-
Notifications
You must be signed in to change notification settings - Fork 3
/
draft-ietf-grow-bgp-session-culling-05-from-4.diff.html
409 lines (408 loc) · 78.8 KB
/
draft-ietf-grow-bgp-session-culling-05-from-4.diff.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<!-- Generated by rfcdiff 1.41: rfcdiff -->
<!-- <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional" > -->
<!-- System: Darwin Vurt.local 17.0.0 Darwin Kernel Version 17.0.0: Thu Aug 24 21:48:19 PDT 2017; root:xnu-4570.1.46~2/RELEASE_X86_64 x86_64 -->
<!-- Using awk: /usr/local/bin/gawk: GNU Awk 4.1.4, API: 1.1 (GNU MPFR 3.1.6, GNU MP 6.1.2) -->
<!-- Using diff: /usr/bin/diff: diff (GNU diffutils) 2.8.1 -->
<!-- Using wdiff: /usr/local/bin/wdiff: wdiff (GNU wdiff) 1.2.2 -->
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<meta http-equiv="Content-Style-Type" content="text/css" />
<title>Diff: draft-ietf-grow-bgp-session-culling-04.txt - draft-ietf-grow-bgp-session-culling-05.txt</title>
<style type="text/css">
body { margin: 0.4ex; margin-right: auto; }
tr { }
td { white-space: pre; font-family: monospace; vertical-align: top; font-size: 0.86em;}
th { font-size: 0.86em; }
.small { font-size: 0.6em; font-style: italic; font-family: Verdana, Helvetica, sans-serif; }
.left { background-color: #EEE; }
.right { background-color: #FFF; }
.diff { background-color: #CCF; }
.lblock { background-color: #BFB; }
.rblock { background-color: #FF8; }
.insert { background-color: #8FF; }
.delete { background-color: #ACF; }
.void { background-color: #FFB; }
.cont { background-color: #EEE; }
.linebr { background-color: #AAA; }
.lineno { color: red; background-color: #FFF; font-size: 0.7em; text-align: right; padding: 0 2px; }
.elipsis{ background-color: #AAA; }
.left .cont { background-color: #DDD; }
.right .cont { background-color: #EEE; }
.lblock .cont { background-color: #9D9; }
.rblock .cont { background-color: #DD6; }
.insert .cont { background-color: #0DD; }
.delete .cont { background-color: #8AD; }
.stats, .stats td, .stats th { background-color: #EEE; padding: 2px 0; }
</style>
</head>
<body >
<table border="0" cellpadding="0" cellspacing="0">
<tr bgcolor="orange"><th></th><th> draft-ietf-grow-bgp-session-culling-04.txt </th><th> </th><th> draft-ietf-grow-bgp-session-culling-05.txt </th><th></th></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">Global Routing Operations W. Hargrave</td><td> </td><td class="right">Global Routing Operations W. Hargrave</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">Internet-Draft LONAP</td><td> </td><td class="right">Internet-Draft LONAP</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">Intended status: Best Current Practice M. Griswold</td><td> </td><td class="right">Intended status: Best Current Practice M. Griswold</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0001" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock">Expires: <span class="delete">March 14, 2018</span> 20C</td><td> </td><td class="rblock">Expires: <span class="insert">April 1, 2018 </span> 20C</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> J. Snijders</td><td> </td><td class="right"> J. Snijders</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> NTT</td><td> </td><td class="right"> NTT</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> N. Hilliard</td><td> </td><td class="right"> N. Hilliard</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> INEX</td><td> </td><td class="right"> INEX</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0002" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> September <span class="delete">10</span>, 2017</td><td> </td><td class="rblock"> September <span class="insert">28</span>, 2017</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Mitigating Negative Impact of Maintenance through BGP Session Culling</td><td> </td><td class="right"> Mitigating Negative Impact of Maintenance through BGP Session Culling</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0003" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> draft-ietf-grow-bgp-session-culling-0<span class="delete">4</span></td><td> </td><td class="rblock"> draft-ietf-grow-bgp-session-culling-0<span class="insert">5</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">Abstract</td><td> </td><td class="right">Abstract</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> This document outlines an approach to mitigate negative impact on</td><td> </td><td class="right"> This document outlines an approach to mitigate negative impact on</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> networks resulting from maintenance activities. It includes guidance</td><td> </td><td class="right"> networks resulting from maintenance activities. It includes guidance</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> for both IP networks and Internet Exchange Points (IXPs). The</td><td> </td><td class="right"> for both IP networks and Internet Exchange Points (IXPs). The</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> approach is to ensure BGP-4 sessions affected by the maintenance are</td><td> </td><td class="right"> approach is to ensure BGP-4 sessions affected by the maintenance are</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> forcefully torn down before the actual maintenance activities</td><td> </td><td class="right"> forcefully torn down before the actual maintenance activities</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> commence.</td><td> </td><td class="right"> commence.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">Status of This Memo</td><td> </td><td class="right">Status of This Memo</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> This Internet-Draft is submitted in full conformance with the</td><td> </td><td class="right"> This Internet-Draft is submitted in full conformance with the</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> provisions of BCP 78 and BCP 79.</td><td> </td><td class="right"> provisions of BCP 78 and BCP 79.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Internet-Drafts are working documents of the Internet Engineering</td><td> </td><td class="right"> Internet-Drafts are working documents of the Internet Engineering</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Task Force (IETF). Note that other groups may also distribute</td><td> </td><td class="right"> Task Force (IETF). Note that other groups may also distribute</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> working documents as Internet-Drafts. The list of current Internet-</td><td> </td><td class="right"> working documents as Internet-Drafts. The list of current Internet-</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0004" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> Drafts is at http<span class="delete">s</span>://datatracker.ietf.org/drafts/current/.</td><td> </td><td class="rblock"> Drafts is at http://datatracker.ietf.org/drafts/current/.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Internet-Drafts are draft documents valid for a maximum of six months</td><td> </td><td class="right"> Internet-Drafts are draft documents valid for a maximum of six months</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> and may be updated, replaced, or obsoleted by other documents at any</td><td> </td><td class="right"> and may be updated, replaced, or obsoleted by other documents at any</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> time. It is inappropriate to use Internet-Drafts as reference</td><td> </td><td class="right"> time. It is inappropriate to use Internet-Drafts as reference</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> material or to cite them other than as "work in progress."</td><td> </td><td class="right"> material or to cite them other than as "work in progress."</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0005" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> This Internet-Draft will expire on <span class="delete">March 14</span>, 2018.</td><td> </td><td class="rblock"> This Internet-Draft will expire on <span class="insert">April 1</span>, 2018.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">Copyright Notice</td><td> </td><td class="right">Copyright Notice</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Copyright (c) 2017 IETF Trust and the persons identified as the</td><td> </td><td class="right"> Copyright (c) 2017 IETF Trust and the persons identified as the</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> document authors. All rights reserved.</td><td> </td><td class="right"> document authors. All rights reserved.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> This document is subject to BCP 78 and the IETF Trust's Legal</td><td> </td><td class="right"> This document is subject to BCP 78 and the IETF Trust's Legal</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Provisions Relating to IETF Documents</td><td> </td><td class="right"> Provisions Relating to IETF Documents</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0006" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> (http<span class="delete">s</span>://trustee.ietf.org/license-info) in effect on the date of</td><td> </td><td class="rblock"> (http://trustee.ietf.org/license-info) in effect on the date of</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> publication of this document. Please review these documents</td><td> </td><td class="right"> publication of this document. Please review these documents</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> carefully, as they describe your rights and restrictions with respect</td><td> </td><td class="right"> carefully, as they describe your rights and restrictions with respect</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> to this document. Code Components extracted from this document must</td><td> </td><td class="right"> to this document. Code Components extracted from this document must</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> include Simplified BSD License text as described in Section 4.e of</td><td> </td><td class="right"> include Simplified BSD License text as described in Section 4.e of</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> the Trust Legal Provisions and are provided without warranty as</td><td> </td><td class="right"> the Trust Legal Provisions and are provided without warranty as</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> described in the Simplified BSD License.</td><td> </td><td class="right"> described in the Simplified BSD License.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">Table of Contents</td><td> </td><td class="right">Table of Contents</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2</td><td> </td><td class="right"> 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
<tr bgcolor="gray" ><td></td><th><a name="part-l2" /><small>skipping to change at</small><em> page 2, line 27</em></th><th> </th><th><a name="part-r2" /><small>skipping to change at</small><em> page 2, line 27</em></th><td></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> 3.1.1. Maintenance Considerations . . . . . . . . . . . . . 4</td><td> </td><td class="right"> 3.1.1. Maintenance Considerations . . . . . . . . . . . . . 4</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> 3.2. Involuntary BGP Session Teardown Recommendations . . . . 4</td><td> </td><td class="right"> 3.2. Involuntary BGP Session Teardown Recommendations . . . . 4</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> 3.2.1. Packet Filter Considerations . . . . . . . . . . . . 4</td><td> </td><td class="right"> 3.2.1. Packet Filter Considerations . . . . . . . . . . . . 4</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> 3.2.2. Hardware Considerations . . . . . . . . . . . . . . . 5</td><td> </td><td class="right"> 3.2.2. Hardware Considerations . . . . . . . . . . . . . . . 5</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> 3.3. Procedural Considerations . . . . . . . . . . . . . . . . 6</td><td> </td><td class="right"> 3.3. Procedural Considerations . . . . . . . . . . . . . . . . 6</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> 4. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 6</td><td> </td><td class="right"> 4. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 6</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> 5. Security Considerations . . . . . . . . . . . . . . . . . . . 6</td><td> </td><td class="right"> 5. Security Considerations . . . . . . . . . . . . . . . . . . . 6</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6</td><td> </td><td class="right"> 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 6</td><td> </td><td class="right"> 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 6</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> 7.1. Normative References . . . . . . . . . . . . . . . . . . 6</td><td> </td><td class="right"> 7.1. Normative References . . . . . . . . . . . . . . . . . . 6</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0007" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> 7.2. Informative References . . . . . . . . . . . . . . . . . <span class="delete">6</span></td><td> </td><td class="rblock"> 7.2. Informative References . . . . . . . . . . . . . . . . . <span class="insert">7</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Appendix A. Example packet filters . . . . . . . . . . . . . . . 7</td><td> </td><td class="right"> Appendix A. Example packet filters . . . . . . . . . . . . . . . 7</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> A.1. Cisco IOS, IOS XR & Arista EOS Firewall Example</td><td> </td><td class="right"> A.1. Cisco IOS, IOS XR & Arista EOS Firewall Example</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Configuration . . . . . . . . . . . . . . . . . . . . . . 7</td><td> </td><td class="right"> Configuration . . . . . . . . . . . . . . . . . . . . . . 7</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0008" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> A.2. Nokia SR OS Filter Example Configuration . . . . . . . . <span class="delete">7</span></td><td> </td><td class="rblock"> A.2. Nokia SR OS Filter Example Configuration . . . . . . . . <span class="insert">8</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 8</td><td> </td><td class="right"> Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 8</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">1. Introduction</td><td> </td><td class="right">1. Introduction</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> BGP Session Culling is the practice of ensuring BGP sessions are</td><td> </td><td class="right"> BGP Session Culling is the practice of ensuring BGP sessions are</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> forcefully torn down before maintenance activities on a lower layer</td><td> </td><td class="right"> forcefully torn down before maintenance activities on a lower layer</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> network commence, which otherwise would affect the flow of data</td><td> </td><td class="right"> network commence, which otherwise would affect the flow of data</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> between the BGP speakers.</td><td> </td><td class="right"> between the BGP speakers.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> BGP Session Culling ensures that lower layer network maintenance</td><td> </td><td class="right"> BGP Session Culling ensures that lower layer network maintenance</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno"></td></tr>
<tr bgcolor="gray" ><td></td><th><a name="part-l3" /><small>skipping to change at</small><em> page 3, line 8</em></th><th> </th><th><a name="part-r3" /><small>skipping to change at</small><em> page 3, line 8</em></th><td></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> The grace period required for a successful application of BGP Session</td><td> </td><td class="right"> The grace period required for a successful application of BGP Session</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Culling is the sum of the time needed to detect the loss of the BGP</td><td> </td><td class="right"> Culling is the sum of the time needed to detect the loss of the BGP</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> session, plus the time required for the BGP speaker to converge onto</td><td> </td><td class="right"> session, plus the time required for the BGP speaker to converge onto</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> alternative paths. The first value is often governed by the BGP Hold</td><td> </td><td class="right"> alternative paths. The first value is often governed by the BGP Hold</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Timer (section 6.5 of [RFC4271]), commonly between 90 and 180</td><td> </td><td class="right"> Timer (section 6.5 of [RFC4271]), commonly between 90 and 180</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> seconds. The second value is implementation specific, but could be</td><td> </td><td class="right"> seconds. The second value is implementation specific, but could be</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> as much as 15 minutes when a router with a slow control-plane is</td><td> </td><td class="right"> as much as 15 minutes when a router with a slow control-plane is</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> receiving a full set of Internet routes.</td><td> </td><td class="right"> receiving a full set of Internet routes.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0009" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> Throughout this document the "Caretaker" is defined to be <span class="delete">the</span></td><td> </td><td class="rblock"> Throughout this document the "Caretaker" is defined to be <span class="insert">in control</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"> operator</span> of the lower layer network, while "Operators" directly</td><td> </td><td class="rblock"> of the lower layer network, while "Operators" directly administrate</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> administrate the BGP speakers. Operators and Caretakers implementing</td><td> </td><td class="rblock"> the BGP speakers. Operators and Caretakers implementing BGP Session</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> BGP Session Culling are encouraged to avoid using a fixed grace</td><td> </td><td class="rblock"> Culling are encouraged to avoid using a fixed grace period, but</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> period, but instead monitor forwarding plane activity while the</td><td> </td><td class="rblock"> instead monitor forwarding plane activity while the culling is taking</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> culling is taking place and consider it complete once traffic levels</td><td> </td><td class="rblock"> place and consider it complete once traffic levels have dropped to a</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> have dropped to a minimum (Section 3.3).</td><td> </td><td class="rblock"> minimum (Section 3.3).</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">2. Requirements Language</td><td> </td><td class="right">2. Requirements Language</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",</td><td> </td><td class="right"> The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this</td><td> </td><td class="right"> "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> document are to be interpreted as described in RFC 2119 [RFC2119].</td><td> </td><td class="right"> document are to be interpreted as described in RFC 2119 [RFC2119].</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">3. BGP Session Culling</td><td> </td><td class="right">3. BGP Session Culling</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0010" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> From the viewpoint of the <span class="delete">IP network operator,</span> there are two types of</td><td> </td><td class="rblock"> From the viewpoint of the <span class="insert">Operator,</span> there are two types of BGP</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> BGP Session Culling:</td><td> </td><td class="rblock"> Session Culling:</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Voluntary BGP Session Teardown: The Operator initiates the tear down</td><td> </td><td class="right"> Voluntary BGP Session Teardown: The Operator initiates the tear down</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> of the potentially affected BGP session by issuing an</td><td> </td><td class="right"> of the potentially affected BGP session by issuing an</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Administrative Shutdown.</td><td> </td><td class="right"> Administrative Shutdown.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Involuntary BGP Session Teardown: The Caretaker of the lower layer</td><td> </td><td class="right"> Involuntary BGP Session Teardown: The Caretaker of the lower layer</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> network disrupts (higher layer) BGP control-plane traffic, causing</td><td> </td><td class="right"> network disrupts (higher layer) BGP control-plane traffic, causing</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> the BGP Hold Timers of the affected BGP session to expire,</td><td> </td><td class="right"> the BGP Hold Timers of the affected BGP session to expire,</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> subsequently triggering rerouting of end user traffic.</td><td> </td><td class="right"> subsequently triggering rerouting of end user traffic.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">3.1. Voluntary BGP Session Teardown Recommendations</td><td> </td><td class="right">3.1. Voluntary BGP Session Teardown Recommendations</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Before an Operator commences activities which can cause disruption to</td><td> </td><td class="right"> Before an Operator commences activities which can cause disruption to</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0011" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> the flow of data through the lower layer network, an <span class="delete">o</span>perator can</td><td> </td><td class="rblock"> the flow of data through the lower layer network, an <span class="insert">O</span>perator can</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> reduce loss of traffic by issuing an administrative shutdown to all</td><td> </td><td class="right"> reduce loss of traffic by issuing an administrative shutdown to all</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> BGP sessions running across the lower layer network and wait a few</td><td> </td><td class="right"> BGP sessions running across the lower layer network and wait a few</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> minutes for data-plane traffic to subside.</td><td> </td><td class="right"> minutes for data-plane traffic to subside.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> While architectures exist to facilitate quick network reconvergence</td><td> </td><td class="right"> While architectures exist to facilitate quick network reconvergence</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0012" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> (such as BGP PIC [I-D.ietf-rtgwg-bgp-pic]), an <span class="delete">o</span>perator cannot assume</td><td> </td><td class="rblock"> (such as BGP PIC [I-D.ietf-rtgwg-bgp-pic]), an <span class="insert">O</span>perator cannot assume</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> the remote side has such capabilities. As such, a grace period</td><td> </td><td class="right"> the remote side has such capabilities. As such, a grace period</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> between the Administrative Shutdown and the impacting maintenance</td><td> </td><td class="right"> between the Administrative Shutdown and the impacting maintenance</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> activities is warranted.</td><td> </td><td class="right"> activities is warranted.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0013" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> After the maintenance activities have concluded, the <span class="delete">o</span>perator is</td><td> </td><td class="rblock"> After the maintenance activities have concluded, the <span class="insert">O</span>perator is</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> expected to restore the BGP sessions to their original Administrative</td><td> </td><td class="right"> expected to restore the BGP sessions to their original Administrative</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> state.</td><td> </td><td class="right"> state.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">3.1.1. Maintenance Considerations</td><td> </td><td class="right">3.1.1. Maintenance Considerations</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0014" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> Initiators of the administrative shutdown <span class="delete">could</span> consider using</td><td> </td><td class="rblock"> Initiators of the administrative shutdown <span class="insert">MAY</span> consider using Graceful</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> Graceful Shutdown [I-D.ietf-grow-bgp-gshut] to facilitate smooth</td><td> </td><td class="rblock"> Shutdown [I-D.ietf-grow-bgp-gshut] to facilitate smooth drainage of</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> drainage of traffic prior to session tear down, and the Shutdown</td><td> </td><td class="rblock"> traffic prior to session tear down, and the Shutdown Communication</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> Communication <span class="delete">[I-D.ietf-idr-shutdown]</span> to inform the remote side on</td><td> </td><td class="rblock"> <span class="insert">[RFC8203]</span> to inform the remote side on the nature and duration of the</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> the nature and duration of the maintenance activities.</td><td> </td><td class="rblock"> maintenance activities.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">3.2. Involuntary BGP Session Teardown Recommendations</td><td> </td><td class="right">3.2. Involuntary BGP Session Teardown Recommendations</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> In the case where multilateral interconnection between BGP speakers</td><td> </td><td class="right"> In the case where multilateral interconnection between BGP speakers</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> is facilitated through a switched layer-2 fabric, such as commonly</td><td> </td><td class="right"> is facilitated through a switched layer-2 fabric, such as commonly</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> seen at Internet Exchange Points (IXPs), different operational</td><td> </td><td class="right"> seen at Internet Exchange Points (IXPs), different operational</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> considerations can apply.</td><td> </td><td class="right"> considerations can apply.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0015" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> Operational experience shows many <span class="delete">network operators</span> are unable to</td><td> </td><td class="rblock"> Operational experience shows many <span class="insert">Operators</span> are unable to carry out</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> carry out the Voluntary BGP Session Teardown recommendations, because</td><td> </td><td class="rblock"> the Voluntary BGP Session Teardown recommendations, because of the</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> of the operational cost and risk of <span class="delete">co-ordinating</span> the two</td><td> </td><td class="rblock"> operational cost and risk of <span class="insert">coordinating</span> the two configuration</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> configuration changes required. This has an adverse affect on</td><td> </td><td class="rblock"> changes required. This has an adverse affect on Internet</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> Internet performance.</td><td> </td><td class="rblock"> performance.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0016" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> In the absence notifications from the lower layer (e.g. <span class="delete">ethernet</span> link</td><td> </td><td class="rblock"> In the absence <span class="insert">of</span> notifications from the lower layer (e.g. <span class="insert">Ethernet</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> down) consistent with the planned maintenance activities in a</td><td> </td><td class="rblock"> link down) consistent with the planned maintenance activities in a</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> switched layer-2 fabric, the Caretaker of the fabric could choose to</td><td> </td><td class="right"> switched layer-2 fabric, the Caretaker of the fabric could choose to</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> cull BGP sessions on behalf of the Operators connected to the fabric.</td><td> </td><td class="right"> cull BGP sessions on behalf of the Operators connected to the fabric.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Such culling of control-plane traffic will preempt the loss of end-</td><td> </td><td class="right"> Such culling of control-plane traffic will preempt the loss of end-</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> user traffic, by causing the expiration of BGP Hold Timers ahead of</td><td> </td><td class="right"> user traffic, by causing the expiration of BGP Hold Timers ahead of</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> the moment where the expiration would occur without intervention from</td><td> </td><td class="right"> the moment where the expiration would occur without intervention from</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> the fabric's Caretaker.</td><td> </td><td class="right"> the fabric's Caretaker.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0017" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> In this scenario, BGP Session Culling is accomplished through the</td><td> </td><td class="rblock"> In this scenario, BGP Session Culling is accomplished <span class="insert">as described in</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> application of a combined layer-3 and layer-4 packet filter deployed</td><td> </td><td class="rblock"><span class="insert"> the next sub-section,</span> through the application of a combined layer-3</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> in the switched <span class="delete">fabric itself.</span></td><td> </td><td class="rblock"> and layer-4 packet filter deployed in the <span class="insert">Caretaker's</span> switched</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"> <span class="insert">fabric.</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">3.2.1. Packet Filter Considerations</td><td> </td><td class="right">3.2.1. Packet Filter Considerations</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0018" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> The following considerations apply to the packet filter design:</td><td> </td><td class="rblock"> The <span class="insert">peering LAN prefixes used by the IXP form the control plane, and</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"> following considerations apply to the packet filter design:</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> o The packet filter MUST only affect BGP traffic specific to the</td><td> </td><td class="right"> o The packet filter MUST only affect BGP traffic specific to the</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> layer-2 fabric, i.e. forming part of the control plane of the</td><td> </td><td class="right"> layer-2 fabric, i.e. forming part of the control plane of the</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> system described, rather than multihop BGP traffic which merely</td><td> </td><td class="right"> system described, rather than multihop BGP traffic which merely</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0019" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> transits</td><td> </td><td class="rblock"> transits<span class="insert">.</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0020" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> o The packet filter MUST only affect BGP, i.e. TCP/179</td><td> </td><td class="rblock"> o The packet filter MUST only affect BGP, i.e. TCP/179<span class="insert">.</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> o The packet filter SHOULD make provision for the bidirectional</td><td> </td><td class="right"> o The packet filter SHOULD make provision for the bidirectional</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> nature of BGP, i.e. that sessions may be established in either</td><td> </td><td class="right"> nature of BGP, i.e. that sessions may be established in either</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0021" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> direction</td><td> </td><td class="rblock"> direction<span class="insert">.</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0022" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> o The packet filter MUST affect all <span class="delete">relevant</span> Address Family</td><td> </td><td class="rblock"> o The packet filter MUST affect all Address Family Identifiers.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> Identifiers.</td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Appendix A contains examples of correct packet filters for various</td><td> </td><td class="right"> Appendix A contains examples of correct packet filters for various</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> platforms.</td><td> </td><td class="right"> platforms.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">3.2.2. Hardware Considerations</td><td> </td><td class="right">3.2.2. Hardware Considerations</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Not all hardware is capable of deploying Layer 3 / Layer 4 filters on</td><td> </td><td class="right"> Not all hardware is capable of deploying Layer 3 / Layer 4 filters on</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Layer 2 ports, and even on platforms which claim support for such a</td><td> </td><td class="right"> Layer 2 ports, and even on platforms which claim support for such a</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> feature, limitations may exist or hardware resource allocation</td><td> </td><td class="right"> feature, limitations may exist or hardware resource allocation</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> failures may occur during filter deployment which may cause</td><td> </td><td class="right"> failures may occur during filter deployment which may cause</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> unexpected results. These problems may include:</td><td> </td><td class="right"> unexpected results. These problems may include:</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> o Platform inability to apply layer 3/4 filters on ports which</td><td> </td><td class="right"> o Platform inability to apply layer 3/4 filters on ports which</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0023" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> already have layer 2 filters applied</td><td> </td><td class="rblock"> already have layer 2 filters applied<span class="insert">.</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0024" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> o Layer 3/4 filters supported for IPv4 but not for IPv6</td><td> </td><td class="rblock"> o Layer 3/4 filters supported for IPv4 but not for IPv6<span class="insert">.</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> o Layer 3/4 filters supported on physical ports, but not on 802.3ad</td><td> </td><td class="right"> o Layer 3/4 filters supported on physical ports, but not on 802.3ad</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0025" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> Link Aggregate ports</td><td> </td><td class="rblock"> Link Aggregate ports<span class="insert">.</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0026" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> o Failure of the <span class="delete">operator</span> to apply filters to all 802.3ad Link</td><td> </td><td class="rblock"> o Failure of the <span class="insert">Caretaker</span> to apply filters to all 802.3ad Link</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> Aggregate <span class="delete">ports</span></td><td> </td><td class="rblock"> Aggregate <span class="insert">ports.</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> o Limitations in ACL hardware mechanisms causing filters not to be</td><td> </td><td class="right"> o Limitations in ACL hardware mechanisms causing filters not to be</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0027" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> applied</td><td> </td><td class="rblock"> applied<span class="insert">.</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> o Fragmentation of ACL lookup memory causing transient ACL</td><td> </td><td class="right"> o Fragmentation of ACL lookup memory causing transient ACL</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> application problems which are resolved after ACL removal /</td><td> </td><td class="right"> application problems which are resolved after ACL removal /</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0028" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> reapplication</td><td> </td><td class="rblock"> reapplication<span class="insert">.</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> o Temporary service loss during hardware programming</td><td> </td><td class="right"> o Temporary service loss during hardware programming</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> o Reduction in hardware ACL capacity if the platform enables</td><td> </td><td class="right"> o Reduction in hardware ACL capacity if the platform enables</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0029" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> lossless ACL application</td><td> </td><td class="rblock"> lossless ACL application<span class="insert">.</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0030" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> It is advisable for the <span class="delete">operato</span>r to be aware of the limitations of</td><td> </td><td class="rblock"> It is advisable for the <span class="insert">Caretake</span>r to be aware of the limitations of</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> their hardware, and to thoroughly test all complicated configurations</td><td> </td><td class="right"> their hardware, and to thoroughly test all complicated configurations</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> in advance to ensure that problems don't occur during production</td><td> </td><td class="right"> in advance to ensure that problems don't occur during production</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> deployments.</td><td> </td><td class="right"> deployments.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">3.3. Procedural Considerations</td><td> </td><td class="right">3.3. Procedural Considerations</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> The Caretaker of the lower layer network can monitor data-plane</td><td> </td><td class="right"> The Caretaker of the lower layer network can monitor data-plane</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> traffic (e.g. interface counters) and carry out the maintenance</td><td> </td><td class="right"> traffic (e.g. interface counters) and carry out the maintenance</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> without impact to traffic once session culling is complete.</td><td> </td><td class="right"> without impact to traffic once session culling is complete.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> It is recommended that the packet filters are only deployed for the</td><td> </td><td class="right"> It is recommended that the packet filters are only deployed for the</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> duration of the maintenance and immediately removed after the</td><td> </td><td class="right"> duration of the maintenance and immediately removed after the</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> maintenance. To prevent unnecessarily troubleshooting, it is</td><td> </td><td class="right"> maintenance. To prevent unnecessarily troubleshooting, it is</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0031" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> RECOMMENDED that Caretakers notify the affected <span class="delete">o</span>perators before the</td><td> </td><td class="rblock"> RECOMMENDED that Caretakers notify the affected <span class="insert">O</span>perators before the</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> maintenance takes place, and make it explicit that the Involuntary</td><td> </td><td class="right"> maintenance takes place, and make it explicit that the Involuntary</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> BGP Session Culling methodology will be applied.</td><td> </td><td class="right"> BGP Session Culling methodology will be applied.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">4. Acknowledgments</td><td> </td><td class="right">4. Acknowledgments</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> The authors would like to thank the following people for their</td><td> </td><td class="right"> The authors would like to thank the following people for their</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> contributions to this document: Saku Ytti, Greg Hankins, James</td><td> </td><td class="right"> contributions to this document: Saku Ytti, Greg Hankins, James</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Bensley, Wolfgang Tremmel, Daniel Roesen, Bruno Decraene, Tore</td><td> </td><td class="right"> Bensley, Wolfgang Tremmel, Daniel Roesen, Bruno Decraene, Tore</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0032" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> Anderson, John <span class="delete">Heasley and</span> Warren <span class="delete">Kumari.</span></td><td> </td><td class="rblock"> Anderson, John <span class="insert">Heasley,</span> Warren <span class="insert">Kumari, Stig Venaas, and Brian</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"> Carpenter.</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">5. Security Considerations</td><td> </td><td class="right">5. Security Considerations</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> There are no security considerations.</td><td> </td><td class="right"> There are no security considerations.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">6. IANA Considerations</td><td> </td><td class="right">6. IANA Considerations</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> This document has no actions for IANA.</td><td> </td><td class="right"> This document has no actions for IANA.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">7. References</td><td> </td><td class="right">7. References</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">7.1. Normative References</td><td> </td><td class="right">7.1. Normative References</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate</td><td> </td><td class="right"> [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Requirement Levels", BCP 14, RFC 2119,</td><td> </td><td class="right"> Requirement Levels", BCP 14, RFC 2119,</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0033" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> DOI 10.17487/RFC2119, March 1997,</td><td> </td><td class="rblock"> DOI 10.17487/RFC2119, March 1997, <span class="insert"><https://www.rfc-</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> <span class="delete"><https://www.rfc-editor.org/info/rfc2119>.</span></td><td> </td><td class="rblock"><span class="insert"> editor.org/info/rfc2119>.</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> [RFC4271] Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A</td><td> </td><td class="right"> [RFC4271] Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Border Gateway Protocol 4 (BGP-4)", RFC 4271,</td><td> </td><td class="right"> Border Gateway Protocol 4 (BGP-4)", RFC 4271,</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0034" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> DOI 10.17487/RFC4271, January 2006,</td><td> </td><td class="rblock"> DOI 10.17487/RFC4271, January 2006, <span class="insert"><https://www.rfc-</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> <span class="delete"><https://www.rfc-editor.org/info/rfc4271>.</span></td><td> </td><td class="rblock"><span class="insert"> editor.org/info/rfc4271>.</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">7.2. Informative References</td><td> </td><td class="right">7.2. Informative References</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> [I-D.ietf-grow-bgp-gshut]</td><td> </td><td class="right"> [I-D.ietf-grow-bgp-gshut]</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Francois, P., Decraene, B., Pelsser, C., Patel, K., and C.</td><td> </td><td class="right"> Francois, P., Decraene, B., Pelsser, C., Patel, K., and C.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Filsfils, "Graceful BGP session shutdown", draft-ietf-</td><td> </td><td class="right"> Filsfils, "Graceful BGP session shutdown", draft-ietf-</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0035" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> grow-bgp-gshut-<span class="delete">09 (work in progress), July</span> 2017.</td><td> </td><td class="rblock"> grow-bgp-gshut-<span class="insert">11 (work in progress), September</span> 2017.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0036" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> <span class="delete">[I-D.ietf-idr-shutdown]</span></td><td> </td><td class="rblock"> <span class="insert">[RFC8203]</span> Snijders, J., Heitz, J., and J. Scudder, "BGP</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> Snijders, J., Heitz, J., and J. Scudder, "BGP</td><td> </td><td class="rblock"> Administrative Shutdown Communication", <span class="insert">RFC 8203,</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> Administrative Shutdown Communication", <span class="delete">draft-ietf-idr-</span></td><td> </td><td class="rblock"><span class="insert"> DOI 10.17487/RFC8203, July 2017, <https://www.rfc-</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"> shutdown-10 (work in progress), June 2017.</span></td><td> </td><td class="rblock"><span class="insert"> editor.org/info/rfc8203>.</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> [I-D.ietf-rtgwg-bgp-pic]</td><td> </td><td class="right"> [I-D.ietf-rtgwg-bgp-pic]</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Bashandy, A., Filsfils, C., and P. Mohapatra, "BGP Prefix</td><td> </td><td class="right"> Bashandy, A., Filsfils, C., and P. Mohapatra, "BGP Prefix</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Independent Convergence", draft-ietf-rtgwg-bgp-pic-05</td><td> </td><td class="right"> Independent Convergence", draft-ietf-rtgwg-bgp-pic-05</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> (work in progress), May 2017.</td><td> </td><td class="right"> (work in progress), May 2017.</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0037" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete">7.3. URIs</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"></span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"> [1] https://github.com/bgp/bgp-session-culling-config-examples</span></td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> </td><td> </td><td class="rblock"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">Appendix A. Example packet filters</td><td> </td><td class="right">Appendix A. Example packet filters</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> Example packet filters for "Involuntary BGP Session Teardown" at an</td><td> </td><td class="right"> Example packet filters for "Involuntary BGP Session Teardown" at an</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0038" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> IXP <span class="delete">with</span> LAN prefixes 192.0.2.0/24 and <span class="delete">2001:db8:2::/64.</span></td><td> </td><td class="rblock"> IXP <span class="insert">using peering</span> LAN prefixes 192.0.2.0/24 and <span class="insert">2001:db8:2::/64 as</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"></td><td> </td><td class="rblock"><span class="insert"> its control plane.</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> A repository of configuration examples for a number of assorted</td><td> </td><td class="right"> A repository of configuration examples for a number of assorted</td><td class="lineno" valign="top"></td></tr>
<tr><td><a name="diff0039" /></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"> platforms can be found at <span class="delete">github.com/bgp/bgp-session-culling-config-</span></td><td> </td><td class="rblock"> platforms can be found at <span class="insert">https://github.com/bgp/bgp-session-culling-</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="lblock"><span class="delete"> examples [1].</span></td><td> </td><td class="rblock"><span class="insert"> config-examples .</span></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left">A.1. Cisco IOS, IOS XR & Arista EOS Firewall Example Configuration</td><td> </td><td class="right">A.1. Cisco IOS, IOS XR & Arista EOS Firewall Example Configuration</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"></td><td> </td><td class="right"></td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> ipv6 access-list acl-ipv6-permit-all-except-bgp</td><td> </td><td class="right"> ipv6 access-list acl-ipv6-permit-all-except-bgp</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> 10 deny tcp 2001:db8:2::/64 eq bgp 2001:db8:2::/64</td><td> </td><td class="right"> 10 deny tcp 2001:db8:2::/64 eq bgp 2001:db8:2::/64</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> 20 deny tcp 2001:db8:2::/64 2001:db8:2::/64 eq bgp</td><td> </td><td class="right"> 20 deny tcp 2001:db8:2::/64 2001:db8:2::/64 eq bgp</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> 30 permit ipv6 any any</td><td> </td><td class="right"> 30 permit ipv6 any any</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> !</td><td> </td><td class="right"> !</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> ip access-list acl-ipv4-permit-all-except-bgp</td><td> </td><td class="right"> ip access-list acl-ipv4-permit-all-except-bgp</td><td class="lineno" valign="top"></td></tr>
<tr><td class="lineno" valign="top"></td><td class="left"> 10 deny tcp 192.0.2.0/24 eq bgp 192.0.2.0/24</td><td> </td><td class="right"> 10 deny tcp 192.0.2.0/24 eq bgp 192.0.2.0/24</td><td class="lineno" valign="top"></td></tr>
<tr><td></td><td class="left"></td><td> </td><td class="right"></td><td></td></tr>
<tr bgcolor="gray"><th colspan="5" align="center"><a name="end"> End of changes. 39 change blocks. </a></th></tr>
<tr class="stats"><td></td><th><i>68 lines changed or deleted</i></th><th><i> </i></th><th><i>67 lines changed or added</i></th><td></td></tr>
<tr><td colspan="5" align="center" class="small"><br/>This html diff was produced by rfcdiff 1.41. The latest version is available from <a href="http://www.tools.ietf.org/tools/rfcdiff/" >http://tools.ietf.org/tools/rfcdiff/</a> </td></tr>
</table>
</body>
</html>