<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" ipr="trust200902" docName="draft-ietf-pce-local-protection-enforcement-11" number="9488" submissionType="IETF" category="std" consensus="true" updates="5440" obsoletes="" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" prepTime="2023-10-18T11:31:42" indexInclude="true" scripts="Common,Latin" tocDepth="3">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-pce-local-protection-enforcement-11" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc9488" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="Local Protection Enforcement in PCEP">Local Protection Enforcement in the Path Computation Element Communication Protocol (PCEP)</title>
    <seriesInfo name="RFC" value="9488" stream="IETF"/>
    <author fullname="Andrew Stone" initials="A." surname="Stone">
      <organization showOnFrontPage="true">Nokia</organization>
      <address>
        <postal>
          <street>600 March Road</street>
          <city>Kanata</city>
          <region>Ontario</region>
          <code>K2K 2T6</code>
          <country>Canada</country>
        </postal>
        <email>andrew.stone@nokia.com</email>
      </address>
    </author>
    <author fullname="Mustapha Aissaoui" initials="M." surname="Aissaoui">
      <organization showOnFrontPage="true">Nokia</organization>
      <address>
        <postal>
          <street>600 March Road</street>
          <city>Kanata</city>
          <region>Ontario</region>
          <code>K2K 2T6</code>
          <country>Canada</country>
        </postal>
        <email>mustapha.aissaoui@nokia.com</email>
      </address>
    </author>
    <author fullname="Samuel Sidor" initials="S." surname="Sidor">
      <organization showOnFrontPage="true">Cisco Systems, Inc.</organization>
      <address>
        <postal>
          <extaddr>Eurovea Central 3</extaddr>
          <street>Pribinova 10</street>
          <city>Bratislava</city>
          <code>811 09</code>
          <country>Slovakia</country>
        </postal>
        <email>ssidor@cisco.com</email>
      </address>
    </author>
    <author fullname="Siva Sivabalan" initials="S." surname="Sivabalan">
      <organization showOnFrontPage="true">Ciena Corporation</organization>
      <address>
        <postal>
          <street>385 Terry Fox Drive</street>
          <city>Kanata</city>
          <region>Ontario</region>
          <code>K2K 0L1</code>
          <country>Canada</country>
        </postal>
        <email>ssivabal@ciena.com</email>
      </address>
    </author>
    <date month="10" year="2023"/>
    <area>rtg</area>
    <workgroup>pce</workgroup>
    <keyword>segment routing</keyword>
    <keyword>adjacency sid</keyword>
    <keyword>sla</keyword>
    <keyword>fast reroute</keyword>
    <keyword>ti-lfa</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">This document updates RFC 5440 to clarify usage of the Local Protection Desired bit signaled in the Path Computation Element Communication Protocol (PCEP).
                This document also introduces a new flag for signaling protection enforcement in PCEP.</t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc9488" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2023 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Revised BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Revised BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-requirements-language">Requirements Language</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terminology">Terminology</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-motivation">Motivation</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2">
              <li pn="section-toc.1-1.4.2.1">
                <t indent="0" pn="section-toc.1-1.4.2.1.1"><xref derivedContent="4.1" format="counter" sectionFormat="of" target="section-4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-implementation-differences">Implementation Differences</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.2">
                <t indent="0" pn="section-toc.1-1.4.2.2.1"><xref derivedContent="4.2" format="counter" sectionFormat="of" target="section-4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-sla-enforcement">SLA Enforcement</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-protection-enforcement-flag">Protection Enforcement Flag (E Flag)</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2">
              <li pn="section-toc.1-1.5.2.1">
                <t indent="0" pn="section-toc.1-1.5.2.1.1"><xref derivedContent="5.1" format="counter" sectionFormat="of" target="section-5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-backwards-compatibility">Backwards Compatibility</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.8.2">
              <li pn="section-toc.1-1.8.2.1">
                <t indent="0" pn="section-toc.1-1.8.2.1.1"><xref derivedContent="8.1" format="counter" sectionFormat="of" target="section-8.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.2">
                <t indent="0" pn="section-toc.1-1.8.2.2.1"><xref derivedContent="8.2" format="counter" sectionFormat="of" target="section-8.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgements</xref></t>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="introduction" toc="include" numbered="true" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">The Path Computation Element Communication Protocol (PCEP) <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/> enables the communication between a Path Computation Client (PCC) and a PCE or between two PCEs based on the PCE architecture <xref target="RFC4655" format="default" sectionFormat="of" derivedContent="RFC4655"/>. </t>
      <t indent="0" pn="section-1-2">PCEP <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/> utilizes flags,
      values, and concepts previously defined in RSVP-TE Extensions <xref target="RFC3209" format="default" sectionFormat="of" derivedContent="RFC3209"/> and Fast Reroute Extensions to
      RSVP-TE <xref target="RFC4090" format="default" sectionFormat="of" derivedContent="RFC4090"/>.  One such concept in
      PCEP is the Local Protection Desired (L) flag in the LSP
      Attributes (LSPA) object in <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/>, which
      was originally defined in the Session Attribute object in <xref target="RFC3209" format="default" sectionFormat="of" derivedContent="RFC3209"/>. In RSVP, this flag signals to
      downstream routers that they may use a local repair mechanism.  The
      headend router calculating the path does not know if a downstream
      router will or will not protect a hop during its calculation.
      Therefore, the L flag does not require the transit
      router to satisfy protection in order to establish the RSVP-signaled
      path.  This flag is signaled in PCEP as an attribute of the Label Switched Path (LSP) via the
      LSPA object. </t>
      <t indent="0" pn="section-1-3">PCEP Extensions for Segment Routing <xref target="RFC8664" format="default" sectionFormat="of" derivedContent="RFC8664"/> extends support in PCEP for Segment Routing paths. The
      path list is encoded with Segment Identifiers (SIDs), each of which
      might offer local protection.  The PCE may discover the protection
      eligibility for a SID via the Border Gateway Protocol - Link State (BGP-LS)
      <xref target="RFC9085" format="default" sectionFormat="of" derivedContent="RFC9085"/> and take the protection into
      consideration as a path constraint.
      </t>
      <t indent="0" pn="section-1-4">It is desirable for an operator to be able to define the enforcement of the protection requirement. </t>
      <t indent="0" pn="section-1-5">This document updates <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/> by further describing the behavior of the Local Protection Desired (L) flag and extends on it with the introduction of the Protection Enforcement (E) flag.</t>
      <t indent="0" pn="section-1-6">The document contains descriptions in the context of Segment Routing; however, the content described is agnostic in regard to path setup type and data plane technology.</t>
    </section>
    <section anchor="requirements-language" numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-requirements-language">Requirements Language</name>
      <t indent="0" pn="section-2-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
      </t>
    </section>
    <section anchor="terminology" numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-terminology">Terminology</name>
      <t indent="0" pn="section-3-1">This document uses the following terminology:</t>
      <dl newline="false" spacing="normal" indent="3" pn="section-3-2">
        <dt pn="section-3-2.1">PROTECTION MANDATORY:</dt>
        <dd pn="section-3-2.2">The path <bcp14>MUST</bcp14> have protection eligibility on all links.</dd>
        <dt pn="section-3-2.3">UNPROTECTED MANDATORY:</dt>
        <dd pn="section-3-2.4">The path <bcp14>MUST NOT</bcp14> have protection eligibility on all links.</dd>
        <dt pn="section-3-2.5">PROTECTION PREFERRED:</dt>
        <dd pn="section-3-2.6">The path should have protection eligibility on all links but might contain links that do not have protection eligibility.</dd>
        <dt pn="section-3-2.7">UNPROTECTED PREFERRED:</dt>
        <dd pn="section-3-2.8">The path should not have protection eligibility on all links but might contain links that have protection eligibility.</dd>
        <dt pn="section-3-2.9">PCC:</dt>
        <dd pn="section-3-2.10">Path Computation Client.  Any client application requesting a
                path computation to be performed by a Path Computation Element.</dd>
        <dt pn="section-3-2.11">PCE:</dt>
        <dd pn="section-3-2.12">Path Computation Element.  An entity (component, application,
                or network node) that is capable of computing a network path or
                route based on a network graph and applying computational
                constraints.</dd>
        <dt pn="section-3-2.13">PCEP:</dt>
        <dd pn="section-3-2.14">Path Computation Element Communication Protocol</dd>
        <dt pn="section-3-2.15">LSPA:</dt>
        <dd pn="section-3-2.16">LSP Attributes object <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/></dd>
      </dl>
    </section>
    <section anchor="motivation" toc="include" numbered="true" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-motivation">Motivation</name>
      <section anchor="implementation-differences" toc="include" numbered="true" removeInRFC="false" pn="section-4.1">
        <name slugifiedName="name-implementation-differences">Implementation Differences</name>
        <t indent="0" pn="section-4.1-1">As defined in <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/>, the mechanism to signal protection enforcement in PCEP is the previously mentioned L flag defined in the LSPA object.
                    The name of the flag uses the term "Desired", which by definition means "strongly wished for or intended". The use case for this flag originated in RSVP.
                    For RSVP-signaled paths, local protection is not within control of the PCE. However, <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/> does state that "[w]hen set, this means that the computed path must include links protected with Fast Reroute as defined in <xref target="RFC4090" format="default" sectionFormat="of" derivedContent="RFC4090"/>."
                    Implementations that use PCEP <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/> have interpreted the L flag as either PROTECTION MANDATORY or PROTECTION PREFERRED, leading to operational differences. </t>
      </section>
      <section anchor="sla-enforcement" toc="include" numbered="true" removeInRFC="false" pn="section-4.2">
        <name slugifiedName="name-sla-enforcement">SLA Enforcement</name>
        <t indent="0" pn="section-4.2-1"> The L flag is a boolean bit and thus unable to distinguish between the different
            options of PROTECTION MANDATORY, UNPROTECTED MANDATORY, PROTECTION
            PREFERRED, and UNPROTECTED PREFERRED.
                    Selecting one of these options is typically dependent on the Service
                    Level Agreement (SLA) the operator wishes to impose on the LSP. A network
                    may be providing transit to multiple SLA definitions against
                    the same base topology network, whose behavior could vary, such as
                    wanting local protection to be invoked on some LSPs and not wanting
                    local protection on others. When enforcement is used, the resulting shortest path calculation is impacted.</t>
        <t indent="0" pn="section-4.2-2"> For example, PROTECTION MANDATORY is for use cases in which an operator may need the LSP to follow a path that has local protection provided along the full path, ensuring that
                    traffic will be fast rerouted at the point if there is a failure anywhere along the path. </t>
        <t indent="0" pn="section-4.2-3"> As another example, UNPROTECTED MANDATORY is for use cases in which an operator may
                    intentionally prefer an LSP to not be locally protected
                    and thus would rather local failures cause the LSP to go down.
                    An example scenario is one where an LSP is protected via a secondary diverse LSP.
                    Each LSP is traffic engineered to follow specific traffic-engineered criteria
                    computed by the PCE to satisfy the SLA. Upon a failure, if local protection
                    is invoked on the active LSP traffic, the traffic may temporarily
                    traverse links that violate the TE requirements and could negatively
                    impact the resources being traversed (e.g., insufficient bandwidth).
                    In addition, depending on the network topological scenario,
                    it may not be feasible for the PCE to reroute the LSP while
                    respecting the TE requirements, which include path diversity; this results
                    in the LSP being torn down and switched to the
                    protected path anyways. In such scenarios, it is desirable for
                    the LSP to be simply torn down immediately and not rerouted
                    through local protection, so that traffic
                    may be forwarded through an already-established
                    traffic-engineered secondary path. </t>
        <t indent="0" pn="section-4.2-4">
                    Both the UNPROTECTED PREFERRED and PROTECTED PREFERRED options provide a relaxation of the protection constraint.
                    These options can be used when an operator does not require protection enforcement. Regardless of the option selected, the protection status of a
                    resource does not influence whether the link must be pruned during a path calculation. Furthermore, the selection of either option indicates a priority selection to the
                    PCE when there is an option to choose a protected or unprotected instruction associated with a resource, ensuring consistent PCE behavior across different implementations.
        </t>
        <t indent="0" pn="section-4.2-5">When used with Segment Routing, an adjacency may have both a protected SID and an unprotected SID.
                    If the UNPROTECTED PREFERRED option is selected, the PCE chooses the unprotected SID. Alternatively, if the PROTECTED PREFERRED option is selected, the PCE chooses the protected SID.
        </t>
      </section>
    </section>
    <section anchor="protection-enforcement-flag--e-flag-" toc="include" numbered="true" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-protection-enforcement-flag">Protection Enforcement Flag (E Flag)</name>
      <t indent="0" pn="section-5-1"><xref target="RFC5440" section="7.11" sectionFormat="of" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5440#section-7.11" derivedContent="RFC5440"/> describes the encoding of the Local Protection Desired (L) flag.
                The Protection Enforcement (E) flag, which extends the L flag, is specified below.</t>
      <table anchor="flagfieldtable" align="left" pn="table-1">
        <name slugifiedName="name-codespace-of-the-flag-field">Codespace of the Flag Field (LSPA Object)</name>
        <thead>
          <tr>
            <th align="left" colspan="1" rowspan="1">Bit</th>
            <th align="left" colspan="1" rowspan="1">Description</th>
            <th align="left" colspan="1" rowspan="1">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left" colspan="1" rowspan="1">6</td>
            <td align="left" colspan="1" rowspan="1">Protection Enforcement</td>
            <td align="left" colspan="1" rowspan="1">RFC 9488</td>
          </tr>
          <tr>
            <td align="left" colspan="1" rowspan="1">7</td>
            <td align="left" colspan="1" rowspan="1">Local Protection Desired</td>
            <td align="left" colspan="1" rowspan="1">RFC 5440</td>
          </tr>
        </tbody>
      </table>
      <t indent="0" pn="section-5-3">The following shows the format of the LSPA object as defined in <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/> with the addition of the E flag defined in this document:</t>
      <artwork name="" type="" align="left" alt="" pn="section-5-4">
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                       Exclude-any                             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                       Include-any                             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                       Include-all                             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |  Setup Prio   |  Holding Prio |     Flags |E|L|   Reserved    |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                                                               |
   //                     Optional TLVs                           //
   |                                                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
      <dl newline="true" spacing="normal" indent="3" pn="section-5-5">
        <dt pn="section-5-5.1">Flags (8 bits):</dt>
        <dd pn="section-5-5.2">
          <dl newline="false" spacing="normal" indent="3" pn="section-5-5.2.1">
            <dt pn="section-5-5.2.1.1">L (Local Protection Desired):</dt>
            <dd pn="section-5-5.2.1.2">This flag is defined in <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/>
and further updated by this document. When set to 1, protection is
desired. When set to 0, protection is not desired. The enforcement of the
protection is identified via the E flag.</dd>
            <dt pn="section-5-5.2.1.3">E (Protection Enforcement):</dt>
            <dd pn="section-5-5.2.1.4">This flag controls the strictness
with which the PCE must apply the L flag.  When set to 1, the value of the L
flag needs to be respected during resource selection by the PCE.  When the E flag
is set to 0, an attempt to respect the value of the L flag is made; however,
the PCE could relax or ignore the L flag when computing a path.  The
statements below indicate preference when the E flag is set to 0 in
combination with the L flag value.
</dd>
          </dl>
        </dd>
      </dl>
      <t indent="0" pn="section-5-6">When both the L flag and E flag are set to 1, then the PCE <bcp14>MUST</bcp14> consider the protection eligibility as a PROTECTION MANDATORY constraint.</t>
      <t indent="0" pn="section-5-7">When the L flag is set to 1 and the E flag is set to 0, then the PCE <bcp14>MUST</bcp14> consider the protection eligibility as a PROTECTION PREFERRED constraint.</t>
      <t indent="0" pn="section-5-8">  When both the L flag and E flag are set to 0, then the PCE <bcp14>SHOULD</bcp14>
                consider the protection eligibility as an UNPROTECTED PREFERRED
                constraint but <bcp14>MAY</bcp14> consider the protection eligibility as an UNPROTECTED
                MANDATORY constraint. An example of when the latter behavior might
                be chosen is if the PCE has some means (outside the scope of this
                document) to detect that it is interacting with a legacy PCC that expects
                the legacy behavior.</t>
      <t indent="0" pn="section-5-9">When the L flag is set to 0 and the E flag is set to 1, then the PCE <bcp14>MUST</bcp14> consider the protection eligibility as an UNPROTECTED MANDATORY constraint.</t>
      <t indent="0" pn="section-5-10">
                If a PCE is unable to infer the protection status of a resource, the PCE <bcp14>MAY</bcp14> use local policy to define protected status assumptions.

                When computing a Segment Routing path, it is <bcp14>RECOMMENDED</bcp14> that a PCE assume a Node SID is protected. It is also <bcp14>RECOMMENDED</bcp14> that a PCE assume an Adjacency SID is protected if the backup flag advertised with the Adjacency SID is set.
      </t>
      <section anchor="compatibility" toc="include" numbered="true" removeInRFC="false" pn="section-5.1">
        <name slugifiedName="name-backwards-compatibility">Backwards Compatibility</name>
        <t indent="0" pn="section-5.1-1">This section outlines considerations for the E flag bit in the message
            passing between the PCC and the PCE that are not supported by the entity.
            The requirements for the PCE and the PCC implementing this document are described
            at the end.</t>
        <t indent="0" pn="section-5.1-2">For a PCC or PCE that does not yet support this document, the E flag is ignored and set to 0 in PCRpt and/or PCUpd messages as per <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/> for PCC-initiated LSPs or as per <xref target="RFC8281" format="default" sectionFormat="of" derivedContent="RFC8281"/> for PCE-initiated LSPs. It is important to note that <xref target="RFC8231" format="default" sectionFormat="of" derivedContent="RFC8231"/> and <xref target="RFC8281" format="default" sectionFormat="of" derivedContent="RFC8281"/> permit the LSPA object <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/> to be included in PCUpd messages for PCC-initiated and PCE-initiated LSPs.
        </t>
        <t indent="0" pn="section-5.1-3">
            For PCC-initiated LSPs, the E flag (and L flag) in a PCUpd message is an echo from the
            previous PCRpt message; however, the bit value is ignored on the PCE from the
            previous PCRpt message, so the E flag value set in the PCUpd message is 0.
                    A PCE that does not support this document sends PCUpd messages with the E flag set to 0 for PCC-initiated LSPs even if set to 1 in the prior PCReq or PCRpt message.
        </t>
        <t indent="0" pn="section-5.1-4">
                    A PCC that does not support this document sends PCRpt messages with the E flag set to 0 for PCE-initiated LSPs even if set to 1 in the prior PCInitiate or PCUpd message.
        </t>
        <t indent="0" pn="section-5.1-5">For a PCC that does support this document, the E flag <bcp14>MAY</bcp14> be set to 1 depending on local configuration.
                    If communicating with a PCE that does not yet support this document, the PCE follows the behavior specified in <xref target="RFC5440" format="default" sectionFormat="of" derivedContent="RFC5440"/> and ignores the E flag.
                    Thus, a computed path might not respect the enforcement constraint.</t>
        <t indent="0" pn="section-5.1-6">For PCC-initiated LSPs, the PCC <bcp14>SHOULD</bcp14> ignore the E flag value received from the PCE in a PCUpd message as it may be communicating with a PCE that does not support this document.</t>
        <t indent="0" pn="section-5.1-7">For PCE-initiated LSPs, the PCC <bcp14>MAY</bcp14> process the E flag value received from the PCE in a PCUpd message. The PCE <bcp14>SHOULD</bcp14> ignore the E flag value received from the PCC in a PCRpt message as it may be communicating with a PCC
                that does not support this document. </t>
      </section>
    </section>
    <section anchor="security-considerations" toc="include" numbered="true" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t indent="0" pn="section-6-1">This document clarifies the behavior of an existing flag and introduces a new flag to provide further control of that existing behavior. The introduction of this new flag and the behavior clarification do not create any new sensitive information. No additional security measure is required.</t>
      <t indent="0" pn="section-6-2">Securing the PCEP session using Transport Layer Security (TLS) <xref target="RFC8253" format="default" sectionFormat="of" derivedContent="RFC8253"/>, as per the recommendations and best current practices in <xref target="RFC9325" format="default" sectionFormat="of" derivedContent="RFC9325"/>, is <bcp14>RECOMMENDED</bcp14>.</t>
    </section>
    <section anchor="iana-considerations" toc="include" numbered="true" removeInRFC="false" pn="section-7">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t indent="0" pn="section-7-1">This document defines a new bit value in the subregistry "LSPA Object Flag Field" in the "Path Computation Element Protocol (PCEP) Numbers" registry. IANA has made the following codepoint allocation.</t>
      <table anchor="prot-enforce-iana-table" align="left" pn="table-2">
        <name slugifiedName="name-addition-to-lspa-object-fla">Addition to LSPA Object Flag Field Registry</name>
        <thead>
          <tr>
            <th align="left" colspan="1" rowspan="1">Bit</th>
            <th align="left" colspan="1" rowspan="1">Description</th>
            <th align="left" colspan="1" rowspan="1">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left" colspan="1" rowspan="1">6</td>
            <td align="left" colspan="1" rowspan="1">Protection Enforcement</td>
            <td align="left" colspan="1" rowspan="1">RFC 9488</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references pn="section-8">
      <name slugifiedName="name-references">References</name>
      <references pn="section-8.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t indent="0">In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC3209" target="https://www.rfc-editor.org/info/rfc3209" quoteTitle="true" derivedAnchor="RFC3209">
          <front>
            <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
            <author fullname="D. Awduche" initials="D." surname="Awduche"/>
            <author fullname="L. Berger" initials="L." surname="Berger"/>
            <author fullname="D. Gan" initials="D." surname="Gan"/>
            <author fullname="T. Li" initials="T." surname="Li"/>
            <author fullname="V. Srinivasan" initials="V." surname="Srinivasan"/>
            <author fullname="G. Swallow" initials="G." surname="Swallow"/>
            <date month="December" year="2001"/>
            <abstract>
              <t indent="0">This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching). Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels. A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3209"/>
          <seriesInfo name="DOI" value="10.17487/RFC3209"/>
        </reference>
        <reference anchor="RFC4090" target="https://www.rfc-editor.org/info/rfc4090" quoteTitle="true" derivedAnchor="RFC4090">
          <front>
            <title>Fast Reroute Extensions to RSVP-TE for LSP Tunnels</title>
            <author fullname="P. Pan" initials="P." role="editor" surname="Pan"/>
            <author fullname="G. Swallow" initials="G." role="editor" surname="Swallow"/>
            <author fullname="A. Atlas" initials="A." role="editor" surname="Atlas"/>
            <date month="May" year="2005"/>
            <abstract>
              <t indent="0">This document defines RSVP-TE extensions to establish backup label-switched path (LSP) tunnels for local repair of LSP tunnels. These mechanisms enable the re-direction of traffic onto backup LSP tunnels in 10s of milliseconds, in the event of a failure.</t>
              <t indent="0">Two methods are defined here. The one-to-one backup method creates detour LSPs for each protected LSP at each potential point of local repair. The facility backup method creates a bypass tunnel to protect a potential failure point; by taking advantage of MPLS label stacking, this bypass tunnel can protect a set of LSPs that have similar backup constraints. Both methods can be used to protect links and nodes during network failure. The described behavior and extensions to RSVP allow nodes to implement either method or both and to interoperate in a mixed network. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4090"/>
          <seriesInfo name="DOI" value="10.17487/RFC4090"/>
        </reference>
        <reference anchor="RFC5440" target="https://www.rfc-editor.org/info/rfc5440" quoteTitle="true" derivedAnchor="RFC5440">
          <front>
            <title>Path Computation Element (PCE) Communication Protocol (PCEP)</title>
            <author fullname="JP. Vasseur" initials="JP." role="editor" surname="Vasseur"/>
            <author fullname="JL. Le Roux" initials="JL." role="editor" surname="Le Roux"/>
            <date month="March" year="2009"/>
            <abstract>
              <t indent="0">This document specifies the Path Computation Element (PCE) Communication Protocol (PCEP) for communications between a Path Computation Client (PCC) and a PCE, or between two PCEs. Such interactions include path computation requests and path computation replies as well as notifications of specific states related to the use of a PCE in the context of Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Traffic Engineering. PCEP is designed to be flexible and extensible so as to easily allow for the addition of further messages and objects, should further requirements be expressed in the future. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5440"/>
          <seriesInfo name="DOI" value="10.17487/RFC5440"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t indent="0">RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8231" target="https://www.rfc-editor.org/info/rfc8231" quoteTitle="true" derivedAnchor="RFC8231">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for Stateful PCE</title>
            <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
            <author fullname="I. Minei" initials="I." surname="Minei"/>
            <author fullname="J. Medved" initials="J." surname="Medved"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <date month="September" year="2017"/>
            <abstract>
              <t indent="0">The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
              <t indent="0">Although PCEP explicitly makes no assumptions regarding the information available to the PCE, it also makes no provisions for PCE control of timing and sequence of path computations within and across PCEP sessions. This document describes a set of extensions to PCEP to enable stateful control of MPLS-TE and GMPLS Label Switched Paths (LSPs) via PCEP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8231"/>
          <seriesInfo name="DOI" value="10.17487/RFC8231"/>
        </reference>
        <reference anchor="RFC8253" target="https://www.rfc-editor.org/info/rfc8253" quoteTitle="true" derivedAnchor="RFC8253">
          <front>
            <title>PCEPS: Usage of TLS to Provide a Secure Transport for the Path Computation Element Communication Protocol (PCEP)</title>
            <author fullname="D. Lopez" initials="D." surname="Lopez"/>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="D. Dhody" initials="D." surname="Dhody"/>
            <date month="October" year="2017"/>
            <abstract>
              <t indent="0">The Path Computation Element Communication Protocol (PCEP) defines the mechanisms for the communication between a Path Computation Client (PCC) and a Path Computation Element (PCE), or among PCEs. This document describes PCEPS -- the usage of Transport Layer Security (TLS) to provide a secure transport for PCEP. The additional security mechanisms are provided by the transport protocol supporting PCEP; therefore, they do not affect the flexibility and extensibility of PCEP.</t>
              <t indent="0">This document updates RFC 5440 in regards to the PCEP initialization phase procedures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8253"/>
          <seriesInfo name="DOI" value="10.17487/RFC8253"/>
        </reference>
        <reference anchor="RFC8281" target="https://www.rfc-editor.org/info/rfc8281" quoteTitle="true" derivedAnchor="RFC8281">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for PCE-Initiated LSP Setup in a Stateful PCE Model</title>
            <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
            <author fullname="I. Minei" initials="I." surname="Minei"/>
            <author fullname="S. Sivabalan" initials="S." surname="Sivabalan"/>
            <author fullname="R. Varga" initials="R." surname="Varga"/>
            <date month="December" year="2017"/>
            <abstract>
              <t indent="0">The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
              <t indent="0">The extensions for stateful PCE provide active control of Multiprotocol Label Switching (MPLS) Traffic Engineering Label Switched Paths (TE LSPs) via PCEP, for a model where the PCC delegates control over one or more locally configured LSPs to the PCE. This document describes the creation and deletion of PCE-initiated LSPs under the stateful PCE model.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8281"/>
          <seriesInfo name="DOI" value="10.17487/RFC8281"/>
        </reference>
        <reference anchor="RFC9325" target="https://www.rfc-editor.org/info/rfc9325" quoteTitle="true" derivedAnchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t indent="0">Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t indent="0">RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
      </references>
      <references pn="section-8.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="RFC4655" target="https://www.rfc-editor.org/info/rfc4655" quoteTitle="true" derivedAnchor="RFC4655">
          <front>
            <title>A Path Computation Element (PCE)-Based Architecture</title>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <author fullname="J.-P. Vasseur" initials="J.-P." surname="Vasseur"/>
            <author fullname="J. Ash" initials="J." surname="Ash"/>
            <date month="August" year="2006"/>
            <abstract>
              <t indent="0">Constraint-based path computation is a fundamental building block for traffic engineering systems such as Multiprotocol Label Switching (MPLS) and Generalized Multiprotocol Label Switching (GMPLS) networks. Path computation in large, multi-domain, multi-region, or multi-layer networks is complex and may require special computational components and cooperation between the different network domains.</t>
              <t indent="0">This document specifies the architecture for a Path Computation Element (PCE)-based model to address this problem space. This document does not attempt to provide a detailed description of all the architectural components, but rather it describes a set of building blocks for the PCE architecture from which solutions may be constructed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4655"/>
          <seriesInfo name="DOI" value="10.17487/RFC4655"/>
        </reference>
        <reference anchor="RFC8664" target="https://www.rfc-editor.org/info/rfc8664" quoteTitle="true" derivedAnchor="RFC8664">
          <front>
            <title>Path Computation Element Communication Protocol (PCEP) Extensions for Segment Routing</title>
            <author fullname="S. Sivabalan" initials="S." surname="Sivabalan"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
            <author fullname="W. Henderickx" initials="W." surname="Henderickx"/>
            <author fullname="J. Hardwick" initials="J." surname="Hardwick"/>
            <date month="December" year="2019"/>
            <abstract>
              <t indent="0">Segment Routing (SR) enables any head-end node to select any path without relying on a hop-by-hop signaling technique (e.g., LDP or RSVP-TE). It depends only on "segments" that are advertised by link-state Interior Gateway Protocols (IGPs). An SR path can be derived from a variety of mechanisms, including an IGP Shortest Path Tree (SPT), an explicit configuration, or a Path Computation Element (PCE). This document specifies extensions to the Path Computation Element Communication Protocol (PCEP) that allow a stateful PCE to compute and initiate Traffic-Engineering (TE) paths, as well as a Path Computation Client (PCC) to request a path subject to certain constraints and optimization criteria in SR networks.</t>
              <t indent="0">This document updates RFC 8408.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8664"/>
          <seriesInfo name="DOI" value="10.17487/RFC8664"/>
        </reference>
        <reference anchor="RFC9085" target="https://www.rfc-editor.org/info/rfc9085" quoteTitle="true" derivedAnchor="RFC9085">
          <front>
            <title>Border Gateway Protocol - Link State (BGP-LS) Extensions for Segment Routing</title>
            <author fullname="S. Previdi" initials="S." surname="Previdi"/>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
            <author fullname="H. Gredler" initials="H." surname="Gredler"/>
            <author fullname="M. Chen" initials="M." surname="Chen"/>
            <date month="August" year="2021"/>
            <abstract>
              <t indent="0">Segment Routing (SR) allows for a flexible definition of end-to-end paths by encoding paths as sequences of topological subpaths, called "segments". These segments are advertised by routing protocols, e.g., by the link-state routing protocols (IS-IS, OSPFv2, and OSPFv3) within IGP topologies.</t>
              <t indent="0">This document defines extensions to the Border Gateway Protocol - Link State (BGP-LS) address family in order to carry SR information via BGP.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9085"/>
          <seriesInfo name="DOI" value="10.17487/RFC9085"/>
        </reference>
      </references>
    </references>
    <section anchor="Acknowledgements" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgements">Acknowledgements</name>
      <t indent="0" pn="section-appendix.a-1">Thanks to <contact fullname="Dhruv Dhody"/>, <contact fullname="Mike Koldychev"/>, and <contact fullname="John Scudder"/> for reviewing and providing very valuable feedback and discussions on this document.</t>
      <t indent="0" pn="section-appendix.a-2">Thanks to <contact fullname="Julien Meuric"/> for shepherding this document. </t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Andrew Stone" initials="A." surname="Stone">
        <organization showOnFrontPage="true">Nokia</organization>
        <address>
          <postal>
            <street>600 March Road</street>
            <city>Kanata</city>
            <region>Ontario</region>
            <code>K2K 2T6</code>
            <country>Canada</country>
          </postal>
          <email>andrew.stone@nokia.com</email>
        </address>
      </author>
      <author fullname="Mustapha Aissaoui" initials="M." surname="Aissaoui">
        <organization showOnFrontPage="true">Nokia</organization>
        <address>
          <postal>
            <street>600 March Road</street>
            <city>Kanata</city>
            <region>Ontario</region>
            <code>K2K 2T6</code>
            <country>Canada</country>
          </postal>
          <email>mustapha.aissaoui@nokia.com</email>
        </address>
      </author>
      <author fullname="Samuel Sidor" initials="S." surname="Sidor">
        <organization showOnFrontPage="true">Cisco Systems, Inc.</organization>
        <address>
          <postal>
            <extaddr>Eurovea Central 3</extaddr>
            <street>Pribinova 10</street>
            <city>Bratislava</city>
            <code>811 09</code>
            <country>Slovakia</country>
          </postal>
          <email>ssidor@cisco.com</email>
        </address>
      </author>
      <author fullname="Siva Sivabalan" initials="S." surname="Sivabalan">
        <organization showOnFrontPage="true">Ciena Corporation</organization>
        <address>
          <postal>
            <street>385 Terry Fox Drive</street>
            <city>Kanata</city>
            <region>Ontario</region>
            <code>K2K 0L1</code>
            <country>Canada</country>
          </postal>
          <email>ssivabal@ciena.com</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
