<?xml version='1.0' encoding='ascii'?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc compact="yes" ?>
<?rfc symrefs="yes" ?>
<?rfc sortrefs="yes" ?>
<?rfc toc="yes" ?>
<rfc category="std" docName="draft-saumthimma-evpn-ip-binding-sync-05" ipr="trust200902" obsoletes="" updates="" submissionType="IETF" xml:lang="en">
  <front>
    <title abbrev="Secure IP Binding Synchronization via BGP EVPN">Secure IP Binding Synchronization via BGP EVPN</title>
    <author fullname="Saumya Dikshit" initials="S" surname="Dikshit">
      <organization abbrev="Aruba, HPE">Aruba Networks, HPE</organization>
      <address>
        <postal>
          <street>Mahadevpura</street>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <code>560 048</code>
          <country>India</country>
        </postal>
        <email>saumya.dikshit@hpe.com</email>
      </address>
    </author>
    <author fullname="Gadekal, Thimma Reddy" initials="T R" surname="Gadekal">
     <organization abbrev="Aruba, HPE">Aruba Networks, HPE</organization>
     <address>
       <postal>
         <street>Mahadevpura</street>
         <city>Bangalore</city>
         <region>Karnataka</region>
         <code>560 048</code>
         <country>India</country>
       </postal>
       <email>tgadekal@hpe.com</email>
     </address>
    </author>
    <date day="02" month="February" year="2025"/>
    <area>General</area>
     <workgroup>BESS WG</workgroup>
    <keyword>RFC</keyword>
    <keyword>Request for Comments</keyword>
    <keyword>I-D</keyword>
    <keyword>Internet-Draft</keyword>
    <keyword>XML</keyword>
    <keyword>Extensible Markup Language</keyword>
    <abstract>
    <t>The distribution of clients of L2 domain across extended, networks leveraging overlay fabric, needs to deal with synchronizing the Client Binding Database. The 'Client IP Binding' indicates the IP, MAC and VLAN details of the clients that are learnt by security protocols. Since learning 'Client IP Binding database' is last mile solution, this information stays local to the end point switch, to which clients are connected. When networks are extended across geographies, that is, both layer2 and layer3, the 'Client IP Binding Database' in end point of switches of remote fabrics should be in sync. This literature intends to align the synchronization of 'Client IP Binding Database" through an extension to BGP control plane constructs and as BGP is a typical control plane protocol configured to communicate across network boundries.</t>
    </abstract>
  </front>
  <middle>
    <!--IMPORTANT TERMS -->
    <section anchor="imp_terms" title="Important Terms" toc="default">
     <t>BGP: Border Gateway Protocol</t>
     <t>VTEP: Virtual Tunnel End Point or Vxlan Tunnel End Point</t>
     <t>RD: Route Distinguisher</t>
     <t>RT: Route Target</t>
     <t>NLRI: Network Layer Reachability Information</t>
     <t>EVPN: Etherenet Virtual Private Network</t>
    </section>
    <!--IMPORTANT TERMS ENDS -->
    <!--INTRODUCTION BEGINS -->
    <section anchor="intro" title="Introduction" toc="default">
    <t>The distribution of clients of L2 domain across extended, networks leveraging overlay fabric, needs to deal with synchronizing the Client Binding Database. The 'Client IP Binding' indicates the IP, MAC and VLAN details of the clients that are learnt by security protocols. Since learning 'Client IP Binding database' is last mile solution, this information stays local to the end point switch, to which clients are connected. When networks are extended across geographies, that is, both layer2 and layer3, the 'Client IP Binding Database' in end point of switches of remote fabrics should be in sync. This literature intends to align the synchronization of 'Client IP Binding Database" through an extension to BGP control plane constructs and as BGP is a typical control plane protocol configured to communicate across network boundries.</t> 	     
    </section>
    <!--INTRODUCTION ENDS -->
    <!--REQUIREMENTS LANGUAGE BEGINS -->
    <section anchor="req_language" title="Requirements Language" toc="default">
    <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in <xref target="RFC2119" pageno="false" format="default"/>.</t>
    <t>When used in lowercase, these words convey their typical use in common language, and they are not to be interpreted as described in <xref target="RFC2119" pageno="false" format="default"/>.</t>
    </section>
    <!--REQUIREMENT LANGUAGE ENDS -->
    <!--PROBLEM DESCRIPTION BEGINS -->
    <section anchor="problem" title="Problem Description" toc="default">
    <t>Access Switches, build trusted database of L3 clients by snooping into DHCP/ND packets in the client VLAN. This database can be leveraged by security and analytical features. Security features help in protecting the network from unauthorized/untrusted users while analytical features/application gauge the nature of access with the telemetry information for the designated hosts. This information help keeping the network health in a secure and informed way<list style="symbols"><t>Prevent ARP cache depletion attacks</t><t>Allow traffic only from known clients on access ports</t><t>Denial of service and Man in the middle attacks</t></list></t><t>In Campus networks of Colleges, Branch office, Headquarters and DataCenter DC networks,  it is a very common deployment, for networks, to extend Layer-2 across sites and geographies over WAN, Wide Area Network, via well defined overlay fabric solution like EVPN and constructs like Vxlan, GPE, GUE, NVGRE, with Vxlan being the most deployed. The solution for Campus and DC can be combined for enterprise solutions as well.</t><t> The campus networks are extended between headquarter and branch offices where as DCs are extended for load sharing, resiliency, hierarchical availability of data across geographies and region.  In such deployments, the client database ends up being local to the first-hop access switch or gateway, the client is connected to. Client connected to the first hop access switch or gateway. The other set of access switches within or remotely placed in the extended fabric, treat the client as untruste or unauthorized on the client VLAN. This would result in switches to deny services to legitimate clients.</t><t>The following diagram shows the topology of disparate fabrics.</t>
     <figure title="Figure 2: Multifabric Overlay Topology" suppress-title="false" align="left" alt="" width="" height="">
      <artwork xml:space="preserve" name="" type="" align="left" alt="" width="" height="">

      |(--------------FABRIC1 ----------------)|(--WAN------)|(----------FABRIC3---------------)|
              +---------+                            ________+-------+  +------+          +-----+
      +----+  |        +-------+                    |        |Border3|--|VTEP31|-[Vlan20]-|host3|
      |host1|-[vlan10]-|VTEP11 |--+                 |        +-------+  +------+          +-----+
      +----+  |        +-------+  |    +-------+    |            FABRIC-3
              |                   |----|Border1|----| WAN     ===================================
              |  FABRIC-1         |    +-------+    |            FABRIC-2
      +----+  |         +------+  |                 |        +-------+  +------+          +----------+
      |host2|- [vlan20]-|VTEP12|--+                 |________|Border2|--|VTEP21|-[Vlan10]-|Wireless  |--Clients1..n
      +----+            +------+                             +-------+  +------+          |Controller|
      |(--------------FABRIC1 ----------------)|(--WAN-----)|(------------------FABRIC2----------------------------)|

      </artwork>
     </figure>
    <t>In the above mentioned topology diagram,<list style="symbols"><t> the Client IP Binding Database is local to client connected to the switches within the fabric. Without explicit solution in place, these details are not known to other switches within and outside the fabric, unless and until explicitly communicated. For example, the Access Vtep11 and Access Vtep12, though in the same fabric, can snoop in to DHCP packets originating or destined from the locally attached hosts, that is, Host1 and Host2 respectively, but not into the other Access hosts. These packets are typically unicasted to and from the DHCP server located in a centralized location. The packets are not leaked to remote fabrics as well. The DHCP packets generated from Host1 or Host2 are typically not leaked to remote fabrics, Fabric2 or Fabric3 in the above example. Hence this information about host1 and host2 cannot be snooped in by remote Access devices Vtep12 and Vtep13 in the remote fabrics.</t><t>The typical example shown in the above diagram, elaborates on the problem</t><t>There are no known standard techniques to achieve this synchronization between switches, within or across extended network, via an overlay network.</t><t> Security policies that needs knowledge about the connected clients in a VLAN across fabrics, will not work as expected in this model.</t></list></t><t>For example, to protect from neighbor cache depletion attacks, a switch can be configured to perform resolution only for the known clients in the network. This is not possible if Client IP Binding Database is not synced. NOTE, the above diagram, leverages BGP EVPN provisioned overlays over Vxlan fabric as the network extension instrument. Though the example can be generalized for any BGP provisioned overlay network like VPLS, VPWS, L3VPN etc.</t><t>One possible option is to build the client database by sniffing into data plane packets. This class of solution is ingrained with problems. </t> 
     <!--PROBLEM1 BEGINS -->
     <section anchor="problem1" title="Broadcast Over WAN" toc="default">
      <t>This solution requires learnings over broadcast packets like ND and ARP. The bridge-domain extension over fabrics, will require the broadcasts to travel over the WAN pipe, and needs to be refreshed periodically as and when there is a request for host discovery. With reference to the above diagram, Gratuitous ARP(GARP), generated by Host2, will be required to be flooded to remote fabrics (fabric 2 and 3), in a typical data plane learning. But with EVPN control plane and arp-suppression techniques, there is minimal leak of arp broadcasts in the EVPN fabric, and thus the WAN. Hosts attached to access switches may GARP frequently (too many and too often), thus aggravating the broadcast leaks over WAN.  As mentioned in the topology description, DCHP Snooping will not help here, as DHCP packets will not make it to remote fabrics. Even in DCHP Relay based deployments, the Relay configuration is local to a fabric and cannot be leaked to remote fabrics. </t>
     </section>
     <!--PROBLEM1 ENDS -->
     <!--PROBLEM2 BEGINS -->
     <section anchor="problem2" title="Same Subnet across fabrics over different Vlans" toc="default">
     <t>There is a possibility that same subnet allocation for ip address happens across disparate Vlans within or across the fabrics. Vlan 10 in fabric1 and Vlan20 in fabric 2 are mapped to same subnet gateway, lets say, 10.0.0.0/24. The IP binding database learnt via DHCP or ND snooping (hosted on access Vtep11 and Vtep13) needs to be synchronized as the broadcast domain is extended over a different VNI, lets say, 100 and 200 (mapped to vlan 10 and 20 respectively).  Thus the problem at hand is that the allocations (IP bindings) are to be synchronized for same or different subnet, but across the Vlans in disparate fabrics. This is not possible with following deployment<list style="symbols"><t>Native Vlan extension and vlan translation based fabric extensions</t><t>Static Vxlan based network extensions.</t></list></t><t>Note that, In BGP Control plane, Route Targets help go around this anomaly with dataplane learnings.</t>
      </section>
      <!--PROBLEM2 ENDS -->
      <!--PROBLEM3 BEGINS -->
      <section anchor="Problem3" title="Unwarranted and Insecure Information leak" toc="default">
      <t>With dataplane solution (via GARP or ND), the flooding over WAN to all remote fabrics will lead to unwarranted learning in fabrics over which there is no operator control. <list style="symbols"><t> Thus potentially leaking client subnet specific information to the untargeted fabrics, creating an information leak and security risk.</t><t> The source fabrics do not have control over the flooding in WAN (as its a flood in Vlan bridge domain).</t><t>Hence there is a necessity to selectively leak or restrict the synchronization between specific fabrics.</t></list></t><t> In cases where DHCP Relay is configured,<list style="symbols"><t> DHCP exchange happens between the client connected to Access Switch and the server through unicast channel. This is a predominant usecase but inherently prohibits other Access Switches snooping into the client DHCP packets.</t><t>In the reference example, the Access Switches are also overlay tunnel end points, VTEP.</t></list></t><t> For example, in above diagram, the host1 GARP is flooded over WAN to both fabric2 and fabric3, even though the intention, is to sync the information to fabric2 only.</t>
      </section>
      <!--PROBLEM3 ENDS -->
      <!--PROBLEM4 BEGINS -->
      <!--PROBLEM4 ENDS -->
    </section>
    <!--PROBLEM DESCRIPTION ENDS -->
    <section anchor="Problem4" title="Security of Fast Roaming Clients" toc="default">
     <t>If a wireless client, lets say, host1, moves in a lift or elevator across floors and hence across gateways, the security policy synchronization is a must between the Vteps sitting behind the wireless controllers. Rather than waiting for  client to speak up behind every wireless controller, the first controller and corresponding vtep can publish the security clearance or security risk of the host to all remote vteps.</t>
    </section>
    <!--SOLUTION BEGINS -->
    <section anchor="solution" title="Solution(s)" toc="default">
     <t> This document proposes a solution for synchronizing the IP Bindings between the Access Switches by leveraging the BGP EVPN control plane constructs called Route Type 2 NLRIs (EVPN NLRI, MAC Advertisement Route). The proposal defines a new extended community, which indicates the IP Binding synchronization, to be carried, in BGP Update message carrying the Route Type 2 NLRI (Network Layer Reachability Information). As EVPN is the at the core of fabric deployments to support multihoming and multitenancy, this control plane extension alleviates the Synchronization of IPs which is specific to tenants and applicable to all or selective hosts attached to the Access Vteps. The host can be attached to more than one Vtep (indicating multihoming) over a segment (called Ethernet Segment). BGP EVPN is a goto solution for Vxlan fabric extension across the WAN, as its also easy to realize the native transport (underlay) encapsulation as IP based.</t><t> For example, in the above diagram Vtep11 (also hosting the IP Binding database), publishes BGP update messages, carrying EVPN Route Type 2 for all the local MAC,IP learnings to the remote BGP peers (within or across the fabrics). These MAC,IP learnings are typically learnt via local dynamic learnings that is, host1 sends a GARP towards Vtep11 and is received on Vtep11 over the client (tenant) facing gateway interface (interface vlan 10). This interface can be a Vlan interface mapped to the subnet, for example, interface vlan 10 on Vtep11. All hosts attached over vlan 10 to Vtep11 are allocated the same subnet IP address and monitored by the IP Binding (or security validation) application hosted on Vtep11. Note that the similar validation is performed on all the access switches in a secure network. The dynamic learnings are validated against the IP Binding database (learnt via typically) as indicated in the EVPN Route Type 2. Note that the process of learning the IP Bindings (via snooping of DHCP or ARP) is outside the purview of this document.</t>
     <!--EXTENDED COMMUNITY BEGINS -->
     <section anchor="Extended_Community" title="Client IP Binding Sync Extended Communities" toc="default">
     <t>A new extended community Path attribute called Client-IP Binding Sync Extended Communities is defined. This attribute is an optional attribute and also transitive in nature and can be relayed in the control plane path.	This attribute, if carried along with BGP update message with MAC, IP bindings (with EVPN NLRI, MAC Advertisement Route), indicates the following to the receiving BGP peer <list style="symbols"><t>MAC, IP data can ALSO be leveraged for Client IP Binding synchronization.</t><t>The data is to be handed over to the Security entity or application for validating the IP allocation</t><t>The handover procedure is implementation specific and outside the purview of this invention.</t></list></t><t>The following diagram shows the  Client IP Binding Sync Extended Communities </t>
      <figure title="Figure 2 Client-IP Binding Sync Extended Communities " suppress-title="false" align="left" alt="" width="" height="">
       <artwork xml:space="preserve" name="" type="" align="left" alt="" width="" height="">

        0              1               2               3               4
        0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       | |0|    Type   |    Sub-Type   | Client IP Binding Sync ID     |                 
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
       |       Client IP Binding Sync ID (cont.)                       |
       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

        Field               |    Description
        ============================================================
        Type                | 1 Octet size, Type field can be newly defined as a proprietary one. 
                            | Its a transitive Attribute, hence 1 bit in this octet is 0.
                            | 
        Sub-Type            | 1 Octet size. The value of sub-type will be allocated as per IANA (TBD) 
                            | For experimental purposes, it can be used as any unallocated value
                            | within the free range.
                            | This field when set to appropriate value indicates to the receiver 
                            | about processing the NLRI for IP-Binding synchronization.
                            | 
        Client IP Binding   | 6 Octets size, This field carries the Identifier configured 
          Sync ID           | to categorize the IP Binding instance. 
                            | The field is applicable to all data carried in MAC IP NLRIs in the same update message. 
                            | The instance is configurable and value is implementation dependent.
        </artwork>
      </figure>
      <t>the following section gives a detailed flow of the send and receive side processing the new PDU.</t>
      <!--PROCESSING BEGINS -->
      <section anchor="Processing" title="Processing of Client IP Binding " toc="default">
       <t>The following set of bullets describe the 'Send Side Processing' flow  <list style="format (%d)"><t> the Access Vtep hosting the Client IP Binding Database can be triggered to carry the new extended communities, via a knob .</t><t> The configuration can be an explicit 'CLIENT IP BINDING SYNC ID' and carried inside the Path attribute which can be configured on Access Vteps. The guidance for configuration of this ID is that, it indicates a Group of Access Switch spread across fabrics, that intend to share the IP Binding data as they might be part of same client or group of clients. All, catering to IP allocation of same tenant or group of tenants over same or disparate vlans and subnets. The configured value is ALSO leveraged to match the received value in the Route Type 2 Update message.</t><t>The configuration scope of the 'CLIENT IP BINDING SYNC ID' can be global for all BGP updates or specific to vlans for which MAC,IP is being published in the UPDATE message. This is implementation specific and based on the 'IP BINDING SYNC IDs' scope within the 'Group of Access Switch'. If Vlan based, then 'CLIENT IP BINDING SYNC IDs' can be inherited or derived from 'Route Target' extended communities, configured on the 'Group of Access Switches' .</t><t> The Withdraw of routes, Route Type 2, MAY also carry the extended community to indicate to the BGP peers configured on Group of Access Switches to convey the INVALIDITY of the MAC,IP bindings, published earlier. </t><t> The Access Vteps (or BGP peer) on the send side MUST NOT insert the new extended communities in the withdraw message, if the corresponding IP Bindings are still valid.</t></list></t>
       <t>the following bullets describe the 'Receive Side Processing' <list style="format (%d)"><t>The same 'CLIENT IP SYNC ID' should be configured on the receiving Access Switch (BGP peer) to process or absorb the MAC, IP information within the IP Binding Context. For example, It can be a security application, which validates the IP Bindings.</t><t>If the receiving BGP peer DOES NOT SUPPORTS the 'Client IP Binding Sync' Extended Communities in the received Route Type 2,it ignores the processing of this extended community while processing other attributes.Thus, no implication on any 'Client IP Binding' application, if hosted on this BGP Peer. It MUST respond to unsupported attribute as defined in <xref target="RFC4379" pageno="false" format="default"/>.</t><t>If the receiving BGP peer SUPPORTs the Client IP Binding Sync Extended Communities in the received Route Type 2, It decodes the Extended Communities and extracts the "Client IP SYNC ID" value. It matches the value with the locally configured one. <list style="symbols"><t>If match is through, then it imports the MAC, IP NLRIs carried in the same update message to the Security application, which validates the MAC,IP against the security policies andi absorbs or drops after comparing it against the local IP Binding database.</t><t>If nomatch then it MUST NOT import the NLRIs into local IP Binding Database.</t></list></t><t>In case there are other BGP peers to whom the Update message is to be relayed, then the Client IP Binding Sync Extended Communities are also relayed without any updates in the values as its a transitive attribute. For example, Border1 receives an update message with the Client IP Binding Sync Extended Communities from Vtep11. It processes it as mentioned in above bullets and relays it to its eBGP (external BGP peers), Border2 and Border3 in remote fabrics fabric2 and fabric3 respectively as its an optional transitive attribute. Note that the above example quotes eBGP (different Autonomous System) across fabrics, but same logic will apply when Route Reflector reflects routes between two iBGP peers.</t></list></t>
      <t>The augmented control plane feature, helps all Access swtiches to be synchronized with respect to allowed or validated client credentials, thus preventing rogue traffic or DoS attacks 'originating in' or 'destined to' the local network.</t>
      </section>
      <!--PROCESSING ENDS -->
    </section>
    <!--EXTENDED COMMUNITY ENDS -->
  </section>
  <!--SOLUTION ENDS -->
  <!-- BACKWARD COMPATIBILITY BEGINS -->
   <section anchor="bkwd_compat" title="Backward Compatibility" toc="default">
    <t> Backward Compatibility for non-support nodes is as per the following standards already defined in <xref target="RFC7606" pageno="false" format="default"/>, that, BGP speaker should discard the unsupported TLV types </t>
   </section>
  <!-- BACKWARD COMPATIBILITY ENDS -->
    <!--SECURITY CONSIDERATIONS BEGIN -->
    <section anchor="sec_cons" title="Security Considerations" toc="default">
    </section>
    <!--SECURITY CONSIDERATIONS ENDS -->
    <!--IANA CONSIDERATIONS BEGIN -->
    <section anchor="iana_considerations" title="IANA Considerations" toc="default">
    </section>
    <!--IANA CONSIDERATIONS ENDS -->
    <!--ACKNOWLEDGEMENTS BEGIN -->
    <section anchor="acknowledge" title="Acknowledgements" toc="default">
    </section>
    <!--ACKNOWLEDGEMENTS ENDS -->
  </middle>
  <back>
    <references title="Normative References">
      <reference anchor="RFC2119" quote-title="true">
        <front>
          <title abbrev="RFC Key Words">Key words for use in RFCs to Indicate Requirement Levels</title>
          <author initials="S." surname="Bradner" fullname="Scott Bradner">
            <organization>Harvard University</organization>
          </author>
          <date year="1997" month="March"/>
          <area>General</area>
          <keyword>keyword</keyword>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <format type="TXT" octets="4723" target="http://www.rfc-editor.org/rfc/rfc2119.txt"/>
        <format type="HTML" octets="17970" target="http://xml.resource.org/public/rfc/html/rfc2119.html"/>
        <format type="XML" octets="5777" target="http://xml.resource.org/public/rfc/xml/rfc2119.xml"/>
      </reference>
    </references>
    <references title="Informative References">
      <reference anchor="RFC7348" quote-title="true">
        <front>
          <title>Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks</title>
          <author initials="M." surname="Mahalingam" fullname="M. Mahalingam">
            <organization/>
          </author>
          <date year="2014" month="August"/>
        </front>
        <seriesInfo name="RFC" value="7348"/>
        <format type="TXT" octets="49406" target="http://www.rfc-editor.org/rfc/rfc7348.txt"/>
      </reference>
      <reference anchor="RFC7432" quote-title="true">
        <front>
          <title>BGP MPLS-Based Ethernet VPN</title>
          <author initials="A." surname="Sajassi" fullname="A.Sajassi">
            <organization/>
          </author>
          <date year="2015" month="February"/>
        </front>
        <seriesInfo name="RFC" value="7432"/>
        <format type="TXT" octets="49406" target="http://www.rfc-editor.org/rfc/rfc7432.txt"/>
      </reference>
      <reference anchor="RFC9014" quote-title="true">
        <front>
          <title>Interconnect Solution for Ethernet VPN (EVPN) Overlay Networks</title>
          <author initials="J." surname="Rabadan" fullname="J.Rabadan">
            <organization/>
          </author>
          <date year="2021" month="May"/>
        </front>
        <seriesInfo name="RFC" value="9014"/>
        <format type="TXT" octets="49406" target="http://www.rfc-editor.org/rfc/rfc9014.txt"/>
      </reference>
      <reference anchor="RFC4379" quote-title="true">
       <front>
          <title>Detecting Multi-Protocol Label Switched (MPLS) Data Plane Failures</title>
          <author initials="K." surname="Kompella" fullname="K. Kompella">
            <organization/>
          </author>
          <date year="2006" month="February"/>
        </front>
        <seriesInfo name="RFC" value="4379"/>
        <format type="HTML" octets="49406" target="https://www.rfc-editor.org/rfc/rfc4379.html"/>
      </reference>
      <reference anchor="RFC7153" quote-title="true">
       <front>
          <title>IANA Registries for BGP Extended Communities</title>
          <author initials="E." surname="Rosen" fullname="E. Rosen">
            <organization/>
          </author>
          <date year="2014" month="March"/>
        </front>
        <seriesInfo name="RFC" value="7153"/>
        <format type="HTML" octets="49406" target="https://www.rfc-editor.org/rfc/rfc7153.html"/>
      </reference>
      <reference anchor="RFC7606" quote-title="true">
       <front>
          <title>Revised Error Handling for BGP UPDATE Messages</title>
          <author initials="E." surname="Chen" fullname="E.Chen">
            <organization/>
          </author>
          <date year="2015" month="August"/>
        </front>
        <seriesInfo name="RFC" value="7606"/>
        <format type="HTML" octets="49406" target="https://www.rfc-editor.org/rfc/rfc7606.html"/>
      </reference>
    </references>
  </back>
</rfc>
