (e.g., incoming port or fiber to outgoing port or fiber). This document presents a RSVP-TE specific description of the extensions. A generic functional description can be found in separate documents. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3473"/>
  <seriesInfo name="DOI" value="10.17487/RFC3473"/>
</reference>
<reference anchor="RFC6107">
  <front>
    <title>Procedures for Dynamically Signaled Hierarchical Label Switched Paths</title>
    <author fullname="K. Shiomoto" initials="K." role="editor" surname="Shiomoto"/>
    <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
    <date month="February" year="2011"/>
    <abstract>
      <t>Label Switched Paths (LSPs) set up in Multiprotocol Label Switching (MPLS) or Generalized MPLS (GMPLS) networks can be used to form links to carry traffic in those networks or in other (client) networks.</t>
      <t>Protocol mechanisms already exist to facilitate the establishment of such LSPs and to bundle traffic engineering (TE) links to reduce the load on routing protocols. This document defines extensions to those mechanisms to support identifying the use to which such LSPs are to be put and to enable the TE link endpoints to be assigned addresses or unnumbered identifiers during the signaling process. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6107"/>
  <seriesInfo name="DOI" value="10.17487/RFC6107"/>
</reference>
<reference anchor="RFC4427">
  <front>
    <title>Recovery (Protection and Restoration) Terminology for Generalized Multi-Protocol Label Switching (GMPLS)</title>
    <author fullname="E. Mannie" initials="E." role="editor" surname="Mannie"/>
    <author fullname="D. Papadimitriou" initials="D." role="editor" surname="Papadimitriou"/>
    <date month="March" year="2006"/>
    <abstract>
      <t>This document defines a common terminology for Generalized Multi-Protocol Label Switching (GMPLS)-based recovery mechanisms (i.e., protection and restoration). The terminology is independent of the underlying transport technologies covered by GMPLS. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4427"/>
  <seriesInfo name="DOI" value="10.17487/RFC4427"/>
</reference>



    </references>

</references>


<?line 3777?>

<section anchor="AppendixA"><name>Data Tree Examples</name>

<t>This section contains examples of use of the model with RESTCONF <xref target="RFC8040"/> and JSON encoding.</t>

<t>For the example we will use a 4-node MPLS network where RSVP-TE MPLS Tunnels can be setup. The
loopbacks of each router are shown. The network in <xref target="AppFig-Topo"/> will be used in the examples
described in the following sections.</t>

<figure title="TE network used in data tree examples" anchor="AppFig-Topo"><artwork><![CDATA[
 2001:db8::1      2001:db8::2    2001:db8::4
 192.0.2.1        192.0.2.2      192.0.2.4
 +-------+        +-------+      +-------+
 |       |        |       |      |       |
 |   A   +--------+   B   +------+   D   |
 +---+---+        +-------+      +---+---+
     |                               |
     |            +-------+          |
     |            |       |          |
     +------------+   C   +----------+
                  |       |
                  +-------+
                  192.0.2.3
                  2001:db8::3
]]></artwork></figure>

<section anchor="TeTunnel"><name>Basic Tunnel Setup</name>

<t>This example uses the TE Tunnel YANG data model defined in this document to create an
RSVP-TE signaled Tunnel of packet LSP encoding type. First, the TE Tunnel is created with no specific restrictions or constraints (e.g., protection or restoration).
The TE Tunnel ingresses on router A and egresses on router D.</t>

<t>In this case, the TE Tunnel is created without specifying additional information about the primary paths.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/tunnels HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_2",
      "admin-state": "ietf-te-types:tunnel-admin-state-up",
      "encoding": "ietf-te-types:lsp-encoding-packet",
      "source": {
        "te-node-id": "192.0.2.1"
      },
      "destination": {
        "te-node-id": "192.0.2.4"
      },
      "bidirectional": false,
      "signaling-type": "ietf-te-types:path-setup-rsvp"
    }
  ]
}

{
  "ietf-te:tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_2 (IPv6)",
      "admin-state": "ietf-te-types:tunnel-admin-state-up",
      "encoding": "ietf-te-types:lsp-encoding-packet",
      "source": {
        "te-node-id": "2001:db8::1"
      },
      "destination": {
        "te-node-id": "2001:db8::4"
      },
      "bidirectional": false,
      "signaling-type": "ietf-te-types:path-setup-rsvp"
    }
  ]
}

]]></artwork></figure>

</section>
<section anchor="global-named-path-constraints"><name>Global Named Path Constraints</name>

<t>This example uses the YANG data model to create a 'named path constraint' that can be referenced by TE Tunnels.
The path constraint, in this case, limits the TE Tunnel hops for the computed path.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/globals/named-path-constraints
     HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:named-path-constraint": [
    {
      "name": "max-hop-3",
      "path-metric-bounds": {
        "path-metric-bound": [
          {
            "metric-type": "ietf-te-types:path-metric-hop",
            "upper-bound": "3"
          }
        ]
      }
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="tunnel-with-global-path-constraint"><name>Tunnel with Global Path Constraint</name>

<t>In this example, the previously created 'named path constraint' is applied to the TE Tunnel created in <xref target="TeTunnel"/>.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/tunnels HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_4_1",
      "description": "Simple_LSP_with_named_path",
      "admin-state": "ietf-te-types:tunnel-admin-state-up",
      "encoding": "ietf-te-types:lsp-encoding-packet",
      "source": {
        "te-node-id": "192.0.2.1"
      },
      "destination": {
        "te-node-id": "192.0.2.4"
      },
      "signaling-type": "ietf-te-types:path-setup-rsvp",
      "primary-paths": {
        "primary-path": [
          {
            "name": "Simple_LSP_1",
            "use-path-computation": true,
            "path-scope": "ietf-te-types:path-scope-end-to-end",
            "named-path-constraint": "max-hop-3"
          }
        ]
      }
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="tunnel-with-per-tunnel-path-constraint"><name>Tunnel with Per-tunnel Path Constraint</name>

<t>In this example, the per-tunnel path constraint is explicitly indicated under the TE Tunnel created in <xref target="TeTunnel"/> to constrain the computed path for the tunnel.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/tunnels HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_4_2",
      "admin-state": "ietf-te-types:tunnel-admin-state-up",
      "encoding": "ietf-te-types:lsp-encoding-packet",
      "source": {
        "te-node-id": "192.0.2.1"
      },
      "destination": {
        "te-node-id": "192.0.2.4"
      },
      "bidirectional": false,
      "signaling-type": "ietf-te-types:path-setup-rsvp",
      "primary-paths": {
        "primary-path": [
          {
            "name": "path1",
            "path-scope": "ietf-te-types:path-scope-end-to-end",
            "path-metric-bounds": {
              "path-metric-bound": [
                {
                  "metric-type": "ietf-te-types:path-metric-hop",
                  "upper-bound": "3"
                }
              ]
            }
          }
        ]
      }
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="tunnel-state"><name>Tunnel State</name>

<t>In this example, the 'GET' query is sent to return the state stored about the tunnel.</t>

<figure><artwork><![CDATA[
GET  /restconf/data/ietf-te:te/tunnels +
     /tunnel="Example_LSP_Tunnel_A_4_1"
     /primary-paths/ HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
]]></artwork></figure>

<t>The request, with status code 200 would include, for example, the following json:</t>

<figure><artwork><![CDATA[
{
  "ietf-te:primary-path": [
    {
      "name": "path1",
      "path-computation-method": "ietf-te-types:path-locally-computed",
      "path-scope": "ietf-te-types:path-scope-end-to-end",
      "computed-paths-properties": {
        "computed-path-properties": [
          {
            "k-index": 1,
            "path-properties": {
              "path-route-objects": {
                "path-route-object": [
                  {
                    "index": 1,
                    "numbered-node-hop": {
                      "node-id": "192.0.2.2",
                      "hop-type": "strict"
                    }
                  },
                  {
                    "index": 2,
                    "numbered-node-hop": {
                      "node-id": "192.0.2.4",
                      "hop-type": "strict"
                    }
                  }
                ]
              }
            }
          }
        ]
      },
      "lsps": {
        "lsp": [
          {
            "node": "192.0.2.1",
            "lsp-id": 25356,
            "tunnel-name": "Example_LSP_Tunnel_A_4_1"
          }
        ]
      }
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="example-te-tunnel-with-primary-and-secondary-paths"><name>Example TE Tunnel with Primary and Secondary Paths</name>

<figure title="TE network used in data tree examples" anchor="AppFig-Topo2"><artwork><![CDATA[
                       +----------+          +----------+
                     +-|192.0.2.9 |---+      |192.0.2.10|
                     | +----------+   |      +----------+
                     |                |          |   |
+----------+    +----------+     +----------+    |   |
|192.0.2.8 |----|192.0.2.3 |-----|192.0.2.4 |----+   |
+----------+    +----------+     +----------+        |
  |                  |                |              |
+----------+         |                |              |
|192.0.2.1 |---------+                |           +----------+
+----------+                          +-----------|192.0.2.5 |
      |  |                                        +----------+
      |  |              +----------+                     | |
      |  +--------------|192.0.2.2 |---------------------+ |
      |                 +----------+                       |
      |                       | |                          |
  +----------+                | |                   +----------+
  |192.0.2.6 |----------------+ +-------------------|192.0.2.7 |
  +----------+                                      +----------+

]]></artwork></figure>

<t>Below is the state retrieved for a TE tunnel from source 192.0.2.1 to 192.0.2.5
with primary, secondary, reverse, and secondary reverse paths as shown in <xref target="AppFig-Topo2"/>.</t>

<figure><artwork><![CDATA[
{
  "ietf-te:te": {
    "tunnels": {
      "tunnel": [
        {
          "name": "example-1",
          "description": "Example in slide 1",
          "source": {
            "te-node-id": "192.0.2.1"
          },
          "destination": {
            "te-node-id": "192.0.2.5"
          },
          "bidirectional": true,
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-1 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": false,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "name": "primary-2 (rev)",
                  "path-scope": "ietf-te-types:path-scope-end-to-end",
                  "explicit-route-objects": {
                    "route-object-include-exclude": [
                      {
                        "index": 1,
                        "explicit-route-usage":
                        "ietf-te-types:route-include-object",
                        "numbered-node-hop": {
                          "node-id": "192.0.2.3",
                          "hop-type": "loose"
                        }
                      }
                    ]
                  },
                  "candidate-secondary-reverse-paths": {
                    "candidate-secondary-reverse-path": [
                      {
                        "secondary-reverse-path": "secondary-3 (rev)"
                      },
                      {
                        "secondary-reverse-path": "secondary-4 (rev)"
                      },
                      {
                        "secondary-reverse-path": "secondary-5 (rev)"
                      }
                    ]
                  }
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-1 (fwd)"
                    },
                    {
                      "secondary-path": "secondary-2 (fwd)"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-1 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-2 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage": 
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          },
          "secondary-reverse-paths": {
            "secondary-reverse-path": [
              {
                "name": "secondary-3 (rev)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.4",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-4 (rev)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.4"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.3",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-5 (rev)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.3"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          }
        },
        {
          "name": "example-3",
          "description": "Example in slide 3",
          "source": {
            "te-node-id": "192.0.2.1"
          },
          "destination": {
            "te-node-id": "192.0.2.5"
          },
          "bidirectional": true,
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-1 (bidir)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "path-scope": "ietf-te-types:path-scope-end-to-end"
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-1 (bidir)"
                    },
                    {
                      "secondary-path": "secondary-2 (bidir)"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-1 (bidir)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-2 (bidir)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          }
        },
        {
          "name": "example-4",
          "description": "Example in slide 4",
          "source": {
            "te-node-id": "192.0.2.1"
          },
          "destination": {
            "te-node-id": "192.0.2.5"
          },
          "bidirectional": true,
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-1 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "name": "primary-2 (rev)",
                  "path-scope": "ietf-te-types:path-scope-end-to-end",
                  "candidate-secondary-reverse-paths": {
                    "candidate-secondary-reverse-path": [
                      {
                        "secondary-reverse-path": "secondary-3 (rev)"
                      },
                      {
                        "secondary-reverse-path": "secondary-4 (rev)"
                      }
                    ]
                  }
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-1 (fwd)"
                    },
                    {
                      "secondary-path": "secondary-2 (fwd)"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-1 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-2 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          },
          "secondary-reverse-paths": {
            "secondary-reverse-path": [
              {
                "name": "secondary-3 (rev)",
                "path-scope": "ietf-te-types:path-scope-end-to-end"
              },
              {
                "name": "secondary-4 (rev)",
                "path-scope": "ietf-te-types:path-scope-end-to-end"
              }
            ]
          }
        }
      ]
    }
  }
}
]]></artwork></figure>

</section>
<section anchor="example-multi-domain-te-tunnel-with-primary-and-secondary-paths"><name>Example Multi-domain TE Tunnel with Primary and Secondary Paths</name>

<figure title="TE network used in the multi-domain TE Tunnel example" anchor="AppFig-Topo3"><artwork><![CDATA[
                            XXXXXXX
                         XXX       XXX
                       XX             XX
                     X                  X
                     X    Domain 2      X
            XXXXXXX   X                X    XXXXXXXX
         XXX    +-----------+    +-----------+      XXX
       XX       | 192.0.2.1 |    | 192.0.2.2 |         XX
      X         +-----------+    +-----------+           X
      X                 X   XXXXXX    X                  X
+-----------+           X             X             +-----------+
|192.0.2.100| Domain 1  X             X   Domain 3  |192.0.2.200|
+-----------+           X   XXXXXX    X             +-----------+
      X         +-----------+    +-----------+           X
      X         | 192.0.2.3 |    | 192.0.2.4 |          X
       XX       +-----------+    +-----------+        XX
         XXX       X  X                  XXX       XXX
            XXXXXXX  X                    X  XXXXXXX
                     X                    X
                     X    Domain 4        X
                       XX             XX
                         XXX       XXX
                            XXXXXXX

]]></artwork></figure>

<t>The following state is retrieved for a multi-domain TE tunnel, where both the
primary and secondary paths consist of TE tunnel segments, as shown in <xref target="AppFig-Topo3"/>.
In each domain, a TE tunnel segment is established to form the complete end-to-end TE path.
The nodes (192.0.2.100) and (192.0.2.200) form the multi-domain end-to-end source and destination
respectively. The nodes (192.0.2.1), (192.0.2.2), (192.0.2.3), and (192.0.2.4) act as domain
border nodes and transit nodes for the end-to-end TE tunnel LSPs.</t>

<figure><artwork><![CDATA[
{
  "ietf-te:te": {
    "tunnels": {
      "tunnel": [
        {
          "name": "Example_Head_End_Tunnel_Segment",
          "admin-state": "ietf-te-types:tunnel-admin-state-up",
          "encoding": "ietf-te-types:lsp-encoding-packet",
          "source": {
            "te-node-id": "192.0.2.100"
          },
          "bidirectional": true,
          "signaling-type": "ietf-te-types:path-setup-rsvp",
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-path-1",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.1"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "path-scope": "ietf-te-types:path-scope-end-to-end"
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-path-1"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-path-1",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.3"
                      }
                    }
                  ]
                }
              }
            ]
          }
        },
        {
          "name": "Example_Primary_Transit_Tunnel_Segment",
          "admin-state": "ietf-te-types:tunnel-admin-state-up",
          "encoding": "ietf-te-types:lsp-encoding-packet",
          "bidirectional": true,
          "signaling-type": "ietf-te-types:path-setup-rsvp",
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-path-2",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.2"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "path-scope": "ietf-te-types:path-scope-end-to-end"
                }
              }
            ]
          }
        },
        {
          "name": "Example_Secondary_Transit_Tunnel_Segment",
          "admin-state": "ietf-te-types:tunnel-admin-state-up",
          "encoding": "ietf-te-types:lsp-encoding-packet",
          "bidirectional": true,
          "signaling-type": "ietf-te-types:path-setup-rsvp",
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-path-4",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "primary-reverse-path": {
                  "path-scope": "ietf-te-types:path-scope-end-to-end"
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-path-4"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-path-4",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.3"
                      }
                    },
                    {
                      "index": 2,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.4"
                      }
                    }
                  ]
                }
              }
            ]
          }
        },
        {
          "name": "Example_Tail_End_Tunnel_Segment",
          "admin-state": "ietf-te-types:tunnel-admin-state-up",
          "encoding": "ietf-te-types:lsp-encoding-packet",
          "destination": {
            "te-node-id": "192.0.2.200"
          },
          "bidirectional": true,
          "signaling-type": "ietf-te-types:path-setup-rsvp",
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-path-3",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.2"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "path-scope": "ietf-te-types:path-scope-end-to-end"
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-path-3"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-path-3",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.4"
                      }
                    }
                  ]
                }
              }
            ]
          }
        }
      ]
    }
  }
}
]]></artwork></figure>

</section>
</section>
<section anchor="AppendixB"><name>Full Model Tree Diagram</name>

<t>The full tree diagram of the TE YANG data model defined in
module 'ietf-te' is shown below.</t>

<figure><artwork><![CDATA[
module: ietf-te
  +--rw te
     +--rw enable?    boolean
     +--rw globals
     |  +--rw named-admin-groups
     |  |  +--rw named-admin-group* [name]
     |  |          {te-types:extended-admin-groups,
     |  |           te-types:named-extended-admin-groups}?
     |  |     +--rw name            string
     |  |     +--rw bit-position?   uint32
     |  +--rw named-srlgs
     |  |  +--rw named-srlg* [name] {te-types:named-srlg-groups}?
     |  |     +--rw name     string
     |  |     +--rw value?   te-types:srlg
     |  |     +--rw cost?    uint32
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
     |             {te-types:named-path-constraints}?
     |        +--rw name                       string
     |        +---u path-constraints-common
     +--rw tunnels
     |  +--rw tunnel* [name]
     |     +--rw name                                    string
     |     +--rw alias?                                  string
     |     +--rw identifier?                             uint32
     |     +--rw color?                                  uint32
     |     +--rw description?                            string
     |     +--rw admin-state?                            identityref
     |     +--ro operational-state?                      identityref
     |     +--rw state-change-timestamp?
     |     |       yang:date-and-time
     |     +---u te-types:encoding-and-switching-type
     |     +---u tunnel-common-attributes
     |     +--rw controller
     |     |  +--rw protocol-origin?        identityref
     |     |  +--rw controller-entity-id?   string
     |     +--rw reoptimize-timer?                       uint16
     |     +---u tunnel-associations-properties
     |     +---u protection-restoration-properties
     |     +---u te-types:tunnel-constraints
     |     +---u tunnel-hierarchy-properties
     |     +--rw primary-paths
     |     |  +--rw primary-path* [name]
     |     |     +--ro active?                      boolean
     |     |     +---u path-common-properties
     |     |     +---u path-forward-properties
     |     |     +---u k-requested-paths
     |     |     +---u path-compute-info
     |     |     +---u path-state
     |     |     +--rw primary-reverse-path
     |     |     |  +---u path-common-properties
     |     |     |  +---u path-compute-info
     |     |     |  +---u path-state
     |     |     |  +--rw candidate-secondary-reverse-paths
     |     |     |     +--rw candidate-secondary-reverse-path*
     |     |     |             [secondary-reverse-path]
     |     |     |        +--rw secondary-reverse-path    leafref
     |     |     |        +--ro active?                   boolean
     |     |     +--rw candidate-secondary-paths
     |     |        +--rw candidate-secondary-path* [secondary-path]
     |     |           +--rw secondary-path    leafref
     |     |           +--ro active?           boolean
     |     +--rw secondary-paths
     |     |  +--rw secondary-path* [name]
     |     |     +---u path-common-properties
     |     |     +--rw preference?                          uint8
     |     |     +--rw secondary-reverse-path?              leafref
     |     |     +---u path-compute-info
     |     |     +---u protection-restoration-properties
     |     |     +---u path-state
     |     +--rw secondary-reverse-paths
     |     |  +--rw secondary-reverse-path* [name]
     |     |     +---u path-common-properties
     |     |     +--rw preference?                          uint8
     |     |     +---u path-compute-info
     |     |     +---u protection-restoration-properties
     |     |     +---u path-state
     |     +---x tunnel-action
     |     |  +---w input
     |     |  |  +---w action-type?   identityref
     |     |  +--ro output
     |     |     +--ro action-result?   identityref
     |     +---x protection-external-commands
     |        +---w input
     |           +---w protection-external-command?   identityref
     |           +---w ingress-node?                  boolean
     |           +---w egress-node?                   boolean
     |           +---w path-name?                     string
     |           +---w path-type?
     |           |       te-types:path-type
     |           +---w traffic-type?                  enumeration
     |           +---w extra-traffic-tunnel-ref?      tunnel-ref
     +--ro lsps
        +--ro lsp* [tunnel-name lsp-id node]
           +--ro tunnel-name                     string
           +--ro lsp-id                          uint16
           +--ro node                            te-types:te-node-id
           +--ro source?                         te-types:te-node-id
           +--ro destination?                    te-types:te-node-id
           +--ro tunnel-id?                      uint16
           +--ro extended-tunnel-id?             yang:dotted-quad
           +--ro operational-state?              identityref
           +--ro signaling-type?                 identityref
           +--ro origin-type?                    enumeration
           +--ro lsp-resource-status?            enumeration
           +--ro lockout-of-normal?              boolean
           +--ro freeze?                         boolean
           +--ro lsp-protection-role?            enumeration
           +--ro lsp-protection-state?           identityref
           +--ro ingress-node-id?                te-types:te-node-id
           +--ro egress-node-id?                 te-types:te-node-id
           +--ro lsp-actual-route-information
              +--ro lsp-actual-route-information* [index]
                 +---u te-types:record-route-state

  rpcs:
    +---x tunnels-path-compute
    |  +---w input
    |  |  +---w path-compute-info
    |  +--ro output
    |     +--ro path-compute-result
    +---x tunnels-actions
       +---w input
       |  +---w tunnel-info
       |  |  +---w (filter-type)
       |  |     +--:(all-tunnels)
       |  |     |  +---w all       empty
       |  |     +--:(one-tunnel)
       |  |        +---w tunnel?   tunnel-ref
       |  +---w action-info
       |     +---w action?       identityref
       |     +---w disruptive?   empty
       +--ro output
          +--ro action-result?   identityref

  grouping path-common-properties:
    +-- name?                      string
    +-- path-computation-method?   identityref
    +-- path-computation-server
    |  +---u te-types:te-generic-node-id
    +-- compute-only?              empty
    +-- use-path-computation?      boolean
    +-- lockdown?                  empty
    +--ro path-scope?                identityref
  grouping path-compute-info:
    +---u tunnel-associations-properties
    +---u te-types:generic-path-optimization
    +-- named-path-constraint?                leafref
    |       {te-types:named-path-constraints}?
    +---u path-constraints-common
  grouping path-forward-properties:
    +-- preference?   uint8
    +-- co-routed?    boolean
  grouping k-requested-paths:
    +-- k-requested-paths?   uint8
  grouping path-state:
    +---u path-computation-response
    +--ro lsp-provisioning-error-infos
    |  +--ro lsp-provisioning-error-info* []
    |     +--ro error-reason?        identityref
    |     +--ro error-description?   string
    |     +--ro error-timestamp?     yang:date-and-time
    |     +--ro error-node-id?       te-types:te-node-id
    |     +--ro error-link-id?       te-types:te-tp-id
    |     +--ro lsp-id?              uint16
    +--ro lsps
       +--ro lsp* [node lsp-id]
          +--ro tunnel-name?              -> /te/lsps/lsp/tunnel-name
          +--ro node?                     leafref
          +--ro lsp-id?                   leafref
          +--ro state-change-timestamp?   yang:date-and-time
  grouping path-computation-response:
    +--ro computed-paths-properties
    |  +--ro computed-path-properties* [k-index]
    |     +--ro k-index?                            uint8
    |     +---u te-types:generic-path-properties
    +--ro computed-path-error-infos
       +--ro computed-path-error-info* []
          +--ro error-description?   string
          +--ro error-timestamp?     yang:date-and-time
          +--ro error-reason?        identityref
  grouping protection-restoration-properties:
    +-- protection
    |  +-- protection-type?                identityref
    |  +-- protection-reversion-disable?   boolean
    |  +-- hold-off-time?                  uint32
    |  +-- wait-to-revert?                 uint16
    |  +-- aps-signal-id?                  uint8
    +-- restoration
       +-- restoration-type?                identityref
       +-- restoration-scheme?              identityref
       +-- restoration-reversion-disable?   boolean
       +-- hold-off-time?                   uint32
       +-- wait-to-restore?                 uint16
       +-- wait-to-revert?                  uint16
  grouping tunnel-associations-properties:
    +-- association-objects
       +-- association-object* [association-key]
       |  +-- association-key?   string
       |  +-- type?              identityref
       |  +-- id?                uint16
       |  +-- source
       |     +---u te-types:te-generic-node-id
       +-- association-object-extended* [association-key]
          +-- association-key?   string
          +-- type?              identityref
          +-- id?                uint16
          +-- source
          |  +---u te-types:te-generic-node-id
          +-- global-source?     uint32
          +-- extended-id?       yang:hex-string
  grouping tunnel-end-point:
    +-- node-id?        nw:node-id
    +-- te-node-id?     te-types:te-node-id
    +-- tunnel-tp-id?   binary
  grouping tunnel-common-attributes:
    +-- source
    |  +---u tunnel-end-point
    +-- destination
    |  +---u tunnel-end-point
    +-- bidirectional?   boolean
  grouping tunnel-hierarchy-properties:
    +-- hierarchy
       +-- dependency-tunnels
       |  +-- dependency-tunnel* [name]
       |     +-- name?                                   tunnel-ref
       |     +---u te-types:encoding-and-switching-type
       +-- hierarchical-link
          +-- enable?                            boolean
          +-- local-node-id?                     nw:node-id
          +-- local-te-node-id?                  te-types:te-node-id
          +-- local-link-tp-id?                  nt:tp-id
          +-- local-te-link-tp-id?               te-types:te-tp-id
          +-- remote-node-id?                    nw:node-id
          +-- remote-link-tp-id?                 nt:tp-id
          +-- remote-te-link-tp-id?              te-types:te-tp-id
          +-- remote-te-node-id?                 te-types:te-node-id
          +--ro link-id?                           nt:link-id
          +-- network-id?                        nw:network-id
          +---u te-types:te-topology-identifier
  grouping path-constraints-common:
    +---u te-types:common-path-constraints-attributes
    +---u te-types:generic-path-disjointness
    +---u te-types:path-constraints-route-objects
    +-- path-in-segment!
    |  +---u te-types:label-set-info
    +-- path-out-segment!
       +---u te-types:label-set-info
]]></artwork></figure>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

