<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc comments="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-teas-yang-te-44" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="TE YANG Data Model">A YANG Data Model for Traffic Engineering Tunnels, Label Switched Paths, and Interfaces</title>

    <author initials="T." surname="Saad" fullname="Tarek Saad">
      <organization>Cisco Systems Inc</organization>
      <address>
        <email>tsaad.net@gmail.com</email>
      </address>
    </author>
    <author initials="R." surname="Gandhi" fullname="Rakesh Gandhi">
      <organization>Cisco Systems Inc</organization>
      <address>
        <email>rgandhi@cisco.com</email>
      </address>
    </author>
    <author initials="X." surname="Liu" fullname="Xufeng Liu">
      <organization>Alef Edge</organization>
      <address>
        <email>xufeng.liu.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="V. P." surname="Beeram" fullname="Vishnu Pavan Beeram">
      <organization>Juniper Networks</organization>
      <address>
        <email>vbeeram@juniper.net</email>
      </address>
    </author>
    <author initials="I." surname="Bryskin" fullname="Igor Bryskin">
      <organization>Individual</organization>
      <address>
        <email>i_bryskin@yahoo.com</email>
      </address>
    </author>

    <date year="2026" month="March" day="26"/>

    
    <workgroup>TEAS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 56?>

<t>This document defines a YANG data model for the provisioning and management of
Traffic Engineering (TE) tunnels, Label Switched Paths (LSPs), and interfaces.
The model covers data pertinent to TE tunnels, TE LSPs, and TE interfaces that
are independent of any technology or dataplane encapsulation. The model is
divided into two YANG modules that address both device-specific
and device-independent data, supporting configuration, operational state,
Remote Procedure Calls (RPCs), and event notifications.</t>



    </abstract>



  </front>

  <middle>


<?line 66?>

<section anchor="introduction"><name>Introduction</name>

<t>This document defines a YANG data model intended for the provisioning and management
of point-to-point Traffic Engineering (TE) tunnels, Label Switched Paths (LSPs),
and interfaces. The modeling of point-to-multipoint TE Tunnels <xref target="RFC4875"/>
and Segment-Routing (SR) Policies <xref target="RFC9256"/> falls outside the scope of this
document.</t>

<t>The data model described herein is divided into two YANG modules. The 'ietf-te'
module contains generic, device-independent data, and the 'ietf-te-device'
module addresses device-specific data.</t>

<t>This document outlines the high-level relationships between the YANG modules it
defines and other external protocol YANG modules. The TE data
model intentionally excludes data specific to any signaling protocol, 
such as RSVP-TE (<xref target="RFC3209"/>, <xref target="RFC3473"/>), or Segment-Routing (<xref target="RFC8402"/>, <xref target="RFC9256"/>) with the
expectation that such technology models will be defined in separate documents
and will augment the TE model as needed.</t>

</section>
<section anchor="terms-and-conventions"><name>Terms and Conventions</name>

<section anchor="terminology"><name>Terminology</name>

<t>The following terms are defined in <xref target="RFC6241"/> and are used in this specification:</t>

<t><list style="symbols">
  <t>client</t>
  <t>configuration data</t>
  <t>state data</t>
</list></t>

<t>This document also makes use of the following terminology introduced in the
YANG Data Modeling Language <xref target="RFC7950"/>:</t>

<t><list style="symbols">
  <t>augment</t>
  <t>data model</t>
  <t>data node</t>
</list></t>

</section>
<section anchor="prefixes-in-data-node-names"><name>Prefixes in Data Node Names</name>

<t>In this document, names of data nodes and other data model objects are prefixed
using the standard prefix associated with the corresponding YANG imported
modules, as shown in <xref target="tab1"/>.</t>

<texttable title="Prefixes and corresponding YANG modules" anchor="tab1">
      <ttcol align='left'>Prefix</ttcol>
      <ttcol align='left'>YANG module</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>yang</c>
      <c>ietf-yang-types</c>
      <c><xref target="RFC9911"/></c>
      <c>inet</c>
      <c>ietf-inet-types</c>
      <c><xref target="RFC9911"/></c>
      <c>rt-types</c>
      <c>ietf-routing-types</c>
      <c><xref target="RFC8294"/></c>
      <c>te-types</c>
      <c>ietf-te-types</c>
      <c><xref target="I-D.draft-ietf-teas-rfc8776-update"/></c>
      <c>te-packet-types</c>
      <c>ietf-te-packet-types</c>
      <c><xref target="I-D.draft-ietf-teas-rfc8776-update"/></c>
      <c>te</c>
      <c>ietf-te</c>
      <c>this document</c>
      <c>te-dev</c>
      <c>ietf-te-device</c>
      <c>this document</c>
</texttable>

</section>
<section anchor="model-tree-diagrams"><name>Model Tree Diagrams</name>

<t>The YANG tree diagrams extracted from the modules defined in this document are given in
subsequent sections as per the syntax defined in <xref target="RFC8340"/>.</t>

</section>
</section>
<section anchor="design-considerations"><name>Design Considerations</name>

<t>This document describes a data model for TE tunnels, TE LSPs, and TE interfaces
that are independent of any dataplane technology. One of the design objectives is to allow specific
data plane technology models to reuse the TE data model and possibly
augment it with technology-specific data.</t>

<t>The elements of the TE data model, including TE Tunnels, LSPs, and
interfaces have leafs that identify the technology layer where they reside.
For example, the LSP encoding type can identify the technology associated with a
TE Tunnel or LSP.</t>

<t>Also, the TE data model does not cover signaling protocol data.
The signaling protocols used to instantiate TE LSPs are outside the scope of this
document and expected to be covered by augmentations defined in other documents.</t>

<t>The following other design considerations are taken into account with respect to data
organization:</t>

<t><list style="symbols">
  <t>The device independent TE data is defined in the 'ietf-te' module, and
can be used to manage data off a device, such as a TE controller. When the
model is used to manage a specific device, the model contains the TE Tunnels
originating from the specific device.  When the model is used to manage a TE
controller, the 'tunnel' list contains all TE Tunnels and TE tunnel segments
originating from devices that the TE controller manages.</t>
  <t>The device-specific TE data is defined in the 'ietf-te-device' module.</t>
  <t>The TE interfaces in the 'ietf-te-device' module are modeled as references
to existing interfaces defined in the 'ietf-interfaces' YANG module
<xref target="RFC8343"/>. This approach ensures consistency by leveraging standardized
interface definitions, allowing TE-specific parameters to be associated with
interfaces already defined elsewhere, rather than redefining interface
structures within the TE module."</t>
  <t>Minimal elements in the model are designated as "mandatory" to
allow freedom to vendors to adapt the data model to their specific product
implementation.</t>
  <t>Suitable defaults are specified for all configurable elements.</t>
  <t>Where TE functions or features might be optional within the
deployed TE network, the model declares them as optional.</t>
  <t>Some groupings defined in this document include 'default' statements,
which can be problematic for use cases involving templates or profiling.
This design does not conform to the guidelines specified in Section
4.13 of <xref target="I-D.ietf-netmod-rfc8407bis"/>. 
However, this deviation is intentional as these groupings are specifically
tailored for use within the YANG modules defined in this document 
as well as in <xref target="I-D.ietf-teas-yang-path-computation"/>.
The customization ensures appropriate behavior and consistency across these
related modules.</t>
</list></t>

</section>
<section anchor="model-overview"><name>Model Overview</name>

<t>The data model defined in this document cover the core TE features that are
commonly supported by different vendor implementations. The support of extended
or vendor specific TE features is expected to either be in augmentations, or
deviations to this model that are defined in separate documents.</t>

<section anchor="module-relationship"><name>Module Relationship</name>

<t>The TE YANG module 'ietf-te' provides
device-independent building blocks that are agnostic of specific technologies
or control plane instances. The TE device YANG module, defined in the
'ietf-te-device', augments the 'ietf-te' YANG module as illustrated in
<xref target="figctrl"/> by including device-specific data such as TE interface attributes and
local TE node timers.</t>

<t>The augmentation of the TE data model for specific instances of data plane technology and
signaling protocols are outside the scope of this document.</t>

<figure title="Relationship of TE modules with signaling protocol modules" anchor="figctrl"><artwork><![CDATA[
     TE module      +---------+
                    | ietf-te |o-------------+
                    +---------+               \
                        o  o                   \
                        |   \                   \
                        |    \ TE device module  \
                        |     +----------------+  \
                        |     | ietf-te-device |   \
                        |     +----------------+    \
                        |        o                   \
                        |        |                    \
                        |        |                     \
                    +---------------+          +---------------+
     RSVP-TE module | ietf-rsvp-te^ |o         | ietf-te-mpls^ |
                    +---------------+ \        +---------------+
                        |              \
                        |               \
                        |                \
                        |                 \
                        |                  \
                        o                +-------------------+
                    +------------+       | ietf-rsvp-otn-te^ |
     RSVP module    | ietf-rsvp^ |       +-------------------+
                    +------------+         RSVP-TE with OTN
                                              extensions

                   X---oY indicates that module X augments module Y
                   ^ indicates a module defined in other documents

]]></artwork></figure>

</section>
</section>
<section anchor="te-yang-module"><name>TE YANG Module</name>

<t>The TE YANG module 'ietf-te' supports the management and
operation of a TE network. This includes creating, modifying, and retrieving
information about TE Tunnels, LSPs, and interfaces and their associated
attributes (e.g.  Administrative-Groups (AGs), Shared Risk Link Groups (SRLGs), etc.).</t>

<t>A full tree diagram of the TE data model is shown in <xref target="AppendixB"/>.</t>

<section anchor="relationship-between-te-tunnel-lsp-and-path"><name>Relationship Between TE Tunnel, LSP, and Path</name>

<t>The TE model is built around several core constructs: TE tunnel, TE path,
and LSP. These concepts are central to the model's structure and functionality.</t>

<t>TE Tunnel:</t>

<ul empty="true"><li>
  <t>In this context, a TE tunnel represents a logical construct that
defines an engineered connectivity service between two endpoints in the
network, typically an ingress (source) and an egress (destination). A tunnel is
characterized by its attributes (such as name, encoding, and constraints) and
serves as the container for the forwarding resources used to realize the
desired connectivity.</t>
</li></ul>

<t>TE Path:</t>

<ul empty="true"><li>
  <t>A path refers to a specific sequence of nodes and links through the
network that traffic will follow to traverse the TE tunnel from source to
destination. A TE tunnel may have one or more associated TE paths, such as a primary
TE path (the preferred path) and secondary TE paths (used for protection or
restoration). Each path specifies the constraints, preferences, and
optimization criteria that guide its computation and selection.</t>
</li></ul>

<t>LSP:</t>

<ul empty="true"><li>
  <t>An LSP is an actual, instantiated connection in the
data plane that follows a computed TE path through the network. It is the result
of signaling protocols (such as RSVP-TE or Segment Routing) setting up
forwarding state along the TE path, enabling the tunnel to carry traffic.</t>
</li></ul>

<t>The relationship among these concepts is as follows:</t>

<t>A TE tunnel is the high-level logical object that defines the desired
connectivity and its properties.  Each TE tunnel can have one or more TE paths,
which define candidate or active routes through the network that may be used to
realize the tunnel's connectivity, subject to certain constraints and
preferences.  For each TE path selected for use, one or more LSPs are instantiated
in the network to realize the forwarding state necessary to carry traffic along
the specified TE path.</t>

<t>In summary, a TE tunnel defines the service, a TE path defines how to achieve the
service, and an LSP is the instantiated mechanism that actually provides the
service in the forwarding plane.</t>

</section>
<section anchor="module-structure"><name>Module Structure</name>

<t>The 'te' container is the top level container in the 'ietf-te' module. The
presence of the 'te' container enables TE function system-wide.  Further
descriptions of containers that exist under the 'te' top level container are
provided in the following sections.</t>

<t>The three containers grouped under the 'te'
container are shown in <xref target="fig-highlevel"/> and described below.</t>

<t>globals:</t>

<ul empty="true"><li>
  <t>The 'globals' container maintains the set of global TE attributes that can be
applicable to TE Tunnels and interfaces. Refer to <xref target="TeGlobals"/> for further details.</t>
</li></ul>

<t>tunnels:</t>

<ul empty="true"><li>
  <t>The 'tunnels' container includes the list of TE Tunnels that are instantiated.
Refer to <xref target="TE_TUNNELS"/> for further details on the properties of a TE Tunnel.</t>
</li></ul>

<t>lsps:</t>

<ul empty="true"><li>
  <t>The 'lsps' container includes the list of TE LSPs that are instantiated for
TE Tunnels. Refer to <xref target="TE_LSPS"/> for further details on the properties of a TE LSP.</t>
</li></ul>

<t>The model also contains two Remote Procedure Calls (RPCs) as shown
in <xref target="AppendixB"/> and described below.</t>

<t>tunnels-path-compute:</t>

<ul empty="true"><li>
  <t>An RPC to request path computation for a specific TE Tunnel.
The RPC allows requesting path computation using atomic and stateless operation.
A tunnel may also be configured in 'compute-only' mode to provide stateful path updates
- see <xref target="TE_TUNNELS"/> for further details.</t>
</li></ul>

<t>tunnels-action:</t>

<ul empty="true"><li>
  <t>An RPC to request a specific action (e.g. reoptimize, or tear-and-setup) to be taken
on a specific tunnel or all tunnels.</t>
</li></ul>

<figure title="TE Tunnel high-level YANG tree view" anchor="fig-highlevel"><artwork><![CDATA[
module: ietf-te
  +--rw te!
     +--rw globals
     |     ...
     +--rw tunnels
     |     ...
     +--ro lsps
           ...

  rpcs:
    +---x tunnels-path-compute
    |  +---w input
    |  |     ...
    |  +--ro output
    |        ...
    +---x tunnels-actions
       +---w input
       |     ...
       +--ro output
             ...

]]></artwork></figure>

<section anchor="TeGlobals"><name>TE Globals</name>

<t>The 'globals' container covers properties that control a TE feature's
behavior system-wide, and its respective state as shown in <xref target="fig-globals"/>
and described in the text that follows.</t>

<figure title="TE globals YANG subtree high-level structure" anchor="fig-globals"><artwork><![CDATA[
     +--rw globals
     |  +--rw named-admin-groups
     |  |  +--rw named-admin-group* [name]
     |  |        ...
     |  +--rw named-srlgs
     |  |  +--rw named-srlg* [name]
     |  |        ...
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
]]></artwork></figure>

<t>named-admin-groups:</t>

<ul empty="true"><li>
  <t>A YANG container for the list of named (extended) administrative groups that may be applied
to TE links.</t>
</li></ul>

<t>named-srlgs:</t>

<ul empty="true"><li>
  <t>A YANG container for the list of named SRLGs that may be
applied to TE links.</t>
</li></ul>

<t>named-path-constraints:</t>

<ul empty="true"><li>
  <t>A YANG container for a list of named path constraints. Each named path constraint is
composed of a set of constraints that can be applied during path computation.
A named path constraint can be applied to multiple TE Tunnels. Path constraints may also
be specified directly under the TE Tunnel. The path constraints specified under
the TE Tunnel take precedence over the path constraints 
derived from the referenced named path constraint. A named path constraint entry can be
formed of the path constraints shown in <xref target="fig-named-constraints"/>:</t>
</li></ul>

<figure title="Named path constraints YANG subtree" anchor="fig-named-constraints"><artwork><![CDATA[
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
     |             {te-types:named-path-constraints}?
     |        +--rw name                             string
     |        +--rw te-bandwidth
     |        |     ...
     |        +--rw link-protection?                 identityref
     |        +--rw setup-priority?                  uint8
     |        +--rw hold-priority?                   uint8
     |        +--rw signaling-type?                  identityref
     |        +--rw path-metric-bounds
     |        |     ...
     |        +--rw path-affinities-values
     |        |     ...
     |        +--rw path-affinity-names
     |        |     ...
     |        +--rw path-srlgs-lists
     |        |     ...
     |        +--rw path-srlgs-names
     |        |     ...
     |        +--rw disjointness?
     |        |       te-path-disjointness
     |        +--rw explicit-route-objects
     |        |     ...
     |        +--rw path-in-segment!
     |        |     ...
     |        +--rw path-out-segment!
     |              ...

]]></artwork></figure>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>name: A YANG leaf that holds the named path constraint entry. This is unique in the list and used as a key.</t>
    <t>te-bandwidth: A YANG container that holds the technology-agnostic TE bandwidth constraint.</t>
    <t>link-protection: A YANG leaf that holds the link protection type constraint required for the links to be included in the computed path.</t>
    <t>setup/hold priority: YANG leafs that hold the LSP setup and hold admission priority as defined in <xref target="RFC3209"/>.</t>
    <t>signaling-type: A YANG leaf that holds the LSP setup type, such as RSVP-TE or SR.</t>
    <t>path-metric-bounds: A YANG container that holds the set of metric bounds applicable on the
computed TE tunnel path.</t>
    <t>path-affinities-values: A YANG container that holds the set of affinity values and
mask to be used during path computation.</t>
    <t>path-affinity-names: A YANG container that holds the set of named affinity constraints and
corresponding inclusion or exclusion instructions for each to be used during path computation.</t>
    <t>path-srlgs-lists: A YANG container that holds the set of SRLG values and
corresponding inclusion or exclusion instructions to be used during path computation.</t>
    <t>path-srlgs-names: A YANG container that holds the set of named SRLG constraints and
corresponding inclusion or exclusion instructions for each to be used during path computation.</t>
    <t>disjointness: The level of resource disjointness constraint that the secondary path
of a TE tunnel has to adhere to.</t>
    <t>explicit-route-objects: A YANG container that holds path constraints in the form of route entries present in the following two lists:
    <list style="symbols">
        <t>'route-object-exclude-always': a list of route entries that are always excluded from the path computation. The exclusion of a route entry in this list during path computation is not order sensitive. The route entries in this list have a 'strict' hop-type as described in <xref target="RFC4874"/> section 3.1.</t>
        <t>'route-object-include-exclude': a list of route entries to include or exclude for the path computation. For route entries in this list that are to be excluded, the hop-type is only allowed to be 'strict' as described in <xref target="RFC4874"/> section 3.1.<br />
The constraint type (include or exclude) is specified with each route entry. The path computation considers route entry constraints in the order they appear in this list. Once a route entry constraint is consumed from this list, it is not considered any further in the computation of the TE path.<br />
The 'route-object-include-exclude' is used to configure constraints on which route objects (e.g., nodes, links) are included or excluded in the path computation.<br />
The interpretation of an empty 'route-object-include-exclude' list depends on the TE Tunnel (end-to-end or Tunnel Segment) and on the specific path, according to the following rules:<br />
        <list style="numbers" type="1">
            <t>An empty 'route-object-include-exclude' list for the primary path of an end-to-end TE Tunnel indicates that there are no route objects to be included or excluded in the path computation.</t>
            <t>An empty 'route-object-include-exclude' list for the primary path of a TE Tunnel Segment indicates that no primary LSP is required for that TE Tunnel Segment.</t>
            <t>An empty 'route-object-include-exclude' list for a reverse path means it always follows the forward path (i.e., the TE Tunnel is co-routed). When the 'route-object-include-exclude' list is not empty, the reverse path is routed independently of the forward path.</t>
            <t>An empty 'route-object-include-exclude' list for the secondary (forward) path of a TE Tunnel segment indicates that the secondary path has the same endpoints as the primary path.</t>
          </list></t>
      </list></t>
    <t>path-in-segment: A YANG container that contains a list of label restrictions
that have to be taken into consideration when stitching to another tunnel
segment such as at a domain boundary.  The TE tunnel segment in this case
is being stitched to the upstream TE tunnel segment.</t>
    <t>path-out-segment: A YANG container that contains a list of label restrictions
that have to be taken into consideration when stitching to another tunnel
segment such as at a domain boundary.  The TE tunnel segment in this case
is being stitched to the downstream TE tunnel segment.</t>
  </list></t>
</li></ul>

</section>
<section anchor="TE_TUNNELS"><name>TE Tunnels</name>

<t>The 'tunnels' container holds the list of TE Tunnels that are provisioned on
ingress router devices in the network as shown in <xref target="fig-te-tunnel"/>.</t>

<figure title="TE Tunnel YANG subtree structure" anchor="fig-te-tunnel"><artwork><![CDATA[
module: ietf-te
  +--rw te
     +--rw tunnels
        +--rw tunnel* [name]
           +--rw name                            string
           +--rw alias?                          string
           +--rw identifier?                     uint32
           +--rw color?                          uint32
           +--rw description?                    string
           +--rw admin-state?                    identityref
           +--ro operational-state?              identityref
           +--rw encoding?                       identityref
           +--rw switching-type?                 identityref
           +--rw source
           |     ...
           +--rw destination
           |     ...
           +--rw bidirectional?                  boolean
           +--rw controller
           |     ...
           +--rw reoptimize-timer?               uint16
           +--rw association-objects
           |     ...
           +--rw protection
           |     ...
           +--rw restoration
           |     ...
           +--rw network-id?                     nw:network-id
           +--rw te-topology-identifier
           |     ...
           +--rw te-bandwidth
           |     ...
           +--rw link-protection?                identityref
           +--rw setup-priority?                 uint8
           +--rw hold-priority?                  uint8
           +--rw signaling-type?                 identityref
           +--rw hierarchy
           |     ...
           +--rw primary-paths
           |     ...
           +--rw secondary-paths
           |     ...
           +--rw secondary-reverse-paths
           |     ...
           +---x tunnel-action
           |     ...
           +---x protection-external-commands
                 ...

]]></artwork></figure>

<t>When the TE model is used to manage a specific device, the 'tunnel' list contains
the TE Tunnels originating from the specific device. When the model is used to
manage a TE controller, the 'tunnel' list contains all TE Tunnels and TE
tunnel segments originating from devices that the TE controller manages.</t>

<t>The TE Tunnel model allows the configuration and management of the following TE
tunnel objects:</t>

<t>TE Tunnel:</t>

<ul empty="true"><li>
  <t>A YANG container of one or more TE LSPs established between the source and destination
TE Tunnel termination points.</t>
</li></ul>

<t>TE Path:</t>

<ul empty="true"><li>
  <t>An engineered path that once instantiated in the forwarding plane can be used
to forward traffic from the source to the destination TE Tunnel termination points.</t>
</li></ul>

<t>TE LSP:</t>

<ul empty="true"><li>
  <t>A TE LSP is a connection-oriented service established over a TE Path
and that allows the delivery of traffic between the TE Tunnel source and
destination termination points.</t>
</li></ul>

<t>TE Tunnel Segment:</t>

<ul empty="true"><li>
  <t>A segment of a TE Tunnel that is stitched with other segments in order to provision an end-to-end tunnel.</t>
</li></ul>

<t>The TE Tunnel has a number of attributes that are set directly under the
tunnel (as shown in <xref target="fig-te-tunnel"/>). The main attributes of a TE Tunnel are described below:</t>

<t>name:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the name of a TE Tunnel.  The name of the
TE Tunnel uniquely identifies the tunnel within the TE tunnel list.  The name
of the TE Tunnel can be formatted as a Uniform Resource Indicator (URI) by
including the namespace to ensure uniqueness of the name among all the TE
Tunnels present on devices and controllers. The configured TE Tunnels can
be reported with the name of the device embedded within the TE Tunnel name.
For TE Tunnels initiated by the controller, the controller is responsible
to ensure that TE Tunnel names are unique.</t>
</li></ul>

<t>alias:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds a user-friendly alternate name to the TE tunnel,
which is typically, but not necessarily, unique. Unlike the TE tunnel
name, the alias can be modified at any time during the lifetime of the TE tunnel.</t>
</li></ul>

<t>identifier:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds an identifier of the tunnel. This identifier is unique among tunnels
originated from the same ingress device.</t>
</li></ul>

<t>color:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the color associated with the TE tunnel. The color is used
to map or steer services that carry matching color onto the TE tunnel as described in
<xref target="RFC9012"/>.</t>
</li></ul>

<t>admin-state:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the tunnel administrative state.</t>
</li></ul>

<t>operational-state:</t>

<ul empty="true"><li>
  <t>A YANG leaf that holds the tunnel operational state.</t>
</li></ul>

<t>encoding/switching:</t>

<ul empty="true"><li>
  <t>The 'encoding' and 'switching-type' are YANG leafs that define the specific
technology in which the tunnel operates in as described in <xref target="RFC3945"/>.</t>
</li></ul>

<t>source/destination:</t>

<ul empty="true"><li>
  <t>YANG containers that hold the tunnel source and destination node endpoint identities, including:</t>
</li></ul>

<ul empty="true"><li>
  <t><list style="symbols">
    <t>te-node-id:  A YANG leaf that holds the TE node identifier (as defined in <xref target="I-D.draft-ietf-teas-rfc8776-update"/>) of the source
 or destination of the TE Tunnel.</t>
    <t>node-id: A YANG leaf that holds the node identifier (as defined in <xref target="RFC8345"/>) of the source or
 destination of the TE Tunnel.</t>
    <t>tunnel-tp-id: A YANG leaf that holds the identifier of the source or destination of the TE Tunnel
Termination Points (TTPs) as defined in <xref target="RFC8795"/>. The TTP identifiers are optional
on nodes that have a single TTP per node. For example, TTP identifiers are optional for packet
(IP/MPLS) routers.</t>
  </list></t>
</li></ul>

<t>bidirectional:</t>

<ul empty="true"><li>
  <t>A YANG leaf that when present indicates the LSP of a TE Tunnel is bidirectional
as defined in <xref target="rfc3473"/>.</t>
</li></ul>

<t>controller:</t>

<ul empty="true"><li>
  <t>A YANG container that holds tunnel data relevant to an optional external TE controller that
may initiate or control a tunnel. This target node may be augmented by external modules, for example, to add data for Path Computation Element Protocol (PCEP) initiated and/or
delegated tunnels.</t>
</li></ul>

<t>reoptimize-timer:</t>

<ul empty="true"><li>
  <t>A YANG leaf to set the interval period for tunnel reoptimization.</t>
</li></ul>

<t>association-objects:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the set of associations of the TE Tunnel to other
TE Tunnels. Associations at the TE Tunnel level apply to all paths of the TE
Tunnel. The TE tunnel associations can be overridden by associations
configured directly under the TE Tunnel path.</t>
</li></ul>

<t>protection:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the TE Tunnel protection properties.</t>
</li></ul>

<t>restoration:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the TE Tunnel restoration properties.</t>
</li></ul>

<t>te-topology-identifier:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the topology identifier associated with the topology where paths for the TE tunnel are computed as defined in <xref target="RFC8795"/>.</t>
</li></ul>

<t>network-id:</t>

<ul empty="true"><li>
  <t>A YANG leaf that can optionally be used to identify the network topology where paths for the TE tunnel are computed as defined in <xref target="RFC8345"/>.</t>
</li></ul>

<t>hierarchy:</t>

<ul empty="true"><li>
  <t>A YANG container that holds hierarchy related properties of the TE Tunnel. A TE LSP
  can be set up in MPLS or Generalized MPLS (GMPLS) networks to be used as
  a TE link to carry traffic in other (client) networks <xref target="RFC6107"/>.  In this
  case, the model introduces the TE Tunnel hierarchical link endpoint parameters
  to identify the specific link in the client layer that the underlying TE Tunnel is
  associated with. The hierarchy container includes the following:</t>
</li></ul>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>dependency-tunnels: A hierarchical set of TE Tunnels either provisioned or
to be provisioned in the immediate lower layer, upon which the
current TE Tunnel relies for multi-layer path computation. A dependency TE
Tunnel is provisioned if it has been selected by path computation to support
at least one client-layer TE Tunnel. When a dependency TE Tunnel is
provisioned, it makes the TE link operational in the client layer's network
topology, enabling the provisioning of TE Tunnels in the client layer.</t>
  </list></t>
</li></ul>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>hierarchical-link: A YANG container that holds the identity of the
hierarchical link (in the client layer) that is supported by this TE Tunnel.
The endpoints of the hierarchical link are defined by TE tunnel source and
destination node endpoints. The hierarchical link can be identified by its source
and destination link termination point identifiers.</t>
  </list></t>
</li></ul>

<t>primary-paths:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the list of primary paths.
A primary path is identified by 'name'. A primary path is selected from the list
to instantiate a primary forwarding LSP for the tunnel.  The list of primary
paths is visited by order of preference. A primary path has the following
attributes:</t>
</li></ul>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>primary-reverse-path: A YANG container that holds properties of the
primary reverse path. The reverse path is applicable to
bidirectional TE Tunnels.</t>
  </list></t>
</li></ul>

<ul empty="true"><li>

  <t><list style="symbols">
    <t>candidate-secondary-paths: A YANG container that holds a list of candidate
secondary paths which may be used for the primary path to support path
protection. The candidate secondary paths reference paths from the
tunnel secondary paths list.  The preference of the secondary paths is
specified within the list and dictates the order of visiting the secondary
path from the list. The attributes of a secondary path can be defined
separately from the primary path. The attributes of a secondary path will be
inherited from the associated 'active' primary when not explicitly defined
for the secondary path.</t>
  </list></t>
</li></ul>

<ul empty="true"><li>

</li></ul>

<t>secondary-paths:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the set of secondary paths. A secondary path is
 identified by 'name'. A secondary path can be referenced from the TE Tunnel's
'candidate-secondary-path' list.</t>
</li></ul>

<t>secondary-reverse-paths:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the set of secondary reverse paths. A secondary reverse
path is identified by 'name'. A secondary reverse path can be referenced from the
TE Tunnel's 'candidate-secondary-reverse-paths' list. A secondary reverse path is modeled with
the same data attributes as those of the primary path.</t>
</li></ul>

<t>The following set of common path attributes are shared for primary (forward and reverse) and secondary paths:</t>

<t>path-computation-method:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the method used for computing the TE path.</t>
</li></ul>

<t>path-computation-server:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the path computation server properties when the path is
 externally queried.</t>
</li></ul>

<t>compute-only:</t>

<ul empty="true"><li>
  <t>A path of a TE Tunnel is, by default, provisioned so that it can be instantiated
  in the forwarding plane so that it can carry traffic.
  In some cases, a TE path may be configured only for the
  purpose of computing a path and reporting it without the need to instantiate
  the LSP or commit any resources. In such a case, the path is configured in
  'compute-only' mode to distinguish it from the default behavior. A
  'compute-only' path is configured as usual with the associated per-path
  constraints and properties on a device or TE controller. The device or TE
  controller computes the feasible paths subject to configured constraints.
  A client may query the 'compute-only' computed path properties 'on-demand',
  or alternatively, can subscribe to be notified of computed paths and
  whenever the path properties change.</t>
</li></ul>

<t>use-path-computation:</t>

<ul empty="true"><li>
  <t>A YANG leaf that indicates whether or not path computation is to
  be used for a specified path.</t>
</li></ul>

<t>lockdown:</t>

<ul empty="true"><li>
  <t>A YANG leaf that when set indicates the existing path should not
be globally repaired or reoptimized.</t>
</li></ul>

<t>path-scope:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies whether the path is a segment or an end-to-end path.</t>
</li></ul>

<t>preference:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the preference for the path, used to
choose between paths in a list.  The lower the number, the higher the
preference. Paths with the same preference are treated as equal
and other methods are used to choose between them.</t>
</li></ul>

<t>k-requested-paths:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the number of k-shortest paths requested from the path
  computation server, which are returned in order based on their computed optimization
  objective costs.</t>
</li></ul>

<t>association-objects:</t>

<ul empty="true"><li>
  <t>A YANG container that holds a list of tunnel association properties.</t>
</li></ul>

<t>optimizations:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the optimization objectives
  that path computation will use to select a path.</t>
</li></ul>

<t>named-path-constraint:</t>

<ul empty="true"><li>
  <t>A YANG leafref that references an entry from the global list of named path constraints.</t>
</li></ul>

<t>te-bandwidth:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the path bandwidth (see <xref target="I-D.draft-ietf-teas-rfc8776-update"/>).</t>
</li></ul>

<t>link-protection:</t>

<ul empty="true"><li>
  <t>A YANG leaf that specifies the link protection type required for the links to
be included in the computed path (see <xref target="I-D.draft-ietf-teas-rfc8776-update"/>).</t>
</li></ul>

<t>setup/hold-priority:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>signaling-type:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. This value overrides
the provided one in the referenced named-path-constraint.</t>
</li></ul>

<t>path-metric-bounds:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-affinities-values:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-affinity-names:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-srlgs-lists:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-srlgs-names:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>disjointness:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>explicit-route-objects:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-in-segment:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>path-out-segment:</t>

<ul empty="true"><li>
  <t>see description provided in <xref target="TeGlobals"/>. These values override
those provided in the referenced named-path-constraint.</t>
</li></ul>

<t>computed-paths-properties:</t>

<ul empty="true"><li>
  <t>A YANG container that holds properties for the list of computed paths.</t>
</li></ul>

<t>computed-path-error-infos:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the list of path computation error information. The
TE system populates entries in this list whenever an error is encountered during the computation of the TE path.</t>
</li></ul>

<t>path-compute-info:</t>

<ul empty="true"><li>
  <t>A YANG grouping that contains leafs representing the path attributes that are passed to the TE path computation engine
to be considered during the path computation. This includes:</t>

  <t><list style="symbols">
    <t>path constraints,</t>
    <t>path optimization objectives, and</t>
    <t>path associations</t>
  </list></t>

  <t>Note, unless overridden under a specific path of the TE tunnel, the TE tunnel's primary path constraints, optimization objectives, and associations are inherited by the primary reverse path, secondary path and secondary reverse path.</t>
</li></ul>

<t>lsps:</t>

<ul empty="true"><li>
  <t>A YANG container that holds a list of LSPs that have been instantiated for this specific path.</t>
</li></ul>

<t>In addition to the path common attributes, the primary path has the following
attributes that are not present in the secondary path:</t>

<t><list style="symbols">
  <t>Only the primary path contains the list of 'candidate-secondary-paths' that
can protect the primary path.</t>
  <t>Only the primary path can contain a primary-reverse-path associated with the
primary path (and its associated list of
'candidate-secondary-reverse-path').</t>
</list></t>

<t>lsp-provisioning-error-infos:</t>

<ul empty="true"><li>
  <t>A YANG container that holds the list of LSP provisioning error information. The
TE system populates entries in this list whenever an error is encountered during the LSP provisioning.</t>
</li></ul>

</section>
<section anchor="TE_LSPS"><name>TE LSPs</name>

<t>The 'lsps' container includes the set of TE LSPs that have been instantiated.
A TE LSP is identified by a 3-tuple ('tunnel-name', 'lsp-id', 'node').</t>

<t>When the model is used to manage a specific device, the 'lsps' list contains all TE
LSPs that traverse the device (including ingressing, transiting and egressing the device).</t>

<t>When the model is used to manage a TE controller, the 'lsps' list
contains the TE LSPs on devices managed by the controller that act as ingress, and may optionally include
TE LSPs on devices managed by the controller that act as transit or egress role.</t>

</section>
</section>
<section anchor="tree-diagram"><name>Tree Diagram</name>

<t><xref target="fig-te-tree"/> shows the YANG tree diagram of depth=4 for the TE YANG module
'ietf-te'. The full tree diagram is shown in <xref target="AppendixB"/>.</t>

<figure title="Tree diagram of depth-4 of TE Tunnels" anchor="fig-te-tree"><artwork><![CDATA[
module: ietf-te
  +--rw te
     +--rw enable?    boolean
     +--rw globals
     |  +--rw named-admin-groups
     |  |  +--rw named-admin-group* [name]
     |  |          {te-types:extended-admin-groups,
     |  |           te-types:named-extended-admin-groups}?
     |  |        ...
     |  +--rw named-srlgs
     |  |  +--rw named-srlg* [name] {te-types:named-srlg-groups}?
     |  |        ...
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
     |             {te-types:named-path-constraints}?
     |           ...
     +--rw tunnels
     |  +--rw tunnel* [name]
     |     +--rw name                            string
     |     +--rw alias?                          string
     |     +--rw identifier?                     uint32
     |     +--rw color?                          uint32
     |     +--rw description?                    string
     |     +--rw admin-state?                    identityref
     |     +--ro operational-state?              identityref
     |     +--rw encoding?                       identityref
     |     +--rw switching-type?                 identityref
     |     +--rw source
     |     |     ...
     |     +--rw destination
     |     |     ...
     |     +--rw bidirectional?                  boolean
     |     +--rw controller
     |     |     ...
     |     +--rw reoptimize-timer?               uint16
     |     +--rw association-objects
     |     |     ...
     |     +--rw protection
     |     |     ...
     |     +--rw restoration
     |     |     ...
     |     +--rw network-id?                     nw:network-id
     |     +--rw te-topology-identifier
     |     |     ...
     |     +--rw te-bandwidth
     |     |     ...
     |     +--rw link-protection?                identityref
     |     +--rw setup-priority?                 uint8
     |     +--rw hold-priority?                  uint8
     |     +--rw signaling-type?                 identityref
     |     +--rw hierarchy
     |     |     ...
     |     +--rw primary-paths
     |     |     ...
     |     +--rw secondary-paths
     |     |     ...
     |     +--rw secondary-reverse-paths
     |     |     ...
     |     +---x tunnel-action
     |     |     ...
     |     +---x protection-external-commands
     |           ...
     +--ro lsps
        +--ro lsp* [tunnel-name lsp-id node]
           +--ro tunnel-name                         string
           +--ro lsp-id                              uint16
           +--ro node
           |       te-types:te-node-id
           +--ro source?
           |       te-types:te-node-id
           +--ro destination?
           |       te-types:te-node-id
           +--ro tunnel-id?                          uint16
           +--ro extended-tunnel-id?
           |       yang:dotted-quad
           +--ro operational-state?                  identityref
           +--ro signaling-type?                     identityref
           +--ro origin-type?                        enumeration
           +--ro lsp-resource-status?                enumeration
           +--ro lockout-of-normal?                  boolean
           +--ro freeze?                             boolean
           +--ro lsp-protection-role?                enumeration
           +--ro lsp-protection-state?               identityref
           +--ro ingress-node-id?
           |       te-types:te-node-id
           +--ro egress-node-id?
           |       te-types:te-node-id
           +--ro lsp-actual-route-information
                 ...

  rpcs:
    +---x tunnels-path-compute
    |  +---w input
    |  |  +---w path-compute-info
    |  +--ro output
    |     +--ro path-compute-result
    +---x tunnels-actions
       +---w input
       |  +---w tunnel-info
       |  |  +---w (filter-type)
       |  |        ...
       |  +---w action-info
       |     +---w action?       identityref
       |     +---w disruptive?   empty
       +--ro output
          +--ro action-result?   identityref

]]></artwork></figure>

</section>
<section anchor="yang-module"><name>YANG Module</name>

<t>The TE YANG module 'ietf-te' imports the following modules:</t>

<t><list style="symbols">
  <t>ietf-te-types defined in <xref target="I-D.draft-ietf-teas-rfc8776-update"/></t>
  <t>ietf-yang-types and ietf-inet-types defined in <xref target="RFC9911"/></t>
  <t>ietf-network and ietf-network-topology defined in <xref target="RFC8345"/></t>
</list></t>

<t>This module references the following documents:
<xref target="RFC4206"/>, <xref target="RFC4427"/>,
<xref target="RFC4872"/>, <xref target="RFC3209"/>, <xref target="RFC6780"/>,
<xref target="RFC7471"/>, <xref target="RFC9012"/>, <xref target="RFC8570"/>,
<xref target="RFC8232"/>, <xref target="RFC7271"/>, <xref target="RFC8234"/>, <xref target="RFC4655"/>, <xref target="RFC8231"/>, <xref target="RFC7308"/>, <xref target="RFC8345"/>, <xref target="RFC9256"/>, and <xref target="ITU_G.808.1"/>.</t>

<figure><artwork><![CDATA[
<CODE BEGINS> file "ietf-te@2026-03-26.yang"
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-te";

  prefix te;

  /* Import TE generic types */

  import ietf-te-types {
    prefix te-types;
    reference
      "draft-ietf-teas-rfc8776-update: Common YANG Data Types
       for Traffic Engineering.";
  }
  import ietf-yang-types {
    prefix yang;
    reference
      "RFC 9911: Common YANG Data Types.";
  }

  import ietf-network {
    prefix "nw";
    reference "RFC 8345: A YANG Data Model for Network Topologies";
  }

  import ietf-network-topology {
    prefix "nt";
    reference "RFC 8345: A YANG Data Model for Network Topologies";
  }

  organization
    "IETF Traffic Engineering Architecture and Signaling (TEAS)
     Working Group.";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/teas/>
     WG List:  <mailto:teas@ietf.org>

     Editor:   Tarek Saad
               <mailto:tsaad.net@gmail.com>

     Editor:   Rakesh Gandhi
               <mailto:rgandhi@cisco.com>

     Editor:   Vishnu Pavan Beeram
               <mailto:vbeeram@juniper.net>

     Editor:   Xufeng Liu
               <mailto: xufeng.liu.ietf@gmail.com>

     Editor:   Igor Bryskin
               <mailto:i_bryskin@yahoo.com>";

  description
    "YANG data module for TE configuration, state, and RPCs.

     Copyright (c) 2025 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     All revisions of IETF and IANA published modules can be found at
     the "YANG Parameters" registry group:
     https://www.iana.org/assignments/yang-parameters.

     This version of this YANG module is part of RFC XXXX; see
     the RFC itself for full legal notices.";

  // RFC Ed.: replace XXXX with actual RFC number and remove this
  // note.
  // RFC Ed.: update the date below with the date of RFC publication
  // and remove this note.

  revision 2026-03-26 {
    description
      "Initial revision for the TE generic YANG module.";
    reference
      "RFCXXXX: A YANG Data Model for Traffic Engineering Tunnels,
       Label Switched Paths, and Interfaces.";
  }

  typedef tunnel-ref {
    type leafref {
      path "/te:te/te:tunnels/te:tunnel/te:name";
      require-instance false;
    }
    description
      "This type is used by data models that need to reference
       a configured TE tunnel.";
  }

  /**
   * TE tunnel generic groupings
   */

  grouping path-common-properties {
    description
      "Common path attributes.";
    leaf name {
      type string;
      description
        "TE path name.";
    }
    leaf symbolic-name {
      type string;
      description
        "The symbolic path name is a human-readable string that
         identifies an LSP in the network.  The symbolic path name
         must remain constant throughout an LSP's lifetime.";
      reference
        "RFC 8231: Path Computation Element Communication Protocol 
                   (PCEP) Extensions for Stateful PCE,
                   Section 7.3.2";
    }
    leaf path-computation-method {
      type identityref {
        base te-types:path-computation-method;
      }
      default "te-types:path-locally-computed";
      description
        "The method used for computing the path, either
         locally computed, queried from a server or not
         computed at all (explicitly configured).";
    }
    container path-computation-server {
      when "derived-from-or-self(../path-computation-method, "
         + "'te-types:path-externally-queried')" {
        description
        "The IP address or the TE identifier of the external
         path computation server.";
      }
      uses te-types:te-generic-node-id;
      description
        "Address of the external path computation
         server.";
    }
    leaf compute-only {
      when "../use-path-computation = 'true'" {
        description
          "Applicable when path computation is requested.";
      }
      type empty;
      description
        "When present, the path is computed, but no resources
         are committed or reserved in the network. The path may
         be recomputed upon topology changes.";
    }
    leaf use-path-computation {
      when "derived-from-or-self(../path-computation-method, "
         + "'te-types:path-locally-computed')";
      type boolean;
      default "true";
      description
        "When 'true' indicates the path is dynamically computed
         and/or validated against the Traffic-Engineering Database
         (TED), and when 'false' indicates no path expansion or
         validation against the TED is required.";
    }
    leaf lockdown {
      type empty;
      description
        "When present, indicates the existing path should not be
         globally repaired or reoptimized.";
    }
    leaf path-scope {
      type identityref {
        base te-types:path-scope-type;
      }
      default "te-types:path-scope-end-to-end";
      config false;
      description
        "Indicates whether the path is a segment or portion of
         the full path, or is an end-to-end path for
         the TE Tunnel.";
    }
  }

  grouping path-compute-info {
    description
      "Attributes used for path computation request.";
    uses tunnel-associations-properties;
    uses te-types:generic-path-optimization;
    leaf named-path-constraint {
      if-feature "te-types:named-path-constraints";
      type leafref {
        path "/te:te/te:globals/te:named-path-constraints/"
           + "te:named-path-constraint/te:name";
      }
      description
        "Reference to a globally defined named path constraint set.";
    }
    uses path-constraints-common;
  }

  grouping path-forward-properties {
    description
      "The path preference.";
    leaf preference {
      type uint8 {
        range "1..255";
      }
      default "1";
      description
        "Specifies a preference for this path. The lower the number
         higher the preference.";
    }
    leaf co-routed {
      when "/te:te/te:tunnels/te:tunnel/te:bidirectional = 'true'" {
        description
          "Applicable to bidirectional tunnels only.";
      }
      type boolean;
      default "false";
      description
        "When set to true, indicates whether the reverse path must
         be co-routed with the primary.";
    }
  }

  grouping k-requested-paths {
    description
      "The k-shortest paths requests.";
    leaf k-requested-paths {
      type uint8;
      default "1";
      description
        "The number of k-shortest paths requested from the path
         computation server, which are returned in order based on
         their computed optimization objective costs.";
    }
  }

  grouping path-state {
    description
      "TE per path state parameters.";
    uses path-computation-response;
    container lsp-provisioning-error-infos {
      config false;
      description
        "LSP provisioning error information.";
      list lsp-provisioning-error-info {
        description
          "List of LSP provisioning error info entries.";
        leaf error-reason {
          type identityref {
            base te-types:lsp-provisioning-error-reason;
          }
          description
            "LSP provision error type.";
        }
        leaf error-description {
          type string;
          description
            "The textual representation of the error that occurred
             during LSP provisioning.";
        }
        leaf error-timestamp {
          type yang:date-and-time;
          description
            "Timestamp of when the reported error occurred.";
        }
        leaf error-node-id {
          type te-types:te-node-id;
          description
            "Node identifier of node where error occurred.";
        }
        leaf error-link-id {
          type te-types:te-tp-id;
          description
            "Link ID where the error occurred.";
        }
        leaf lsp-id {
          type uint16;
          description
            "The LSP-ID for which LSP provisioning error was
             returned.";
        }
      }
    }
    container lsps {
      config false;
      description
        "The TE LSPs container.";
      list lsp {
        key "node lsp-id";
        description
          "List of LSPs associated with the tunnel.";
        leaf tunnel-name {
          type leafref {
            path "/te:te/te:lsps/te:lsp/te:tunnel-name";
          }
          description "TE tunnel name.";
        }
        leaf node {
          type leafref {
            path "/te:te/te:lsps/te:lsp[tunnel-name="
               + "current()/../te:tunnel-name][lsp-id="
               + "current()/../te:lsp-id]/te:node";
          }
          description "The node where the LSP state resides.";
        }
        leaf lsp-id {
          type leafref {
            path "/te:te/te:lsps/te:lsp[tunnel-name="
               + "current()/../tunnel-name]/te:lsp-id";
          }
          description "The TE LSP identifier.";
        }
        leaf state-change-timestamp {
          type yang:date-and-time;
          description
            "Indicates the time at which the LSP operational
             state was last updated.";
        }
      }
    }
  }

  grouping path-computation-response {
    description
      "Attributes reported by path computation response.";
    container computed-paths-properties {
      config false;
      description
        "Computed path properties container.";
      list computed-path-properties {
        key "k-index";
        description
          "List of computed paths.";
        leaf k-index {
          type uint8;
          description
            "The k-th path returned from the computation server.
             A lower k value path is more optimal than higher k
             value paths";
        }
        uses te-types:generic-path-properties {
          augment "path-properties" {
            description
              "additional path properties returned by path
               computation.";
            uses te-types:te-bandwidth;
            leaf disjointness-type {
              type te-types:te-path-disjointness;
              description
                "The type of resource disjointness.
                 When reported for a primary path, it represents the
                 minimum level of disjointness of all the secondary
                 paths. When reported for a secondary path, it
                 represents the disjointness of the secondary path.";
            }
            leaf last-computed-timestamp {
              type yang:date-and-time;
              description
                "Timestamp of when the path was last computed.";
            }
          }
        }
      }
    }
    container computed-path-error-infos {
      config false;
      description
        "Path computation information container.";
      list computed-path-error-info {
        description
          "List of path computation info entries.";
        leaf error-description {
          type string;
          description
            "Textual representation of the error that occurred
             during path computation.";
        }
        leaf error-timestamp {
          type yang:date-and-time;
          description
            "Timestamp of last path computation attempt.";
        }
        leaf error-reason {
          type identityref {
            base te-types:path-computation-error-reason;
          }
          description
            "Reason for the path computation error.";
        }
      }
    }
  }

  grouping protection-restoration-properties {
    description
      "Protection and restoration parameters.";
    container protection {
      description
        "Protection parameters.";
      leaf protection-type {
        type identityref {
          base te-types:lsp-protection-type;
        }
        default "te-types:lsp-protection-unprotected";
        description
          "LSP protection type.";
      }
      leaf protection-reversion-disable {
        type boolean;
        default "false";
        description
          "Disable protection reversion to working path.";
      }
      leaf hold-off-time {
        type uint32;
        units "milliseconds";
        description
          "The time interval from the declaration of a Signal Fail
           (SF) or Signal Degrade (SD) condition until the protect-
           ion switching algorithm is initiated to maintain service
           continuity.";
        reference
          "RFC 4427: Recovery (Protection and Restoration)
                     Terminology for Generalized Multi-Protocol
                     Label Switching (GMPLS).";
      }
      leaf wait-to-revert {
        type uint16;
        units "seconds";
        description
          "Time to wait before attempting LSP reversion.";
        reference
          "RFC 4427: Recovery (Protection and Restoration)
                     Terminology for Generalized Multi-Protocol
                     Label Switching (GMPLS).";
      }
      leaf aps-signal-id {
        type uint8 {
          range "1..255";
        }
        default "1";
        description
          "The Automatic Protection Switching (APS) signal number
           used to reference the traffic of this tunnel. The default
           value for normal traffic is 1.
           The default value for extra-traffic is 255. If not
           specified, non-default values can be assigned by the
           server, if and only if, the server controls both
            endpoints.";
        reference
          "ITU_G.808.1: Generic protection switching - Linear trail
                        and subnetwork protection.";
      }
    }
    container restoration {
      description
        "Restoration parameters.";
      leaf restoration-type {
        type identityref {
          base te-types:lsp-restoration-type;
        }
        description
          "LSP restoration type.";
      }
      leaf restoration-scheme {
        type identityref {
          base te-types:restoration-scheme-type;
        }
        description
          "LSP restoration scheme.";
      }
      leaf restoration-reversion-disable {
        type boolean;
        default "false";
        description
          "When 'true', disables restoration reversion to the working
           path.";
      }
      leaf hold-off-time {
        type uint32;
        units "milliseconds";
        description
          "The time interval from the declaration of a Signal Fail
           (SF) or Signal Degrade (SD) condition until the protect-
           ion switching algorithm is initiated to maintain service
           continuity.";
        reference
          "RFC 4427: Recovery (Protection and Restoration)
                     Terminology for Generalized Multi-Protocol
                     Label Switching (GMPLS).";
      }
      leaf wait-to-restore {
        type uint16;
        units "seconds";
        description
          "Time to wait before attempting LSP restoration.";
        reference
          "RFC 4427: Recovery (Protection and Restoration)
                     Terminology for Generalized Multi-Protocol
                     Label Switching (GMPLS).";
      }
      leaf wait-to-revert {
        type uint16;
        units "seconds";
        description
          "Time to wait before attempting LSP reversion.";
        reference
          "RFC 4427: Recovery (Protection and Restoration)
                     Terminology for Generalized Multi-Protocol
                     Label Switching (GMPLS).";
      }
    }
  }

  grouping tunnel-associations-properties {
    description
      "TE tunnel association grouping.";
    container association-objects {
      description
        "TE tunnel associations.";
      list association-object {
        key "association-key";
        unique "type id source/id source/type";
        description
          "List of association base objects.";
        reference
          "RFC 4872: RSVP-TE Extensions in Support of End-to-End
                     Generalized Multi-Protocol Label Switching
                     (GMPLS) Recovery.";
        leaf association-key {
          type string;
          description
            "Association key used to identify a specific
             association in the list";
        }
        leaf type {
          type identityref {
            base te-types:association-type;
          }
          description
            "Association type.";
          reference
            "RFC 4872: RSVP-TE Extensions in Support of End-to-End
                       Generalized Multi-Protocol Label Switching
                       (GMPLS) Recovery.";
        }
        leaf id {
          type uint16;
          description
            "Association identifier.";
          reference
            "RFC 4872: RSVP-TE Extensions in Support of End-to-End
                        Generalized Multi-Protocol Label Switching
                        (GMPLS) Recovery.";
        }
        container source {
          uses te-types:te-generic-node-id;
          description
            "Association source.";
          reference
            "RFC 4872: RSVP-TE Extensions in Support of End-to-End
                       Generalized Multi-Protocol Label Switching
                       (GMPLS) Recovery.";
        }
      }
      list association-object-extended {
        key "association-key";
        unique
          "type id source/id source/type global-source extended-id";
        description
          "List of extended association objects.";
        reference
          "RFC 6780: RSVP ASSOCIATION Object Extensions";
        leaf association-key {
          type string;
          description
            "Association key used to identify a specific
             association in the list";
        }
        leaf type {
          type identityref {
            base te-types:association-type;
          }
          description
            "Association type.";
          reference
            "RFC 4427: Recovery (Protection and Restoration)
                       Terminology for Generalized Multi-Protocol
                       Label Switching (GMPLS)
             RFC 6780: RSVP ASSOCIATION Object Extensions";
        }
        leaf id {
          type uint16;
          description
            "Association identifier.";
          reference
            "RFC 4427: Recovery (Protection and Restoration)
                       Terminology for Generalized Multi-Protocol
                       Label Switching (GMPLS)
             RFC 6780: RSVP ASSOCIATION Object Extensions";
        }
        container source {
          uses te-types:te-generic-node-id;
          description
            "Association source.";
          reference
            "RFC 4427: Recovery (Protection and Restoration)
                       Terminology for Generalized Multi-Protocol
                       Label Switching (GMPLS)
             RFC 6780: RSVP ASSOCIATION Object Extensions";
        }
        leaf global-source {
          type uint32;
          description
            "Association global source.";
          reference
            "RFC 6780: RSVP ASSOCIATION Object Extensions";
        }
        leaf extended-id {
          type yang:hex-string;
          description
            "Association extended identifier.";
          reference
            "RFC 6780: RSVP ASSOCIATION Object Extensions";
        }
      }
    }
  }

  grouping tunnel-end-point {
    description
      "Common grouping used to specify the tunnel source and 
      destination end-points.";
    leaf node-id {
      type nw:node-id;
      description
        "The TE tunnel end-point node identifier";
    }
    leaf te-node-id {
      type te-types:te-node-id;
      description
        "The TE tunnel end-point TE node identifier";
    }
    leaf tunnel-tp-id {
      when "../node-id or ../te-node-id" {
        description
          "The TE tunnel termination point identifier is local to 
          a node";
      }
      type binary;
      description
        "The TE tunnel end-point TE tunnel termination point 
        identifier";
    }
  }

  /* Some of the groupings defined in this module are re-used
   * in path-computation YANG model
   * defined in [I-D.ietf-teas-yang-path-computation] */
  grouping tunnel-common-attributes {
    description
      "Common grouping to define the TE tunnel parameters";
    container source {
      description
        "TE tunnel source end-point.";
      uses tunnel-end-point;
    }
    container destination {
      description
        "TE tunnel destination end-point.";
      uses tunnel-end-point;
    }
    leaf bidirectional {
      type boolean;
      default "false";
      description
        "When 'true', it indicates a bidirectional tunnel";
    }
  }

  /* This grouping is re-used in path-computation YANG
   * model defined in [I-D.ietf-teas-yang-path-computation] */
  grouping tunnel-hierarchy-properties {
    description
      "A grouping for TE tunnel hierarchy information.";
    container hierarchy {
      description
        "Container for TE hierarchy related information.";
      container dependency-tunnels {
        description
          "List of tunnels that this tunnel can be potentially
           dependent on.";
        list dependency-tunnel {
          key "name";
          description
            "A tunnel entry that this tunnel can potentially depend
             on.";
          leaf name {
            type tunnel-ref;
            description
              "Dependency tunnel name. The tunnel may not have been
               instantiated yet.";
          }
          uses te-types:encoding-and-switching-type;
        }
      }
      container hierarchical-link {
        description
          "Identifies a hierarchical link (in client layer)
           that this tunnel is associated with. By default, the
           topology of the hierarchical link is the same topology of
           the tunnel;";
        reference
          "RFC 4206: Label Switched Paths (LSP) Hierarchy with
                     Generalized Multi-Protocol Label Switching
                     (GMPLS) Traffic Engineering (TE)";
        leaf enable {
          type boolean;
          default "false";
          description
            "When 'true', enables the hierarchical link properties
             supported by this tunnel";
        }
        leaf local-node-id {
          type nw:node-id;
          description
            "The local node identifier.";
        }
        leaf local-te-node-id {
          type te-types:te-node-id;
          description
            "The local TE node identifier.";
        }
        leaf local-link-tp-id {
          type nt:tp-id;
          description
            "The local link termination point identifier.";
          reference
            "RFC 8345: A YANG Data Model for Network Topologies";
        }
        leaf local-te-link-tp-id {
          type te-types:te-tp-id;
          description
            "The local TE link termination point identifier.";
        }
        leaf remote-node-id {
          type nw:node-id;
          description
            "The remote node identifier.";
        }
        leaf remote-link-tp-id {
          type nt:tp-id;
          description
            "The remote link termination point identifier.";
          reference
            "RFC 8345: A YANG Data Model for Network Topologies";
        }
        leaf remote-te-link-tp-id {
          type te-types:te-tp-id;
          description
            "The remote TE link termination point identifier.";
        }
        leaf remote-te-node-id {
          type te-types:te-node-id;
          description
            "Remote TE node identifier.";
        }
        leaf link-id {
          type nt:link-id;
          description
            "A network topology assigned identifier to the link";
          reference
            "RFC 8345: A YANG Data Model for Network Topologies";
        }
        leaf network-id {
          type nw:network-id;
          description
            "The network topology identifier where the hierarchical 
            link supported by this TE tunnel is instantiated.";
        }
        uses te-types:te-topology-identifier {
          description
            "The TE topology identifier where the hierarchical link
             supported by this TE tunnel is instantiated.";
        }
      }
    }
  }

  grouping path-constraints-common {
    description
      "Global named path constraints configuration
       grouping.";
    uses te-types:common-path-constraints-attributes;
    uses te-types:generic-path-disjointness;
    uses te-types:path-constraints-route-objects;
    container path-in-segment {
      presence "The end-to-end tunnel starts in a previous domain;
                this tunnel is a segment in the current domain.";
      description
        "If an end-to-end tunnel crosses multiple domains using
         the same technology, some additional constraints have to be
         taken in consideration in each domain.
         This TE tunnel segment is stitched to the upstream TE tunnel
         segment.";
      uses te-types:label-set-info;
    }
    container path-out-segment {
      presence
        "The end-to-end tunnel is not terminated in this domain;
         this tunnel is a segment in the current domain.";
      description
        "If an end-to-end tunnel crosses multiple domains using
         the same technology, some additional constraints have to be
         taken in consideration in each domain.
         This TE tunnel segment is stitched to the downstream TE
         tunnel segment.";
      uses te-types:label-set-info;
    }
  }

  /**
   * TE container
   */

  container te {
    description
      "TE global container.";
    leaf enable {
      type boolean;
      description
        "When 'true', the TE component features are enabled.";
    }

    /* TE Global Data */
    container globals {
      description
        "Globals TE system-wide configuration data container.";
      container named-admin-groups {
        description
          "TE named admin groups container.";
        list named-admin-group {
          if-feature "te-types:extended-admin-groups";
          if-feature "te-types:named-extended-admin-groups";
          key "name";
          description
            "List of named TE admin-groups.";
          leaf name {
            type string;
            description
              "A name that uniquely identifies a TE
               interface named admin-group.";
          }
          leaf bit-position {
            type uint32;
            description
              "Bit-position value for a named Administrative Group
               (AG).  The value is an integer that represents one of
               the bit positions in the administrative group bitmask.
               Values for bit-positions between 0 and 31 are inter-
               preted as the original 32 bit AGs. Values of bit-
               positions >=32 are interpreted as Extended
               Administrative Group (EAG) values as per RFC 7308.";
            reference
              "RFC 3209: RSVP-TE: Extensions to RSVP for LSP Tunnels
               RFC 7308: Extended Administrative Groups in MPLS
                         Traffic Engineering (MPLS-TE)";
          }


        }
      }
      container named-srlgs {
        description
          "TE named SRLGs container.";
        list named-srlg {
          if-feature "te-types:named-srlg-groups";
          key "name";
          description
            "A list of named SRLG groups.";
          leaf name {
            type string;
            description
              "A name that uniquely identifies a TE
               interface named SRLG.";
          }
          leaf value {
            type te-types:srlg;
            description
              "An SRLG value.";
          }
          leaf cost {
            type uint32;
            description
              "The cost associated with an SRLG. This is used as
               a penalty during path computation when the TE path
               traverses a link with this SRLG.";
          }
        }
      }
      container named-path-constraints {
        description
          "TE named path constraints container.";
        list named-path-constraint {
          if-feature "te-types:named-path-constraints";
          key "name";
          leaf name {
            type string;
            description
              "A unique identifier for a set of path constraints.
               Operators should ensure that when this model is used
               to manage multiple devices, the parameters associated
               with the set of path constraints sharing the same name
               remain consistent across those devices in order to
               maintain uniform path behavior.";
          }
          uses path-constraints-common;
          description
            "A list of named path constraints.";
        }
      }
    }

    /* TE Tunnel Data */
    container tunnels {
      description
        "Tunnels TE configuration data container.";
      list tunnel {
        key "name";
        description
          "The list of TE tunnels.";
        leaf name {
          type string;
          description
            "TE tunnel name.";
        }
        leaf alias {
          type string;
          description
            "An alternate name of the TE tunnel that can be modified
             anytime during its lifetime.";
        }
        leaf identifier {
          type uint32;
          description
            "A numeric identifier for the tunnel, unique within the
             scope of the ingress node. While the 'name' leaf serves
             as a     human-readable management key, this
             'identifier' corresponds to the Tunnel ID used in
             control plane signaling (e.g., the RSVP-TE SESSION
             object as defined in RFC 3209), allowing for
             correlation between management state and network-wide 
             signaling.";
          reference
            "RFC 3209: RSVP-TE: Extensions to RSVP for LSP Tunnels";
        }
        leaf color {
          type uint32;
          description
            "A TE Tunnel [RFC3209] can be associated with an intent
             or objective (e.g., low latency) by tagging it with a
             color.  This color attribute is used as a guiding
             criterion for mapping services onto the TE Tunnel
             [RFC9012][RFC9256].";
          reference
            "RFC 9012: The BGP Tunnel Encapsulation Attribute";
        }
        leaf description {
          type string;
          default "None";
          description
            "Textual description for this TE tunnel.";
        }
        leaf admin-state {
          type identityref {
            base te-types:tunnel-admin-state-type;
          }
          default "te-types:tunnel-admin-state-up";
          description
            "TE tunnel administrative state.";
        }
        leaf operational-state {
          type identityref {
            base te-types:tunnel-state-type;
          }
          config false;
          description
            "TE tunnel operational state.";
        }
        leaf state-change-timestamp {
          type yang:date-and-time;
          description
            "Indicates the time at which the TE tunnel's operational
             state was last updated.";
        }
        uses te-types:encoding-and-switching-type;
        uses tunnel-common-attributes;
        container controller {
          description
            "Contains tunnel data relevant to external controllers.
             This target node may be augmented by external modules,
             for example, to add data for PCEP initiated and/or
             delegated tunnels.";
          leaf protocol-origin {
            type identityref {
              base te-types:protocol-origin-type;
            }
            description
              "The protocol origin for instantiating the tunnel.";
          }
          leaf controller-entity-id {
            type string;
            description
              "An identifier that is associated with the entity that
               controls the tunnel as defined in RFC 8232.";
            reference
              "RFC 8232: Optimizations of Label Switched Path State
                         Synchronization Procedures for a Stateful
                         PCE";
          }
        }
        leaf reoptimize-timer {
          type uint16;
          units "seconds";
          description
            "Frequency of reoptimization of a traffic-engineered
             LSP. A value of 0 means that the LSP is never
             reoptimized";
        }
        uses tunnel-associations-properties;
        uses protection-restoration-properties;
        uses te-types:tunnel-constraints;
        uses tunnel-hierarchy-properties;
        container primary-paths {
          description
            "The set of primary paths.";
          reference
            "RFC 4872: RSVP-TE Extensions in Support of End-to-End
                       Generalized Multi-Protocol Label Switching
                       (GMPLS) Recovery.";
          list primary-path {
            key "name";
            description
              "List of primary paths for this tunnel.";
            leaf active {
              type boolean;
              config false;
              description
                "When 'true', indicates an active path has been
                 selected from the primary paths list.";
            }
            uses path-common-properties;
            uses path-forward-properties;
            uses k-requested-paths;
            uses path-compute-info;
            uses path-state;
            container primary-reverse-path {
              when "../../../te:bidirectional = 'true'";
              description
                "The reverse primary path properties.";
              uses path-common-properties;
              uses path-compute-info;
              uses path-state;
              container candidate-secondary-reverse-paths {
                description
                  "The set of referenced candidate reverse secondary
                   paths from the full set of secondary reverse paths
                   which may be used for this primary path.";
                list candidate-secondary-reverse-path {
                  key "secondary-reverse-path";
                  ordered-by user;
                  description
                    "List of candidate secondary reverse paths";
                  leaf secondary-reverse-path {
                    type leafref {
                      path "../../../../../../"
                         + "te:secondary-reverse-paths/"
                         + "te:secondary-reverse-path/te:name";
                    }
                    description
                      "A reference to the secondary reverse path that
                       may be utilized when the containing primary
                       reverse path is in use.";
                  }
                  leaf active {
                    type boolean;
                    config false;
                    description
                      "When 'true', indicates an active path has been
                       selected from the secondary reverse paths
                       list.";
                  }
                }
              }
            }
            container candidate-secondary-paths {
              description
                "The set of candidate secondary paths which may be
                 used for this primary path. When secondary paths are
                 specified in the list the path of the secondary LSP
                 in use must be restricted to those paths
                 referenced.
                 The priority of the secondary paths is specified
                 within the list. Higher priority values are less
                 preferred - that is to say that a path with priority
                 0 is the most preferred path. In the case that the
                 list is empty, any secondary path may be
                 utilized when the current primary path is in use.";
              list candidate-secondary-path {
                key "secondary-path";
                ordered-by user;
                description
                  "List of candidate secondary paths for this
                   tunnel.";
                leaf secondary-path {
                  type leafref {
                    path "../../../../../te:secondary-paths/"
                       + "te:secondary-path/te:name";
                  }
                  description
                    "A reference to the secondary path that may be
                     utilized when the containing primary path is
                     in use.";
                }
                leaf active {
                  type boolean;
                  config false;
                  description
                    "When 'true', indicates an active path has been
                     selected from the candidate secondary paths.";
                }
              }
            }
          }
        }
        container secondary-paths {
          description
            "The set of secondary paths.";
          reference
            "RFC 4872: RSVP-TE Extensions in Support of End-to-End
                       Generalized Multi-Protocol Label Switching
                       (GMPLS) Recovery.";
          list secondary-path {
            key "name";
            description
              "List of secondary paths for this tunnel.";
            uses path-common-properties;
            leaf preference {
              type uint8 {
                range "1..255";
              }
              default "1";
              description
                "Specifies a preference for this path. The lower the
                 number, the higher the preference.";
            }
            leaf secondary-reverse-path {
              type leafref {
                path "../../../"
                   + "te:secondary-reverse-paths/"
                   + "te:secondary-reverse-path/te:name";
              }
              description
                "A reference to the reverse secondary path when
                 co-routed with the secondary path.";
            }
            uses path-compute-info;
            uses protection-restoration-properties;
            uses path-state;
          }
        }
        container secondary-reverse-paths {
          description
            "The set of secondary reverse paths.";
          list secondary-reverse-path {
            key "name";
            description
              "List of secondary paths for this tunnel.";
            uses path-common-properties;
            leaf preference {
              type uint8 {
                range "1..255";
              }
              default "1";
              description
                "Specifies a preference for this path. The lower the
                 number higher the preference. Paths that have the
                 same preference will be activated together.";
            }
            uses path-compute-info;
            uses protection-restoration-properties;
            uses path-state;
          }
        }
        action tunnel-action {
          description
            "Action commands to manipulate the TE tunnel state.";
          reference
            "RFC 3209: RSVP-TE: Extensions to RSVP for LSP Tunnels,
             Section 2.5";
          input {
            leaf action-type {
              type identityref {
                base te-types:tunnel-action-type;
              }
              description
                "The action to be invoked on the TE tunnel.";
            }
          }
          output {
            leaf action-result {
              type identityref {
                base te-types:te-action-result;
              }
              description
                "The result of the tunnel action operation.";
            }
          }
        }
        action protection-external-commands {
          description
            "Actions to manipulate the protection external
             commands of the TE tunnel.";
          reference
            "RFC 4427: Recovery (Protection and Restoration)
             Terminology for Generalized Multi-Protocol Label
             Switching (GMPLS)";
          input {
            leaf protection-external-command {
              type identityref {
                base te-types:protection-external-commands;
              }
              description
                "Protection external command.";
            }
            leaf ingress-node {
              type boolean;
              default "true";
              description
                "When 'true', indicates that the action is
                 applied on the ingress node.
                 By default, the action applies to the ingress
                 node";
            }
            leaf egress-node {
              type boolean;
              default "false";
              description
                "When 'true', indicates that the action is
                 applied on the egress node. By default,
                 the action applies to the ingress node.";
            }
            leaf path-name {
              type string;
              description
                "The name of the path that the external command
                applies to.";
            }
            leaf path-type {
              type te-types:path-type;
              description
                "The type of the path that the external command
                applies to.";
            }
            leaf traffic-type {
              type enumeration {
                enum normal-traffic {
                  description
                    "The manual-switch or forced-switch command
                     applies to the normal traffic (this Tunnel).";
                }
                enum null-traffic {
                  description
                    "The manual-switch or forced-switch command
                     applies to the null traffic.";
                }
                enum extra-traffic {
                  description
                    "The manual-switch or forced-switch command
                     applies to the extra traffic (the extra-traffic
                     Tunnel sharing protection bandwidth with this
                     Tunnel).";
                }
              }
              description
                "Indicates whether the manual-switch or forced-switch
                 commands applies to the normal traffic, the null
                 traffic or the extra-traffic.";
              reference
                "RFC 4427: Recovery (Protection and Restoration)
                           Terminology for Generalized Multi-Protocol
                           Label Switching (GMPLS).";
            }
            leaf extra-traffic-tunnel-ref {
              type tunnel-ref;
              description
                "In case there are multiple extra-traffic tunnels
                 sharing protection bandwidth with this Tunnel
                 (m:n protection), represents which extra-traffic
                 Tunnel the manual-switch or forced-switch to
                 extra-traffic command applies to.";
            }
          }
        }
      }
    }

    /* TE LSPs Data */
    container lsps {
      config false;
      description
        "TE LSPs state container.";
      list lsp {
        key "tunnel-name lsp-id node";
        unique "source destination tunnel-id lsp-id "
          + "extended-tunnel-id";
        description
          "List of LSPs associated with the tunnel.";
        leaf tunnel-name {
          type string;
          description "The TE tunnel name.";
        }
        leaf lsp-id {
          type uint16;
          description
            "An identifier unique in the context of the ingress LSP.
             For example, as used in the RSVP-TE SENDER_TEMPLATE and
             FILTER_SPEC objects. The value can be changed to allow a
             sender to share resources with itself.";
          reference
            "RFC 3209";
        }
        leaf node {
          type te-types:te-node-id;
          description
            "The node where the LSP state is retrieved.";
        }
        leaf source {
          type te-types:te-node-id;
          description
            "The address of the ingress LSP endpoint that identifies
             the start of the tunnel. This typically corresponds to
             the Tunnel Sender Address extracted from the RSVP-TE 
             SENDER_TEMPLATE object.";
          reference
            "RFC 3209: RSVP-TE: Extensions to RSVP for LSP Tunnels";
        }
        leaf destination {
          type te-types:te-node-id;
          description
            "The address of the egress LSP endpoint that identifies
             the end of the tunnel. This typically corresponds to
             the Tunnel Endpoint Address extracted from the RSVP-TE 
             SESSION object.";
          reference
            "RFC 3209: RSVP-TE: Extensions to RSVP for LSP Tunnels";
        }
        leaf tunnel-id {
          type uint16;
          description
            "An identifier of the tunnel that remains constant over
             the life of the tunnel. For example, this may be the
             Tunnel ID extracted from RSVP-TE SESSION object.";
          reference
            "RFC 3209";
        }
        leaf extended-tunnel-id {
          type te-types:te-node-id;
          description
            "A qualifier used to ensure the global uniqueness of the
             tunnel identifier. It carries a 4-byte or 16-byte value,
             typically corresponding to the Extended Tunnel ID
             extracted from the RSVP-TE SESSION object as defined in
             RFC 3209.";
          reference
            "RFC 3209";
        }
        leaf operational-state {
          type identityref {
            base te-types:lsp-state-type;
          }
          description
            "The LSP operational state.";
        }
        leaf signaling-type {
          type identityref {
            base te-types:path-signaling-type;
          }
          description
            "The signaling protocol used to set up this LSP.";
        }
        leaf origin-type {
          type enumeration {
            enum ingress {
              description
                "Origin ingress.";
            }
            enum egress {
              description
                "Origin egress.";
            }
            enum transit {
              description
                "Origin transit.";
            }
          }
          description
            "The origin of the LSP relative to the location of the
             local switch in the path.";
        }
        leaf lsp-resource-status {
          type enumeration {
            enum primary {
              description
                "A primary LSP is a fully established LSP for which
                 the resource allocation has been committed at the
                 data plane.";
            }
            enum secondary {
              description
                "A secondary LSP is an LSP that has been provisioned
                 in the control plane only; e.g. resource allocation
                 has not been committed at the data plane.";
            }
          }
          description
            "LSP resource allocation state.";
          reference
            "RFC 4872, section 4.2.1";
        }
        leaf lockout-of-normal {
          type boolean;
          description
            "When set to 'true', it represents a lockout of normal
             traffic external command. When set to 'false', it
             represents a clear lockout of normal traffic external
             command. The lockout of normal traffic command applies
             to this Tunnel.";
          reference
            "RFC 4427";
        }
        leaf freeze {
          type boolean;
          description
            "When set to 'true', it represents a freeze external
             command.  When set to 'false', it represents a clear
             freeze external command. The freeze command applies to
             all the Tunnels which are sharing the protection
             resources with this Tunnel.";
          reference
            "RFC 4427";
        }
        leaf lsp-protection-role {
          type enumeration {
            enum working {
              description
                "A working LSP must be a primary LSP whilst a
                 protecting LSP can be either a primary or a
                 secondary LSP. Also, known as protected LSPs when
                 working LSPs are associated with protecting LSPs.";
            }
            enum protecting {
              description
                "A secondary LSP is an LSP that has been provisioned
                 in the control plane only; e.g. resource allocation
                 has not been committed at the data plane.";
            }
          }
          description
            "LSP role type.";
          reference
            "RFC 4872, section 4.2.1";
        }
        leaf lsp-protection-state {
          type identityref {
            base te-types:lsp-protection-state;
          }
          config false;
          description
            "The reported protection state controlling which
             tunnel is using the resources of the protecting LSP.";
        }
        leaf ingress-node-id {
          type te-types:te-node-id;
          description
            "Indicates the te-node-id of the ingress node of the TE
             tunnel or tunnel segment when the protection action is
             applied to the ingress node or the Wait To Restore (WTR)
             timer is active.
             This is set to '0.0.0.0' when the controller is not
             aware of the te-node-id of ingress-node.";
        }
        leaf egress-node-id {
          type te-types:te-node-id;
          description
            "Indicates the te-node-id of the egress node of the TE
             tunnel or tunnel segment when the protection action is
             applied to the ingress node or the WTR timer is active.
             This is set to '0.0.0.0' when the controller is not
             aware of the te-node-id of ingress-node.";
        }
        container lsp-actual-route-information {
          description
            "RSVP recorded route object information.";
          list lsp-actual-route-information {
            when "../../origin-type = 'ingress'" {
              description
                "Applicable on ingress LSPs only.";
            }
            key "index";
            description
              "Record route list entry.";
            uses te-types:record-route-state;
          }
        }
      }
    }
  }

  /* TE Tunnel RPCs/execution Data */

  rpc tunnels-path-compute {
    description
      "This RPC is a generic API whose
       input and output parameters are expected to be provided by
       augments to this module.";
    reference
      "RFC 4655: A Path Computation Element (PCE)-Based
       Architecture.";
    input {
      container path-compute-info {
        /* 
         * An external path compute module may augment this
         * target.
         */
        description
          "RPC input information.";
      }
    }
    output {
      container path-compute-result {
        /* 
         * An external path compute module may augment this
         * target.
         */
        description
          "RPC output information.";
      }
    }
  }

  rpc tunnels-actions {
    description
      "RPC that manipulates the state of a TE tunnel.";
    reference
      "RFC 3209: RSVP-TE: Extensions to RSVP for LSP Tunnels,
       Section 2.5";
    input {
      container tunnel-info {
        description
          "TE tunnel information.";
        choice filter-type {
          mandatory true;
          description
            "Filter choice.";
          case all-tunnels {
            leaf all {
              type empty;
              mandatory true;
              description
                "When present, applies the action on all TE
                 tunnels.";
            }
          }
          case one-tunnel {
            leaf tunnel {
              type tunnel-ref;
              description
                "Apply action on the specific TE tunnel.";
            }
          }
        }
      }
      container action-info {
        description
          "TE tunnel action information.";
        leaf action {
          type identityref {
            base te-types:tunnel-action-type;
          }
          description
            "The action type.";
        }
        leaf disruptive {
          when "derived-from-or-self(../action, "
             + "'te-types:tunnel-action-reoptimize')";
          type empty;
          description
            "Specifies whether reoptimization operations,
             particularly when multiple tunnels are involved,
             are permitted to cause traffic disruption on some
             TE tunnels.";
        }
      }
    }
    output {
      leaf action-result {
        type identityref {
          base te-types:te-action-result;
        }
        description
          "The result of the tunnel action operation.";
      }
    }
  }
}
<CODE ENDS>
]]></artwork></figure>

</section>
</section>
<section anchor="te-device-yang-moule"><name>TE Device YANG Moule</name>

<t>The TE device YANG module 'ietf-te-device' models data that is specific to
managing a TE device.  This module augments the TE YANG module.</t>

<section anchor="module-structure-1"><name>Module Structure</name>

<t>The 'ietf-te-device' module defines the configuration and operational state data
that is specific to the device, including those related to the TE subsystem, tunnels, LSPs, and interfaces.</t>

<section anchor="te-device-globals-tunnels-and-lsps"><name>TE Device Globals, Tunnels and LSPs</name>

<t>The 'ietf-te-device' module augments the TE YANG module 'ietf-te' at the
'globals', 'tunnels', and 'lsps' levels to include the device-specific
configurations and operational state.</t>

<t><xref target="fig-if-te-01"/> shows the
'ietf-te-device' subtree generated with depth=4 that describes those
augmentations.</t>

<figure title="TE Device Augmentations to Globals, Tunnels, and LSPs YANG Subtree" anchor="fig-if-te-01"><artwork><![CDATA[
module: ietf-te-device

  augment /te:te/te:globals:
    +--rw lsp-install-interval?        uint32
    +--rw lsp-cleanup-interval?        uint32
    +--rw lsp-invalidation-interval?   uint32
  augment /te:te/te:tunnels/te:tunnel:
    +--rw path-invalidation-action?    identityref
    +--rw lsp-install-interval?        uint32
    +--rw lsp-cleanup-interval?        uint32
    +--rw lsp-invalidation-interval?   uint32
  augment /te:te/te:lsps/te:lsp:
    +--ro lsp-timers
    |  +--ro uptime?            uint32
    |  +--ro time-to-install?   uint32
    |  +--ro time-to-destroy?   uint32
    +--ro downstream-info
    |     ..
    +--ro upstream-info
          ..
]]></artwork></figure>

<t>The following is the description of the augmented data at each level.</t>

<t>Global Timers (Augmenting /te:te/te:globals):</t>

<t>These are device-specific global configuration parameters related to LSP timers, applied system-wide.</t>

<dl>
  <dt>lsp-install-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, before a newly provisioned LSP is installed into the forwarding plane to carry traffic.</t>
  </dd>
  <dt>lsp-cleanup-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, before an LSP is completely removed from the system after it is no longer in use.</t>
  </dd>
  <dt>lsp-invalidation-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, during which a TE LSP's path is considered invalid before any corrective action is taken.</t>
  </dd>
</dl>

<t>Tunnel Device-Dependent Attributes (Augmenting /te:te/te:tunnels/te:tunnel).</t>

<t>These are device-specific configuration parameters that apply to individual TE Tunnels:</t>

<dl>
  <dt>path-invalidation-action</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional identityref that specifies the action to be taken when a TE Tunnel's path is deemed invalid (e.g., tear down, recompute).</t>
  </dd>
  <dt>lsp-install-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, for this specific TE Tunnel before its LSPs are installed into the forwarding plane. This value can override the global lsp-install-interval.</t>
  </dd>
  <dt>lsp-cleanup-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, for this specific TE Tunnel before its LSPs are cleaned up. This value can override the global lsp-cleanup-interval.</t>
  </dd>
  <dt>lsp-invalidation-interval</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that specifies the delay time, in seconds, for this specific TE Tunnel during which its path is considered invalid before action is taken. This value can override the global lsp-invalidation-interval.</t>
  </dd>
</dl>

<t>LSP Device-Dependent State (Augmenting /te:te/te:lsps/te:lsp).</t>

<t>These are read-only operational state parameters providing device-specific details for individual LSPs:</t>

<dl>
  <dt>lsp-timers</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>A container that holds various timer-related operational state for an LSP, applicable primarily to ingress LSPs.</t>
  </dd>
  <dt>uptime</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that indicates the total time, in seconds, that the LSP has been operational.</t>
  </dd>
  <dt>time-to-install</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that indicates the remaining time, in seconds, for a new LSP to be fully instantiated and ready to carry traffic.</t>
  </dd>
  <dt>time-to-destroy</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>An optional leaf that indicates the remaining time, in seconds, before an existing LSP is torn down.</t>
  </dd>
  <dt>downstream-info</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>A container that holds information about the downstream neighbor and label for the LSP, applicable when the LSP is not at its egress.</t>
  </dd>
  <dt>upstream-info</dt>
  <dd><t/></dd>
  <dt>:</dt>
  <dd>
    <t>A container that holds information about the upstream neighbor and label for the LSP, applicable when the LSP is not at its ingress.</t>
  </dd>
</dl>

</section>
<section anchor="te-device-interfaces"><name>TE Device Interfaces</name>

<t>The TE interface is modeled as a reference to an existing interface as defined
in the 'ietf-interfaces' YANG module <xref target="RFC8343"/>.</t>

<t><xref target="fig-if-te-02"/> shows the TE interface subtree from the TE device module 'ietf-te-device' with depth=4.
The full tree diagram is shown in <xref target="AppendixB"/>.</t>

<figure title="TE interfaces YANG subtree from the TE device YANG data model" anchor="fig-if-te-02"><artwork><![CDATA[
module: ietf-te-device

  augment /te:te:
    +--rw interfaces
       +--rw threshold-type?            enumeration
       +--rw delta-percentage?          rt-types:percentage
       +--rw threshold-specification?   enumeration
       +--rw up-thresholds*             rt-types:percentage
       +--rw down-thresholds*           rt-types:percentage
       +--rw up-down-thresholds*        rt-types:percentage
       +--rw interface* [name]
          +--rw name                                if:interface-ref
          +--rw te-metric?
          |       te-types:te-metric
          +--rw (admin-group-type)?
          |  +--:(value-admin-groups)
          |  |     ...
          |  +--:(named-admin-groups)
          |        ...
          +--rw (srlg-type)?
          |  +--:(value-srlgs)
          |  |     ...
          |  +--:(named-srlgs)
          |        ...
          +--rw threshold-type?                     enumeration
          +--rw delta-percentage?
          |       rt-types:percentage
          +--rw threshold-specification?            enumeration
          +--rw up-thresholds*
          |       rt-types:percentage
          +--rw down-thresholds*
          |       rt-types:percentage
          +--rw up-down-thresholds*
          |       rt-types:percentage
          +--rw switching-capabilities* [switching-capability]
          |  +--rw switching-capability    identityref
          |  +--rw encoding?               identityref
          +--ro te-advertisements-state
             +--ro flood-interval?           uint32
             +--ro last-flooded-time?        uint32
             +--ro next-flooded-time?        uint32
             +--ro last-flooded-trigger?     enumeration
             +--ro advertised-level-areas* [level-area]
                   ...

]]></artwork></figure>

<t>The main elements under the interfaces container are:</t>

<t>threshold-type:</t>

<ul empty="true"><li>
  <t>An optional enumeration that specifies the type of thresholding mechanism used for flooding bandwidth updates for all TE interfaces on the device. Options include 'delta' (flooding on a change greater than a specified delta) or 'threshold-crossed' (flooding when bandwidth crosses a defined threshold).</t>
</li></ul>

<t>delta-percentage:</t>

<ul empty="true"><li>
  <t>An optional percentage value, used when threshold-type is 'delta', indicating the change in reservable bandwidth that triggers an IGP update for all TE interfaces.</t>
</li></ul>

<t>threshold-specification:</t>

<ul empty="true"><li>
  <t>An optional enumeration, used when threshold-type is 'threshold-crossed', to define whether a single set of 'mirrored-up-down' thresholds or separate 'separate-up-down' thresholds are used for increasing and decreasing bandwidth. This applies globally to all TE interfaces.</t>
</li></ul>

<t>up-thresholds:</t>

<ul empty="true"><li>
  <t>A list of percentage values, used with 'separate-up-down' thresholding, that define the points at which bandwidth updates are triggered when the reservable bandwidth is increasing across all TE interfaces.</t>
</li></ul>

<t>down-thresholds:</t>

<ul empty="true"><li>
  <t>A list of percentage values, used with 'separate-up-down' thresholding, that define the points at which bandwidth updates are triggered when the reservable bandwidth is decreasing across all TE interfaces.</t>
</li></ul>

<t>up-down-thresholds:</t>

<ul empty="true"><li>
  <t>A list of percentage values, used with 'mirrored-up-down' thresholding, that define the points at which bandwidth updates are triggered for both increasing and decreasing reservable bandwidth across all TE interfaces.</t>
</li></ul>

<t>interface:</t>

<ul empty="true"><li>
  <t>A list of individual TE interfaces configured on the device. Each entry represents a network interface enabled for Traffic Engineering and contains its specific attributes and state. A TE interface is identified by the 'name' leaf, which references an existing network interface on the device.</t>
</li></ul>

<ul empty="true"><li>
  <t>name:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A leaf that uniquely identifies the TE interface, referencing an existing network interface.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>te-metric:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>An optional leaf that holds the TE metric value associated with this specific interface, used during path computation.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>admin-group-type:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A choice node that allows configuring administrative groups for the interface using either direct values or named references.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>value-admin-groups:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A choice for defining administrative groups using direct bitmask values.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>named-admin-groups:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A list of named administrative groups applied to this TE interface, referencing globally defined named administrative groups.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>srlg-type:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A choice node that allows configuring SRLGs for the interface using either direct values or named references.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>value-srlgs:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>A list of direct SRLG values that this link is a part of.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>named-srlgs:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>A list of named SRLGs applied to this interface, referencing globally defined named SRLGs.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>threshold-type:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>An optional enumeration, similar to the global threshold-type, but specifically for this individual TE interface, allowing per-interface override of the global bandwidth flooding behavior.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>delta-percentage:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>An optional percentage value, specific to this interface, used when its threshold-type is 'delta'.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>threshold-specification:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>An optional enumeration, specific to this interface, used when its threshold-type is 'threshold-crossed'.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>up-thresholds:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A list of percentage values, specific to this interface, used with 'separate-up-down' thresholding for increasing bandwidth.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>down-thresholds:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A list of percentage values, specific to this interface, used with 'separate-up-down' thresholding for decreasing bandwidth.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>up-down-thresholds:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A list of percentage values, specific to this interface, used with 'mirrored-up-down' thresholding for both increasing and decreasing bandwidth.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>switching-capabilities:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A list of switching capabilities supported by this interface.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>switching-capability:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An identityref indicating a specific switching capability (e.g., Packet, Lambda, Fiber).</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>encoding:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An optional identityref indicating the LSP encoding type supported by this capability on the interface.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <t>te-advertisements-state:</t>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>A read-only container that provides operational state information related to how this TE interface's attributes are advertised.</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>flood-interval:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An optional leaf indicating the configured periodic flooding interval for this interface.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>last-flooded-time:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An optional leaf showing the time elapsed since the last advertisement flood for this interface.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>next-flooded-time:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An optional leaf showing the time remaining until the next scheduled advertisement flood for this interface.</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>last-flooded-trigger:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>An optional enumeration indicating the event that triggered the last advertisement flood (e.g., link-up, bandwidth-change, periodic-timer).</t>
    </li></ul>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <t>advertised-level-areas:</t>
  </li></ul>
</li></ul>

<ul empty="true"><li>
  <ul empty="true"><li>
    <ul empty="true"><li>
      <t>A list of IGP level-areas in which this TE interface's link state information is advertised.</t>
    </li></ul>
  </li></ul>
</li></ul>

</section>
</section>
<section anchor="tree-diagram-1"><name>Tree Diagram</name>

<t><xref target="fig-te-dev-tree"/> shows the YANG tree diagram of the TE device YANG module defined in
'ietf-te-device'.</t>

<figure title="TE Tunnel device model YANG tree diagram" anchor="fig-te-dev-tree"><artwork><![CDATA[
module: ietf-te-device

  augment /te:te:
    +--rw interfaces
       +--rw threshold-type?            enumeration
       +--rw delta-percentage?          rt-types:percentage
       +--rw threshold-specification?   enumeration
       +--rw up-thresholds*             rt-types:percentage
       +--rw down-thresholds*           rt-types:percentage
       +--rw up-down-thresholds*        rt-types:percentage
       +--rw interface* [name]
          +--rw name                                if:interface-ref
          +--rw te-metric?
          |       te-types:te-metric
          +--rw (admin-group-type)?
          |  +--:(value-admin-groups)
          |  |  +--rw (value-admin-group-type)?
          |  |     +--:(admin-groups)
          |  |     |  +--rw admin-group?
          |  |     |          te-types:admin-group
          |  |     +--:(extended-admin-groups)
          |  |              {te-types:extended-admin-groups}?
          |  |        +--rw extended-admin-group?
          |  |                te-types:extended-admin-group
          |  +--:(named-admin-groups)
          |     +--rw named-admin-groups* [named-admin-group]
          |             {te-types:extended-admin-groups,
          |              te-types:named-extended-admin-groups}?
          |        +--rw named-admin-group    leafref
          +--rw (srlg-type)?
          |  +--:(value-srlgs)
          |  |  +--rw values* [value]
          |  |     +--rw value    uint32
          |  +--:(named-srlgs)
          |     +--rw named-srlgs* [named-srlg]
          |             {te-types:named-srlg-groups}?
          |        +--rw named-srlg    leafref
          +--rw threshold-type?                     enumeration
          +--rw delta-percentage?
          |       rt-types:percentage
          +--rw threshold-specification?            enumeration
          +--rw up-thresholds*
          |       rt-types:percentage
          +--rw down-thresholds*
          |       rt-types:percentage
          +--rw up-down-thresholds*
          |       rt-types:percentage
          +--rw switching-capabilities* [switching-capability]
          |  +--rw switching-capability    identityref
          |  +--rw encoding?               identityref
          +--ro te-advertisements-state
             +--ro flood-interval?           uint32
             +--ro last-flooded-time?        uint32
             +--ro next-flooded-time?        uint32
             +--ro last-flooded-trigger?     enumeration
             +--ro advertised-level-areas* [level-area]
                +--ro level-area    uint32
  augment /te:te/te:globals:
    +--rw lsp-install-interval?        uint32
    +--rw lsp-cleanup-interval?        uint32
    +--rw lsp-invalidation-interval?   uint32
  augment /te:te/te:tunnels/te:tunnel:
    +--rw path-invalidation-action?    identityref
    +--rw lsp-install-interval?        uint32
    +--rw lsp-cleanup-interval?        uint32
    +--rw lsp-invalidation-interval?   uint32
  augment /te:te/te:lsps/te:lsp:
    +--ro lsp-timers
    |  +--ro uptime?            uint32
    |  +--ro time-to-install?   uint32
    |  +--ro time-to-destroy?   uint32
    +--ro downstream-info
    |  +--ro nhop?                 te-types:te-tp-id
    |  +--ro outgoing-interface?   if:interface-ref
    |  +--ro neighbor
    |  |  +--ro id?     te-gen-node-id
    |  |  +--ro type?   enumeration
    |  +--ro label?                rt-types:generalized-label
    +--ro upstream-info
       +--ro phop?       te-types:te-tp-id
       +--ro neighbor
       |  +--ro id?     te-gen-node-id
       |  +--ro type?   enumeration
       +--ro label?      rt-types:generalized-label

  rpcs:
    +---x link-state-update
       +---w input
          +---w (filter-type)
             +--:(match-all)
             |  +---w all          empty
             +--:(match-one-interface)
                +---w interface?   if:interface-ref

]]></artwork></figure>

</section>
<section anchor="yang-module-1"><name>YANG Module</name>

<t>The 'ietf-te-device' module imports the following modules:</t>

<t><list style="symbols">
  <t>ietf-interfaces defined in <xref target="RFC8343"/></t>
  <t>ietf-routing-types defined in <xref target="RFC8294"/></t>
  <t>ietf-te-types defined in <xref target="I-D.draft-ietf-teas-rfc8776-update"/></t>
  <t>ietf-te defined in this document</t>
</list></t>

<figure><artwork><![CDATA[
<CODE BEGINS> file "ietf-te-device@2026-02-28.yang"
module ietf-te-device {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-te-device";

  prefix te-dev;

  /* Import TE module */

  import ietf-te {
    prefix te;
    reference
      "RFCXXXX: A YANG Data Model for Traffic Engineering Tunnels,
       Label Switched Paths, and Interfaces.";
  }

  /* Import TE types */

  import ietf-te-types {
    prefix te-types;
    reference
      "draft-ietf-teas-rfc8776-update: Common YANG Data Types
       for Traffic Engineering.";
  }
  import ietf-interfaces {
    prefix if;
    reference
      "RFC8343: A YANG Data Model for Interface Management";
  }
  import ietf-routing-types {
    prefix rt-types;
    reference
      "RFC8294: Common YANG Data Types for the Routing Area";
  }

  organization
    "IETF Traffic Engineering Architecture and Signaling (TEAS)
     Working Group";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/teas/>
     WG List:  <mailto:teas@ietf.org>

     Editor:   Tarek Saad
               <mailto:tsaad.net@gmail.com>

     Editor:   Rakesh Gandhi
               <mailto:rgandhi@cisco.com>

     Editor:   Vishnu Pavan Beeram
               <mailto:vbeeram@juniper.net>

     Editor:   Himanshu Shah
               <mailto:hshah@ciena.com>

     Editor:   Xufeng Liu
               <mailto: xufeng.liu.ietf@gmail.com>

     Editor:   Igor Bryskin
               <mailto:i_bryskin@yahoo.com>";

  description
    "This module defines a data model for TE device configurations,
     state, and RPCs.

     Copyright (c) 2025 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
     for full legal notices.";

  // RFC Ed.: replace XXXX with actual RFC number and remove this
  // note.
  // RFC Ed.: update the date below with the date of RFC publication
  // and remove this note.

  revision 2026-02-28 {
    description
      "Initial revision for the TE device YANG module.";
    reference
      "RFCXXXX: A YANG Data Model for Traffic Engineering Tunnels
       and Interfaces";
  }

  grouping lsp-device-timers {
    description
      "Device TE LSP timers configs.";
    leaf lsp-install-interval {
      type uint32;
      units "seconds";
      description
        "TE LSP installation delay time.";
    }
    leaf lsp-cleanup-interval {
      type uint32;
      units "seconds";
      description
        "TE LSP cleanup delay time.";
    }
    leaf lsp-invalidation-interval {
      type uint32;
      units "seconds";
      description
        "TE LSP path invalidation before taking action delay time.";
    }
  }

  grouping te-igp-flooding-bandwidth-config {
    description
      "Configurable items for igp flooding bandwidth
       threshold configuration.";
    leaf threshold-type {
      type enumeration {
        enum delta {
          description
            "'delta' indicates that the local
             system should flood IGP updates when a
             change in reserved bandwidth >= the specified
             delta occurs on the interface.";
        }
        enum threshold-crossed {
          description
            "THRESHOLD-CROSSED indicates that
             the local system should trigger an update (and
             hence flood) the reserved bandwidth when the
             reserved bandwidth changes such that it crosses,
             or becomes equal to one of the threshold values.";
        }
      }
      description
        "The type of threshold that should be used to specify the
         values at which bandwidth is flooded. 'delta' indicates that
         the local system should flood IGP updates when a change in
         reserved bandwidth >= the specified delta occurs on the
         interface. Where 'threshold-crossed' is specified, the local
         system should trigger an update (and hence flood) the
         reserved bandwidth when the reserved bandwidth changes such
         that it crosses, or becomes equal to one of the threshold
         values.";
    }
    leaf delta-percentage {
      when "../threshold-type = 'delta'" {
        description
          "The percentage delta can only be specified when the
           threshold type is specified to be a percentage delta of
           the reserved bandwidth.";
      }
      type rt-types:percentage;
      description
        "The percentage of the maximum-reservable-bandwidth
         considered as the delta that results in an IGP update
         being flooded.";
    }
    leaf threshold-specification {
      when "../threshold-type = 'threshold-crossed'" {
        description
          "The selection of whether mirrored or separate threshold
           values are to be used requires user-specified thresholds
           to be set.";
      }
      type enumeration {
        enum mirrored-up-down {
          description
            "mirrored-up-down indicates that a single set of
             threshold values should be used for both increasing
             and decreasing bandwidth when determining whether
             to trigger updated bandwidth values to be flooded
             in the IGP TE extensions.";
        }
        enum separate-up-down {
          description
            "separate-up-down indicates that a separate
             threshold values should be used for the increasing
             and decreasing bandwidth when determining whether
             to trigger updated bandwidth values to be flooded
             in the IGP TE extensions.";
        }
      }
      description
        "This value specifies whether a single set of threshold
         values should be used for both increasing and decreasing
         bandwidth when determining whether to trigger updated
         bandwidth values to be flooded in the IGP TE extensions.
         'mirrored-up-down' indicates that a single value (or set of
         values) should be used for both increasing and decreasing
         values, where 'separate-up-down' specifies that the
         increasing and decreasing values will be separately
         specified.";
    }
    leaf-list up-thresholds {
      when "../threshold-type = 'threshold-crossed'"
         + "and ../threshold-specification = 'separate-up-down'" {
        description
          "A list of up-thresholds can only be specified when the
           bandwidth update is triggered based on crossing a
           threshold and separate up and down thresholds are
           required.";
      }
      type rt-types:percentage;
      description
        "The thresholds (expressed as a percentage of the maximum
         reservable bandwidth) at which bandwidth updates are to be
         triggered when the bandwidth is increasing.";
    }
    leaf-list down-thresholds {
      when "../threshold-type = 'threshold-crossed'"
         + "and ../threshold-specification = 'separate-up-down'" {
        description
          "A list of down-thresholds can only be specified when the
           bandwidth update is triggered based on crossing a
           threshold and separate up and down thresholds are
           required.";
      }
      type rt-types:percentage;
      description
        "The thresholds (expressed as a percentage of the maximum
         reservable bandwidth) at which bandwidth updates are to be
         triggered when the bandwidth is decreasing.";
    }
    leaf-list up-down-thresholds {
      when "../threshold-type = 'threshold-crossed'"
         + "and ../threshold-specification = 'mirrored-up-down'" {
        description
          "A list of thresholds corresponding to both increasing
           and decreasing bandwidths can be specified only when an
           update is triggered based on crossing a threshold, and
           the same up and down thresholds are required.";
      }
      type rt-types:percentage;
      description
        "The thresholds (expressed as a percentage of the maximum
         reservable bandwidth of the interface) at which bandwidth
         updates are flooded - used both when the bandwidth is
         increasing and decreasing.";
    }
  }

  /**
   * TE device augmentations
   */
  augment "/te:te" {
    description
      "TE global container.";
    /* TE Interface Configuration Data */
    container interfaces {
      description
        "Configuration data model for TE interfaces.";
      uses te-igp-flooding-bandwidth-config;
      list interface {
        key "name";
        description
          "The list of interfaces enabled for TE.";
        leaf name {
          type if:interface-ref;
          description
            "The reference to interface enabled for TE.";
        }
        /* TE interface parameters */
        leaf te-metric {
          type te-types:te-metric;
          description
            "TE interface metric.";
        }
        choice admin-group-type {
          description
            "TE interface administrative groups
             representation type.";
          case value-admin-groups {
            choice value-admin-group-type {
              description
                "The type of admin-groups.";
              case admin-groups {
                description
                  "Administrative group/Resource
                   class.";
                leaf admin-group {
                  type te-types:admin-group;
                  description
                    "TE interface administrative group.";
                }
              }
              case extended-admin-groups {
                if-feature "te-types:extended-admin-groups";
                description
                  "Extended administrative group/Resource
                   class.";
                leaf extended-admin-group {
                  type te-types:extended-admin-group;
                  description
                    "TE interface extended administrative group.";
                }
              }
            }
          }
          case named-admin-groups {
            list named-admin-groups {
              if-feature "te-types:extended-admin-groups";
              if-feature "te-types:named-extended-admin-groups";
              key "named-admin-group";
              description
                "A list of named admin-group entries.";
              leaf named-admin-group {
                type leafref {
                  path "../../../../te:globals/"
                     + "te:named-admin-groups/te:named-admin-group/"
                     + "te:name";
                }
                description
                  "A named admin-group entry.";
              }
            }
          }
        }
        choice srlg-type {
          description
            "Choice of SRLG configuration.";
          case value-srlgs {
            list values {
              key "value";
              description
                "List of SRLG values that
                 this link is part of.";
              leaf value {
                type uint32 {
                  range "0..4294967295";
                }
                description
                  "Value of the SRLG";
              }
            }
          }
          case named-srlgs {
            list named-srlgs {
              if-feature "te-types:named-srlg-groups";
              key "named-srlg";
              description
                "A list of named SRLG entries.";
              leaf named-srlg {
                type leafref {
                  path "../../../../te:globals/"
                     + "te:named-srlgs/te:named-srlg/te:name";
                }
                description
                  "A named SRLG entry.";
              }
            }
          }
        }
        uses te-igp-flooding-bandwidth-config;
        list switching-capabilities {
          key "switching-capability";
          description
            "List of interface capabilities for this interface.";
          leaf switching-capability {
            type identityref {
              base te-types:switching-capabilities;
            }
            description
              "Switching Capability for this interface.";
          }
          leaf encoding {
            type identityref {
              base te-types:lsp-encoding-types;
            }
            description
              "Encoding supported by this interface.";
          }
        }
        container te-advertisements-state {
          config false;
          description
            "TE interface advertisements state container.";
          leaf flood-interval {
            type uint32;
            description
              "The periodic flooding interval.";
          }
          leaf last-flooded-time {
            type uint32;
            units "seconds";
            description
              "Time elapsed since last flooding in seconds.";
          }
          leaf next-flooded-time {
            type uint32;
            units "seconds";
            description
              "Time remained for next flooding in seconds.";
          }
          leaf last-flooded-trigger {
            type enumeration {
              enum link-up {
                description
                  "Link-up flooding trigger.";
              }
              enum link-down {
                description
                  "Link-down flooding trigger.";
              }
              enum threshold-up {
                description
                  "Bandwidth reservation up threshold.";
              }
              enum threshold-down {
                description
                  "Bandwidth reservation down threshold.";
              }
              enum bandwidth-change {
                description
                  "Bandwidth capacity change.";
              }
              enum user-initiated {
                description
                  "Initiated by user.";
              }
              enum srlg-change {
                description
                  "SRLG property change.";
              }
              enum periodic-timer {
                description
                  "Periodic timer expired.";
              }
            }
            default "periodic-timer";
            description
              "Trigger for the last flood.";
          }
          list advertised-level-areas {
            key "level-area";
            description
              "List of level-areas that the TE interface is
               advertised in.";
            leaf level-area {
              type uint32;
              description
                "The IGP area or level where the TE interface link
                 state is advertised in.";
            }
          }
        }
      }
    }
  }

  /* TE globals device augmentation */

  augment "/te:te/te:globals" {
    description
      "Global TE device specific configuration parameters.";
    uses lsp-device-timers;
  }

  /* TE tunnels device configuration augmentation */

  augment "/te:te/te:tunnels/te:tunnel" {
    description
      "Tunnel device dependent augmentation.";
    leaf path-invalidation-action {
      type identityref {
        base te-types:path-invalidation-action-type;
      }
      description
        "Tunnel path invalidation action.";
    }
    uses lsp-device-timers;
  }

  /* TE LSPs device state augmentation */

  augment "/te:te/te:lsps/te:lsp" {
    description
      "TE LSP device dependent augmentation.";
    container lsp-timers {
      when "../te:origin-type = 'ingress'" {
        description
          "Applicable to ingress LSPs only.";
      }
      description
        "Ingress LSP timers.";
      leaf uptime {
        type uint32;
        units "seconds";
        description
          "The LSP uptime.";
      }
      leaf time-to-install {
        type uint32;
        units "seconds";
        description
          "The time remaining for a new LSP to be instantiated
           in forwarding to carry traffic.";
      }
      leaf time-to-destroy {
        type uint32;
        units "seconds";
        description
          "The time remaining for an existing LSP to be torn down.";
      }
    }
    container downstream-info {
      when "../te:origin-type != 'egress'" {
        description
          "Downstream information of the LSP.";
      }
      description
        "Downstream information.";
      leaf nhop {
        type te-types:te-tp-id;
        description
          "Downstream next-hop address.";
      }
      leaf outgoing-interface {
        type if:interface-ref;
        description
          "Downstream interface.";
      }
      container neighbor {
        uses te-types:te-generic-node-id;
        description
          "Downstream neighbor address.";
      }
      leaf label {
        type rt-types:generalized-label;
        description
          "Downstream label.";
      }
    }
    container upstream-info {
      when "../te:origin-type != 'ingress'" {
        description
          "Upstream information of the LSP.";
      }
      description
        "Upstream information.";
      leaf phop {
        type te-types:te-tp-id;
        description
          "Upstream next-hop or previous-hop address.";
      }
      container neighbor {
        uses te-types:te-generic-node-id;
        description
          "Upstream neighbor address.";
      }
      leaf label {
        type rt-types:generalized-label;
        description
          "Upstream label.";
      }
    }
  }

  /* TE interfaces RPCs/execution Data */

  rpc link-state-update {
    description
      "Triggers a link state update for the specific interface.";
    input {
      choice filter-type {
        mandatory true;
        description
          "Filter choice.";
        case match-all {
          leaf all {
            type empty;
            mandatory true;
            description
              "Match all TE interfaces.";
          }
        }
        case match-one-interface {
          leaf interface {
            type if:interface-ref;
            description
              "Match a specific TE interface.";
          }
        }
      }
    }
  }
}
<CODE ENDS>
]]></artwork></figure>

</section>
</section>
<section anchor="notifications"><name>Notifications</name>

<t>Notifications are a key component of any topology data model.</t>

<t><xref target="RFC8639"/> and <xref target="RFC8641"/> define a subscription mechanism and a push
mechanism for YANG datastores.  These mechanisms currently allow the
user to:</t>

<t><list style="symbols">
  <t>Subscribe to notifications on a per-client basis.</t>
  <t>Specify subtree filters or XML Path Language (XPath) filters so
that only contents of interest will be sent.</t>
  <t>Specify either periodic or on-demand notifications.</t>
</list></t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document registers the following URIs in the IETF XML registry
<xref target="RFC3688"/>.
Following the format in <xref target="RFC3688"/>, the following registrations are
requested to be made.</t>

<figure><artwork><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-te
   Registrant Contact:  The IESG.
   XML: N/A, the requested URI is an XML namespace.

   URI: urn:ietf:params:xml:ns:yang:ietf-te-device
   Registrant Contact:  The IESG.
   XML: N/A, the requested URI is an XML namespace.
]]></artwork></figure>

<t>This document registers two YANG modules in the YANG Module Names
registry <xref target="RFC6020"/>.</t>

<figure><artwork><![CDATA[
   Name:       ietf-te
   Namespace:  urn:ietf:params:xml:ns:yang:ietf-te
   Prefix:     te
   Reference:  RFCXXXX
   Maintained by IANA: N

   Name:       ietf-te-device
   Namespace:  urn:ietf:params:xml:ns:yang:ietf-te-device
   Prefix:     te-device
   Reference:  RFCXXXX
   Maintained by IANA: N
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The YANG module specified in this document defines a schema for data that is
designed to be accessed via YANG-based management protocols, such as
NETCONF <xref target="RFC6241"/> and RESTCONF <xref target="RFC8040"/>. These YANG-based management
protocols (1) have to use a secure transport layer
(e.g., SSH <xref target="RFC6242"/>, TLS <xref target="RFC8446"/>, and QUIC <xref target="RFC9000"/>) and (2) have
to use mutual authentication.</t>

<t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/> provides the
means to restrict access for particular NETCONF or RESTCONF users to a
preconfigured subset of all available NETCONF or RESTCONF protocol operations
and content.</t>

<t>There are a number of data nodes defined in this YANG module that are
writable/creatable/deletable (i.e., config true, which is the default). These
data nodes may be considered sensitive or vulnerable in some network
environments. Write operations (e.g., edit-config) to these data nodes without
proper protection can have a negative effect on network operations. These are
the subtrees and data nodes and their sensitivity/vulnerability:</t>

<t>"/te/globals":  This module specifies the global TE configurations on a device.
Unauthorized access to this container could cause the device to ignore packets
it should receive and process.</t>

<t>"/te/tunnels":  This list specifies the configuration and state of TE Tunnels
present on the device or controller.  Unauthorized access to this list could
cause the device to ignore packets it should receive and process. An attacker
may also use state to derive information about the network topology,
and subsequently orchestrate further attacks.</t>

<t>"/te/interfaces":  This list specifies the configuration and state TE interfaces
on a device. Unauthorized access to this list could cause the device to ignore packets it
should receive and process.</t>

<t>Some of the readable data nodes in this YANG module may be considered sensitive
or vulnerable in some network environments. It is thus important to control
read access (e.g., via get, get-config, or notification) to these data nodes.
These are the subtrees and data nodes and their sensitivity/vulnerability:</t>

<t>"/te/lsps": this list contains information state about established LSPs in the network.
An attacker can use this information to derive information about the network topology,
and subsequently orchestrate further attacks.</t>

<t>Some of the RPC operations in this YANG module may be considered sensitive or
vulnerable in some network environments. It is thus important to control access
to these operations. These are the operations and their
sensitivity/vulnerability:</t>

<t>"/te/tunnels-actions": using this RPC, an attacker can modify existing paths that
may be carrying live traffic, and hence result in interruption to services
carried over the network.</t>

<t>"/te/tunnels-path-compute": using this RPC, an attacker can retrieve sensitive
information about the network provider which can be used to orchestrate further
attacks.</t>

<t>The YANG module defines a set of identities, types, and groupings. These nodes
are intended to be reused by other YANG modules. The module by itself does not
expose any data nodes that are writable, data nodes that contain read-only
state, or RPCs.  As such, there are no additional security issues related to
the YANG module that need to be considered.</t>

<t>Modules that use the groupings that are defined in this document should
identify the corresponding security considerations. For example, reusing some
of these groupings will expose privacy-related information (e.g.,
'path-forward-properties').</t>

</section>
<section anchor="acknowledgement"><name>Acknowledgement</name>

<t>The authors would like to thank the  members of the multivendor YANG design
team who are involved in the definition of this model.</t>

<t>The authors would like to thank Tom Petch and Adrian Farrel for reviewing and
providing useful feedback about the document. The authors would also like to
thank Loa Andersson, Lou Berger, Sergio Belotti, Italo Busi, Carlo Perocchio,
Francesco Lazzeri, Aihua Guo, Dhruv Dhody, and Raqib Jones for providing
feedback on this document.</t>

</section>
<section anchor="contributors"><name>Contributors</name>

<figure><artwork><![CDATA[
   Oscar Gonzalez de Dios
   Telefonica

   Email: oscar.gonzalezdedios@telefonica.com

   Himanshu Shah
   Ciena

   Email: hshah@ciena.com


   Xia Chen
   Huawei Technologies

   Email: jescia.chenxia@huawei.com


   Bin Wen
   Comcast

   Email: Bin_Wen@cable.comcast.com

]]></artwork></figure>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

<reference anchor="ITU_G.808.1" >
  <front>
    <title>Generic protection switching - Linear trail and subnetwork protection</title>
    <author >
      <organization>ITU-T Recommendation G.808.1</organization>
    </author>
    <date year="2014" month="May"/>
  </front>
  <seriesInfo name="https://www.itu.int/rec/T-REC-G.808.1-201405-I" value=""/>
</reference>


<reference anchor="RFC9256">
  <front>
    <title>Segment Routing Policy Architecture</title>
    <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
    <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
    <author fullname="D. Voyer" initials="D." surname="Voyer"/>
    <author fullname="A. Bogdanov" initials="A." surname="Bogdanov"/>
    <author fullname="P. Mattes" initials="P." surname="Mattes"/>
    <date month="July" year="2022"/>
    <abstract>
      <t>Segment Routing (SR) allows a node to steer a packet flow along any path. Intermediate per-path states are eliminated thanks to source routing. SR Policy is an ordered list of segments (i.e., instructions) that represent a source-routed policy. Packet flows are steered into an SR Policy on a node where it is instantiated called a headend node. The packets steered into an SR Policy carry an ordered list of segments associated with that SR Policy.</t>
      <t>This document updates RFC 8402 as it details the concepts of SR Policy and steering into an SR Policy.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9256"/>
  <seriesInfo name="DOI" value="10.17487/RFC9256"/>
</reference>
<reference anchor="RFC3209">
  <front>
    <title>RSVP-TE: Extensions to RSVP for LSP Tunnels</title>
    <author fullname="D. Awduche" initials="D." surname="Awduche"/>
    <author fullname="L. Berger" initials="L." surname="Berger"/>
    <author fullname="D. Gan" initials="D." surname="Gan"/>
    <author fullname="T. Li" initials="T." surname="Li"/>
    <author fullname="V. Srinivasan" initials="V." surname="Srinivasan"/>
    <author fullname="G. Swallow" initials="G." surname="Swallow"/>
    <date month="December" year="2001"/>
    <abstract>
      <t>This document describes the use of RSVP (Resource Reservation Protocol), including all the necessary extensions, to establish label-switched paths (LSPs) in MPLS (Multi-Protocol Label Switching). Since the flow along an LSP is completely identified by the label applied at the ingress node of the path, these paths may be treated as tunnels. A key application of LSP tunnels is traffic engineering with MPLS as specified in RFC 2702. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3209"/>
  <seriesInfo name="DOI" value="10.17487/RFC3209"/>
</reference>
<reference anchor="RFC3473">
  <front>
    <title>Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) Extensions</title>
    <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
    <date month="January" year="2003"/>
    <abstract>
      <t>This document describes extensions to Multi-Protocol Label Switching (MPLS) Resource ReserVation Protocol - Traffic Engineering (RSVP-TE) signaling required to support Generalized MPLS. Generalized MPLS extends the MPLS control plane to encompass time-division (e.g., Synchronous Optical Network and Synchronous Digital Hierarchy, SONET/SDH), wavelength (optical lambdas) and spatial switching (e.g., incoming port or fiber to outgoing port or fiber). This document presents a RSVP-TE specific description of the extensions. A generic functional description can be found in separate documents. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3473"/>
  <seriesInfo name="DOI" value="10.17487/RFC3473"/>
</reference>
<reference anchor="RFC7950">
  <front>
    <title>The YANG 1.1 Data Modeling Language</title>
    <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
    <date month="August" year="2016"/>
    <abstract>
      <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7950"/>
  <seriesInfo name="DOI" value="10.17487/RFC7950"/>
</reference>
<reference anchor="RFC9911">
  <front>
    <title>Common YANG Data Types</title>
    <author fullname="J. Schönwälder" initials="J." role="editor" surname="Schönwälder"/>
    <date month="December" year="2025"/>
    <abstract>
      <t>This document defines a collection of common data types to be used with the YANG data modeling language. It includes several new type definitions and obsoletes RFC 6991.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9911"/>
  <seriesInfo name="DOI" value="10.17487/RFC9911"/>
</reference>
<reference anchor="RFC8294">
  <front>
    <title>Common YANG Data Types for the Routing Area</title>
    <author fullname="X. Liu" initials="X." surname="Liu"/>
    <author fullname="Y. Qu" initials="Y." surname="Qu"/>
    <author fullname="A. Lindem" initials="A." surname="Lindem"/>
    <author fullname="C. Hopps" initials="C." surname="Hopps"/>
    <author fullname="L. Berger" initials="L." surname="Berger"/>
    <date month="December" year="2017"/>
    <abstract>
      <t>This document defines a collection of common data types using the YANG data modeling language. These derived common types are designed to be imported by other modules defined in the routing area.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8294"/>
  <seriesInfo name="DOI" value="10.17487/RFC8294"/>
</reference>

<reference anchor="I-D.draft-ietf-teas-rfc8776-update">
   <front>
      <title>Common YANG Data Types for Traffic Engineering</title>
      <author fullname="Italo Busi" initials="I." surname="Busi">
         <organization>Huawei</organization>
      </author>
      <author fullname="Aihua Guo" initials="A." surname="Guo">
         <organization>Futurewei Technologies</organization>
      </author>
      <author fullname="Xufeng Liu" initials="X." surname="Liu">
         <organization>Alef Edge</organization>
      </author>
      <author fullname="Tarek Saad" initials="T." surname="Saad">
         <organization>Cisco Systems Inc.</organization>
      </author>
      <author fullname="Igor Bryskin" initials="I." surname="Bryskin">
         <organization>Individual</organization>
      </author>
      <date day="18" month="February" year="2026"/>
      <abstract>
	 <t>   This document defines a collection of common data types, identities,
   and groupings in YANG data modeling language.  These derived common
   data types, identities and groupings are intended to be imported by
   other modules, e.g., those which model the Traffic Engineering (TE)
   configuration and state capabilities.

   This document obsoletes RFC 8776.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-teas-rfc8776-update-22"/>
   
</reference>
<reference anchor="RFC8340">
  <front>
    <title>YANG Tree Diagrams</title>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
    <date month="March" year="2018"/>
    <abstract>
      <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="215"/>
  <seriesInfo name="RFC" value="8340"/>
  <seriesInfo name="DOI" value="10.17487/RFC8340"/>
</reference>
<reference anchor="RFC8343">
  <front>
    <title>A YANG Data Model for Interface Management</title>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <date month="March" year="2018"/>
    <abstract>
      <t>This document defines a YANG data model for the management of network interfaces. It is expected that interface-type-specific data models augment the generic interfaces data model defined in this document. The data model includes definitions for configuration and system state (status information and counters for the collection of statistics).</t>
      <t>The YANG data model in this document conforms to the Network Management Datastore Architecture (NMDA) defined in RFC 8342.</t>
      <t>This document obsoletes RFC 7223.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8343"/>
  <seriesInfo name="DOI" value="10.17487/RFC8343"/>
</reference>
<reference anchor="RFC9012">
  <front>
    <title>The BGP Tunnel Encapsulation Attribute</title>
    <author fullname="K. Patel" initials="K." surname="Patel"/>
    <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
    <author fullname="S. Sangli" initials="S." surname="Sangli"/>
    <author fullname="J. Scudder" initials="J." surname="Scudder"/>
    <date month="April" year="2021"/>
    <abstract>
      <t>This document defines a BGP path attribute known as the "Tunnel Encapsulation attribute", which can be used with BGP UPDATEs of various Subsequent Address Family Identifiers (SAFIs) to provide information needed to create tunnels and their corresponding encapsulation headers. It provides encodings for a number of tunnel types, along with procedures for choosing between alternate tunnels and routing packets into tunnels.</t>
      <t>This document obsoletes RFC 5512, which provided an earlier definition of the Tunnel Encapsulation attribute. RFC 5512 was never deployed in production. Since RFC 5566 relies on RFC 5512, it is likewise obsoleted. This document updates RFC 5640 by indicating that the Load-Balancing Block sub-TLV may be included in any Tunnel Encapsulation attribute where load balancing is desired.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9012"/>
  <seriesInfo name="DOI" value="10.17487/RFC9012"/>
</reference>
<reference anchor="RFC8345">
  <front>
    <title>A YANG Data Model for Network Topologies</title>
    <author fullname="A. Clemm" initials="A." surname="Clemm"/>
    <author fullname="J. Medved" initials="J." surname="Medved"/>
    <author fullname="R. Varga" initials="R." surname="Varga"/>
    <author fullname="N. Bahadur" initials="N." surname="Bahadur"/>
    <author fullname="H. Ananthakrishnan" initials="H." surname="Ananthakrishnan"/>
    <author fullname="X. Liu" initials="X." surname="Liu"/>
    <date month="March" year="2018"/>
    <abstract>
      <t>This document defines an abstract (generic, or base) YANG data model for network/service topologies and inventories. The data model serves as a base model that is augmented with technology-specific details in other, more specific topology and inventory data models.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8345"/>
  <seriesInfo name="DOI" value="10.17487/RFC8345"/>
</reference>
<reference anchor="RFC8795">
  <front>
    <title>YANG Data Model for Traffic Engineering (TE) Topologies</title>
    <author fullname="X. Liu" initials="X." surname="Liu"/>
    <author fullname="I. Bryskin" initials="I." surname="Bryskin"/>
    <author fullname="V. Beeram" initials="V." surname="Beeram"/>
    <author fullname="T. Saad" initials="T." surname="Saad"/>
    <author fullname="H. Shah" initials="H." surname="Shah"/>
    <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios"/>
    <date month="August" year="2020"/>
    <abstract>
      <t>This document defines a YANG data model for representing, retrieving, and manipulating Traffic Engineering (TE) Topologies. The model serves as a base model that other technology-specific TE topology models can augment.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8795"/>
  <seriesInfo name="DOI" value="10.17487/RFC8795"/>
</reference>
<reference anchor="RFC4206">
  <front>
    <title>Label Switched Paths (LSP) Hierarchy with Generalized Multi-Protocol Label Switching (GMPLS) Traffic Engineering (TE)</title>
    <author fullname="K. Kompella" initials="K." surname="Kompella"/>
    <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
    <date month="October" year="2005"/>
    <abstract>
      <t>To improve scalability of Generalized Multi-Protocol Label Switching (GMPLS) it may be useful to aggregate Label Switched Paths (LSPs) by creating a hierarchy of such LSPs. A way to create such a hierarchy is by (a) a Label Switching Router (LSR) creating a Traffic Engineering Label Switched Path (TE LSP), (b) the LSR forming a forwarding adjacency (FA) out of that LSP (by advertising this LSP as a Traffic Engineering (TE) link into the same instance of ISIS/OSPF as the one that was used to create the LSP), (c) allowing other LSRs to use FAs for their path computation, and (d) nesting of LSPs originated by other LSRs into that LSP (by using the label stack construct).</t>
      <t>This document describes the mechanisms to accomplish this. [PROPOSED STANDARD]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4206"/>
  <seriesInfo name="DOI" value="10.17487/RFC4206"/>
</reference>
<reference anchor="RFC4872">
  <front>
    <title>RSVP-TE Extensions in Support of End-to-End Generalized Multi-Protocol Label Switching (GMPLS) Recovery</title>
    <author fullname="J.P. Lang" initials="J.P." role="editor" surname="Lang"/>
    <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
    <author fullname="D. Papadimitriou" initials="D." role="editor" surname="Papadimitriou"/>
    <date month="May" year="2007"/>
    <abstract>
      <t>This document describes protocol-specific procedures and extensions for Generalized Multi-Protocol Label Switching (GMPLS) Resource ReSerVation Protocol - Traffic Engineering (RSVP-TE) signaling to support end-to-end Label Switched Path (LSP) recovery that denotes protection and restoration. A generic functional description of GMPLS recovery can be found in a companion document, RFC 4426. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4872"/>
  <seriesInfo name="DOI" value="10.17487/RFC4872"/>
</reference>
<reference anchor="RFC6780">
  <front>
    <title>RSVP ASSOCIATION Object Extensions</title>
    <author fullname="L. Berger" initials="L." surname="Berger"/>
    <author fullname="F. Le Faucheur" initials="F." surname="Le Faucheur"/>
    <author fullname="A. Narayanan" initials="A." surname="Narayanan"/>
    <date month="October" year="2012"/>
    <abstract>
      <t>The RSVP ASSOCIATION object was defined in the context of GMPLS-controlled Label Switched Paths (LSPs). In this context, the object is used to associate recovery LSPs with the LSP they are protecting. This object also has broader applicability as a mechanism to associate RSVP state. This document defines how the ASSOCIATION object can be more generally applied. This document also defines Extended ASSOCIATION objects that, in particular, can be used in the context of the MPLS Transport Profile (MPLS-TP). This document updates RFC 2205, RFC 3209, and RFC 3473. It also generalizes the definition of the Association ID field defined in RFC 4872. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6780"/>
  <seriesInfo name="DOI" value="10.17487/RFC6780"/>
</reference>
<reference anchor="RFC7471">
  <front>
    <title>OSPF Traffic Engineering (TE) Metric Extensions</title>
    <author fullname="S. Giacalone" initials="S." surname="Giacalone"/>
    <author fullname="D. Ward" initials="D." surname="Ward"/>
    <author fullname="J. Drake" initials="J." surname="Drake"/>
    <author fullname="A. Atlas" initials="A." surname="Atlas"/>
    <author fullname="S. Previdi" initials="S." surname="Previdi"/>
    <date month="March" year="2015"/>
    <abstract>
      <t>In certain networks, such as, but not limited to, financial information networks (e.g., stock market data providers), network performance information (e.g., link propagation delay) is becoming critical to data path selection.</t>
      <t>This document describes common extensions to RFC 3630 "Traffic Engineering (TE) Extensions to OSPF Version 2" and RFC 5329 "Traffic Engineering Extensions to OSPF Version 3" to enable network performance information to be distributed in a scalable fashion. The information distributed using OSPF TE Metric Extensions can then be used to make path selection decisions based on network performance.</t>
      <t>Note that this document only covers the mechanisms by which network performance information is distributed. The mechanisms for measuring network performance information or using that information, once distributed, are outside the scope of this document.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7471"/>
  <seriesInfo name="DOI" value="10.17487/RFC7471"/>
</reference>
<reference anchor="RFC8570">
  <front>
    <title>IS-IS Traffic Engineering (TE) Metric Extensions</title>
    <author fullname="L. Ginsberg" initials="L." role="editor" surname="Ginsberg"/>
    <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
    <author fullname="S. Giacalone" initials="S." surname="Giacalone"/>
    <author fullname="D. Ward" initials="D." surname="Ward"/>
    <author fullname="J. Drake" initials="J." surname="Drake"/>
    <author fullname="Q. Wu" initials="Q." surname="Wu"/>
    <date month="March" year="2019"/>
    <abstract>
      <t>In certain networks, such as, but not limited to, financial information networks (e.g., stock market data providers), network-performance criteria (e.g., latency) are becoming as critical to data-path selection as other metrics.</t>
      <t>This document describes extensions to IS-IS Traffic Engineering Extensions (RFC 5305). These extensions provide a way to distribute and collect network-performance information in a scalable fashion. The information distributed using IS-IS TE Metric Extensions can then be used to make path-selection decisions based on network performance.</t>
      <t>Note that this document only covers the mechanisms with which network-performance information is distributed. The mechanisms for measuring network performance or acting on that information, once distributed, are outside the scope of this document.</t>
      <t>This document obsoletes RFC 7810.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8570"/>
  <seriesInfo name="DOI" value="10.17487/RFC8570"/>
</reference>
<reference anchor="RFC8232">
  <front>
    <title>Optimizations of Label Switched Path State Synchronization Procedures for a Stateful PCE</title>
    <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
    <author fullname="I. Minei" initials="I." surname="Minei"/>
    <author fullname="J. Medved" initials="J." surname="Medved"/>
    <author fullname="R. Varga" initials="R." surname="Varga"/>
    <author fullname="X. Zhang" initials="X." surname="Zhang"/>
    <author fullname="D. Dhody" initials="D." surname="Dhody"/>
    <date month="September" year="2017"/>
    <abstract>
      <t>A stateful Path Computation Element (PCE) has access to not only the information disseminated by the network's Interior Gateway Protocol (IGP) but also the set of active paths and their reserved resources for its computation. The additional Label Switched Path (LSP) state information allows the PCE to compute constrained paths while considering individual LSPs and their interactions. This requires a State Synchronization mechanism between the PCE and the network, the PCE and Path Computation Clients (PCCs), and cooperating PCEs. The basic mechanism for State Synchronization is part of the stateful PCE specification. This document presents motivations for optimizations to the base State Synchronization procedure and specifies the required Path Computation Element Communication Protocol (PCEP) extensions.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8232"/>
  <seriesInfo name="DOI" value="10.17487/RFC8232"/>
</reference>
<reference anchor="RFC7271">
  <front>
    <title>MPLS Transport Profile (MPLS-TP) Linear Protection to Match the Operational Expectations of Synchronous Digital Hierarchy, Optical Transport Network, and Ethernet Transport Network Operators</title>
    <author fullname="J. Ryoo" initials="J." role="editor" surname="Ryoo"/>
    <author fullname="E. Gray" initials="E." role="editor" surname="Gray"/>
    <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
    <author fullname="A. D'Alessandro" initials="A." surname="D'Alessandro"/>
    <author fullname="T. Cheung" initials="T." surname="Cheung"/>
    <author fullname="E. Osborne" initials="E." surname="Osborne"/>
    <date month="June" year="2014"/>
    <abstract>
      <t>This document describes alternate mechanisms to perform some of the functions of MPLS Transport Profile (MPLS-TP) linear protection defined in RFC 6378, and also defines additional mechanisms. The purpose of these alternate and additional mechanisms is to provide operator control and experience that more closely models the behavior of linear protection seen in other transport networks.</t>
      <t>This document also introduces capabilities and modes for linear protection. A capability is an individual behavior, and a mode is a particular combination of capabilities. Two modes are defined in this document: Protection State Coordination (PSC) mode and Automatic Protection Switching (APS) mode.</t>
      <t>This document describes the behavior of the PSC protocol including priority logic and state machine when all the capabilities associated with the APS mode are enabled.</t>
      <t>This document updates RFC 6378 in that the capability advertisement method defined here is an addition to that document.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7271"/>
  <seriesInfo name="DOI" value="10.17487/RFC7271"/>
</reference>
<reference anchor="RFC8234">
  <front>
    <title>Updates to MPLS Transport Profile (MPLS-TP) Linear Protection in Automatic Protection Switching (APS) Mode</title>
    <author fullname="J. Ryoo" initials="J." surname="Ryoo"/>
    <author fullname="T. Cheung" initials="T." surname="Cheung"/>
    <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
    <author fullname="I. Busi" initials="I." surname="Busi"/>
    <author fullname="G. Wen" initials="G." surname="Wen"/>
    <date month="August" year="2017"/>
    <abstract>
      <t>This document contains updates to MPLS Transport Profile (MPLS-TP) linear protection in Automatic Protection Switching (APS) mode defined in RFC 7271. The updates provide rules related to the initialization of the Protection State Coordination (PSC) Control Logic (in which the state machine resides) when operating in APS mode and clarify the operation related to state transition table lookup.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8234"/>
  <seriesInfo name="DOI" value="10.17487/RFC8234"/>
</reference>
<reference anchor="RFC4655">
  <front>
    <title>A Path Computation Element (PCE)-Based Architecture</title>
    <author fullname="A. Farrel" initials="A." surname="Farrel"/>
    <author fullname="J.-P. Vasseur" initials="J.-P." surname="Vasseur"/>
    <author fullname="J. Ash" initials="J." surname="Ash"/>
    <date month="August" year="2006"/>
    <abstract>
      <t>Constraint-based path computation is a fundamental building block for traffic engineering systems such as Multiprotocol Label Switching (MPLS) and Generalized Multiprotocol Label Switching (GMPLS) networks. Path computation in large, multi-domain, multi-region, or multi-layer networks is complex and may require special computational components and cooperation between the different network domains.</t>
      <t>This document specifies the architecture for a Path Computation Element (PCE)-based model to address this problem space. This document does not attempt to provide a detailed description of all the architectural components, but rather it describes a set of building blocks for the PCE architecture from which solutions may be constructed. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4655"/>
  <seriesInfo name="DOI" value="10.17487/RFC4655"/>
</reference>
<reference anchor="RFC8231">
  <front>
    <title>Path Computation Element Communication Protocol (PCEP) Extensions for Stateful PCE</title>
    <author fullname="E. Crabbe" initials="E." surname="Crabbe"/>
    <author fullname="I. Minei" initials="I." surname="Minei"/>
    <author fullname="J. Medved" initials="J." surname="Medved"/>
    <author fullname="R. Varga" initials="R." surname="Varga"/>
    <date month="September" year="2017"/>
    <abstract>
      <t>The Path Computation Element Communication Protocol (PCEP) provides mechanisms for Path Computation Elements (PCEs) to perform path computations in response to Path Computation Client (PCC) requests.</t>
      <t>Although PCEP explicitly makes no assumptions regarding the information available to the PCE, it also makes no provisions for PCE control of timing and sequence of path computations within and across PCEP sessions. This document describes a set of extensions to PCEP to enable stateful control of MPLS-TE and GMPLS Label Switched Paths (LSPs) via PCEP.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8231"/>
  <seriesInfo name="DOI" value="10.17487/RFC8231"/>
</reference>
<reference anchor="RFC7308">
  <front>
    <title>Extended Administrative Groups in MPLS Traffic Engineering (MPLS-TE)</title>
    <author fullname="E. Osborne" initials="E." surname="Osborne"/>
    <date month="July" year="2014"/>
    <abstract>
      <t>MPLS Traffic Engineering (MPLS-TE) advertises 32 administrative groups (commonly referred to as "colors" or "link colors") using the Administrative Group sub-TLV. This is defined for OSPFv2 (RFC 3630), OSPFv3 (RFC 5329) and IS-IS (RFC 5305).</t>
      <t>This document adds a sub-TLV to the IGP TE extensions, "Extended Administrative Group". This sub-TLV provides for additional administrative groups (link colors) beyond the current limit of 32.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7308"/>
  <seriesInfo name="DOI" value="10.17487/RFC7308"/>
</reference>
<reference anchor="RFC8639">
  <front>
    <title>Subscription to YANG Notifications</title>
    <author fullname="E. Voit" initials="E." surname="Voit"/>
    <author fullname="A. Clemm" initials="A." surname="Clemm"/>
    <author fullname="A. Gonzalez Prieto" initials="A." surname="Gonzalez Prieto"/>
    <author fullname="E. Nilsen-Nygaard" initials="E." surname="Nilsen-Nygaard"/>
    <author fullname="A. Tripathy" initials="A." surname="Tripathy"/>
    <date month="September" year="2019"/>
    <abstract>
      <t>This document defines a YANG data model and associated mechanisms enabling subscriber-specific subscriptions to a publisher's event streams. Applying these elements allows a subscriber to request and receive a continuous, customized feed of publisher-generated information.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8639"/>
  <seriesInfo name="DOI" value="10.17487/RFC8639"/>
</reference>
<reference anchor="RFC8641">
  <front>
    <title>Subscription to YANG Notifications for Datastore Updates</title>
    <author fullname="A. Clemm" initials="A." surname="Clemm"/>
    <author fullname="E. Voit" initials="E." surname="Voit"/>
    <date month="September" year="2019"/>
    <abstract>
      <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8641"/>
  <seriesInfo name="DOI" value="10.17487/RFC8641"/>
</reference>
<reference anchor="RFC3688">
  <front>
    <title>The IETF XML Registry</title>
    <author fullname="M. Mealling" initials="M." surname="Mealling"/>
    <date month="January" year="2004"/>
    <abstract>
      <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="81"/>
  <seriesInfo name="RFC" value="3688"/>
  <seriesInfo name="DOI" value="10.17487/RFC3688"/>
</reference>
<reference anchor="RFC6020">
  <front>
    <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
    <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
    <date month="October" year="2010"/>
    <abstract>
      <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6020"/>
  <seriesInfo name="DOI" value="10.17487/RFC6020"/>
</reference>
<reference anchor="RFC8341">
  <front>
    <title>Network Configuration Access Control Model</title>
    <author fullname="A. Bierman" initials="A." surname="Bierman"/>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <date month="March" year="2018"/>
    <abstract>
      <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
      <t>This document obsoletes RFC 6536.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="91"/>
  <seriesInfo name="RFC" value="8341"/>
  <seriesInfo name="DOI" value="10.17487/RFC8341"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC4875">
  <front>
    <title>Extensions to Resource Reservation Protocol - Traffic Engineering (RSVP-TE) for Point-to-Multipoint TE Label Switched Paths (LSPs)</title>
    <author fullname="R. Aggarwal" initials="R." role="editor" surname="Aggarwal"/>
    <author fullname="D. Papadimitriou" initials="D." role="editor" surname="Papadimitriou"/>
    <author fullname="S. Yasukawa" initials="S." role="editor" surname="Yasukawa"/>
    <date month="May" year="2007"/>
    <abstract>
      <t>This document describes extensions to Resource Reservation Protocol - Traffic Engineering (RSVP-TE) for the set up of Traffic Engineered (TE) point-to-multipoint (P2MP) Label Switched Paths (LSPs) in Multi- Protocol Label Switching (MPLS) and Generalized MPLS (GMPLS) networks. The solution relies on RSVP-TE without requiring a multicast routing protocol in the Service Provider core. Protocol elements and procedures for this solution are described.</t>
      <t>There can be various applications for P2MP TE LSPs such as IP multicast. Specification of how such applications will use a P2MP TE LSP is outside the scope of this document. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4875"/>
  <seriesInfo name="DOI" value="10.17487/RFC4875"/>
</reference>
<reference anchor="RFC8402">
  <front>
    <title>Segment Routing Architecture</title>
    <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
    <author fullname="S. Previdi" initials="S." role="editor" surname="Previdi"/>
    <author fullname="L. Ginsberg" initials="L." surname="Ginsberg"/>
    <author fullname="B. Decraene" initials="B." surname="Decraene"/>
    <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
    <author fullname="R. Shakir" initials="R." surname="Shakir"/>
    <date month="July" year="2018"/>
    <abstract>
      <t>Segment Routing (SR) leverages the source routing paradigm. A node steers a packet through an ordered list of instructions, called "segments". A segment can represent any instruction, topological or service based. A segment can have a semantic local to an SR node or global within an SR domain. SR provides a mechanism that allows a flow to be restricted to a specific topological path, while maintaining per-flow state only at the ingress node(s) to the SR domain.</t>
      <t>SR can be directly applied to the MPLS architecture with no change to the forwarding plane. A segment is encoded as an MPLS label. An ordered list of segments is encoded as a stack of labels. The segment to process is on the top of the stack. Upon completion of a segment, the related label is popped from the stack.</t>
      <t>SR can be applied to the IPv6 architecture, with a new type of routing header. A segment is encoded as an IPv6 address. An ordered list of segments is encoded as an ordered list of IPv6 addresses in the routing header. The active segment is indicated by the Destination Address (DA) of the packet. The next active segment is indicated by a pointer in the new routing header.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8402"/>
  <seriesInfo name="DOI" value="10.17487/RFC8402"/>
</reference>
<reference anchor="RFC6241">
  <front>
    <title>Network Configuration Protocol (NETCONF)</title>
    <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
    <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
    <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
    <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
    <date month="June" year="2011"/>
    <abstract>
      <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6241"/>
  <seriesInfo name="DOI" value="10.17487/RFC6241"/>
</reference>

<reference anchor="I-D.ietf-netmod-rfc8407bis">
   <front>
      <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
      <author fullname="Andy Bierman" initials="A." surname="Bierman">
         <organization>YumaWorks</organization>
      </author>
      <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
         <organization>Orange</organization>
      </author>
      <author fullname="Qin Wu" initials="Q." surname="Wu">
         <organization>Huawei</organization>
      </author>
      <date day="5" month="June" year="2025"/>
      <abstract>
	 <t>   This document provides guidelines for authors and reviewers of
   specifications containing YANG data models, including IANA-maintained
   modules.  Recommendations and procedures are defined, which are
   intended to increase interoperability and usability of Network
   Configuration Protocol (NETCONF) and RESTCONF Protocol
   implementations that utilize YANG modules.  This document obsoletes
   RFC 8407.

   Also, this document updates RFC 8126 by providing additional
   guidelines for writing the IANA considerations for RFCs that specify
   IANA-maintained modules.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-rfc8407bis-28"/>
   
</reference>

<reference anchor="I-D.ietf-teas-yang-path-computation">
   <front>
      <title>A YANG Data Model for requesting path computation</title>
      <author fullname="Italo Busi" initials="I." surname="Busi">
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname="Sergio Belotti" initials="S." surname="Belotti">
         <organization>Nokia</organization>
      </author>
      <author fullname="Oscar Gonzalez de Dios" initials="O. G." surname="de Dios">
         <organization>Telefonica</organization>
      </author>
      <author fullname="Anurag Sharma" initials="A." surname="Sharma">
         <organization>Google</organization>
      </author>
      <author fullname="Yan Shi" initials="Y." surname="Shi">
         <organization>China Unicom</organization>
      </author>
      <date day="5" month="February" year="2026"/>
      <abstract>
	 <t>   There are scenarios, typically in a hierarchical Software-Defined
   Networking (SDN) context, where the topology information provided by
   a Traffic Engineering (TE) network provider may be insufficient for
   its client to perform multi-domain path computation.  In these cases
   the client would need to request the TE network provider to compute
   some intra-domain paths to be used by the client to choose the
   optimal multi-domain paths.

   This document provides a mechanism to request path computation by
   augmenting the Remote Procedure Calls (RPCs) defined in RFC YYYY.

   [RFC EDITOR NOTE: Please replace RFC YYYY with the RFC number of
   draft-ietf-teas-yang-te once it has been published.

   Moreover, this document describes some use cases where the path
   computation request, via YANG-based protocols (e.g., NETCONF or
   RESTCONF), can be needed.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-teas-yang-path-computation-26"/>
   
</reference>
<reference anchor="RFC4874">
  <front>
    <title>Exclude Routes - Extension to Resource ReserVation Protocol-Traffic Engineering (RSVP-TE)</title>
    <author fullname="CY. Lee" initials="CY." surname="Lee"/>
    <author fullname="A. Farrel" initials="A." surname="Farrel"/>
    <author fullname="S. De Cnodder" initials="S." surname="De Cnodder"/>
    <date month="April" year="2007"/>
    <abstract>
      <t>This document specifies ways to communicate route exclusions during path setup using Resource ReserVation Protocol-Traffic Engineering (RSVP-TE).</t>
      <t>The RSVP-TE specification, "RSVP-TE: Extensions to RSVP for LSP Tunnels" (RFC 3209) and GMPLS extensions to RSVP-TE, "Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) Extensions" (RFC 3473) allow abstract nodes and resources to be explicitly included in a path setup, but not to be explicitly excluded.</t>
      <t>In some networks where precise explicit paths are not computed at the head end, it may be useful to specify and signal abstract nodes and resources that are to be explicitly excluded from routes. These exclusions may apply to the whole path, or to parts of a path between two abstract nodes specified in an explicit path. How Shared Risk Link Groups (SRLGs) can be excluded is also specified in this document. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4874"/>
  <seriesInfo name="DOI" value="10.17487/RFC4874"/>
</reference>
<reference anchor="RFC3945">
  <front>
    <title>Generalized Multi-Protocol Label Switching (GMPLS) Architecture</title>
    <author fullname="E. Mannie" initials="E." role="editor" surname="Mannie"/>
    <date month="October" year="2004"/>
    <abstract>
      <t>Future data and transmission networks will consist of elements such as routers, switches, Dense Wavelength Division Multiplexing (DWDM) systems, Add-Drop Multiplexors (ADMs), photonic cross-connects (PXCs), optical cross-connects (OXCs), etc. that will use Generalized Multi-Protocol Label Switching (GMPLS) to dynamically provision resources and to provide network survivability using protection and restoration techniques.</t>
      <t>This document describes the architecture of GMPLS. GMPLS extends MPLS to encompass time-division (e.g., SONET/SDH, PDH, G.709), wavelength (lambdas), and spatial switching (e.g., incoming port or fiber to outgoing port or fiber). The focus of GMPLS is on the control plane of these various layers since each of them can use physically diverse data or forwarding planes. The intention is to cover both the signaling and the routing part of that control plane. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3945"/>
  <seriesInfo name="DOI" value="10.17487/RFC3945"/>
</reference>
<reference anchor="rfc3473">
  <front>
    <title>Generalized Multi-Protocol Label Switching (GMPLS) Signaling Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) Extensions</title>
    <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
    <date month="January" year="2003"/>
    <abstract>
      <t>This document describes extensions to Multi-Protocol Label Switching (MPLS) Resource ReserVation Protocol - Traffic Engineering (RSVP-TE) signaling required to support Generalized MPLS. Generalized MPLS extends the MPLS control plane to encompass time-division (e.g., Synchronous Optical Network and Synchronous Digital Hierarchy, SONET/SDH), wavelength (optical lambdas) and spatial switching (e.g., incoming port or fiber to outgoing port or fiber). This document presents a RSVP-TE specific description of the extensions. A generic functional description can be found in separate documents. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3473"/>
  <seriesInfo name="DOI" value="10.17487/RFC3473"/>
</reference>
<reference anchor="RFC6107">
  <front>
    <title>Procedures for Dynamically Signaled Hierarchical Label Switched Paths</title>
    <author fullname="K. Shiomoto" initials="K." role="editor" surname="Shiomoto"/>
    <author fullname="A. Farrel" initials="A." role="editor" surname="Farrel"/>
    <date month="February" year="2011"/>
    <abstract>
      <t>Label Switched Paths (LSPs) set up in Multiprotocol Label Switching (MPLS) or Generalized MPLS (GMPLS) networks can be used to form links to carry traffic in those networks or in other (client) networks.</t>
      <t>Protocol mechanisms already exist to facilitate the establishment of such LSPs and to bundle traffic engineering (TE) links to reduce the load on routing protocols. This document defines extensions to those mechanisms to support identifying the use to which such LSPs are to be put and to enable the TE link endpoints to be assigned addresses or unnumbered identifiers during the signaling process. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6107"/>
  <seriesInfo name="DOI" value="10.17487/RFC6107"/>
</reference>
<reference anchor="RFC4427">
  <front>
    <title>Recovery (Protection and Restoration) Terminology for Generalized Multi-Protocol Label Switching (GMPLS)</title>
    <author fullname="E. Mannie" initials="E." role="editor" surname="Mannie"/>
    <author fullname="D. Papadimitriou" initials="D." role="editor" surname="Papadimitriou"/>
    <date month="March" year="2006"/>
    <abstract>
      <t>This document defines a common terminology for Generalized Multi-Protocol Label Switching (GMPLS)-based recovery mechanisms (i.e., protection and restoration). The terminology is independent of the underlying transport technologies covered by GMPLS. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4427"/>
  <seriesInfo name="DOI" value="10.17487/RFC4427"/>
</reference>
<reference anchor="RFC8040">
  <front>
    <title>RESTCONF Protocol</title>
    <author fullname="A. Bierman" initials="A." surname="Bierman"/>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <date month="January" year="2017"/>
    <abstract>
      <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8040"/>
  <seriesInfo name="DOI" value="10.17487/RFC8040"/>
</reference>
<reference anchor="RFC6242">
  <front>
    <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
    <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
    <date month="June" year="2011"/>
    <abstract>
      <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6242"/>
  <seriesInfo name="DOI" value="10.17487/RFC6242"/>
</reference>
<reference anchor="RFC8446">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2018"/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8446"/>
  <seriesInfo name="DOI" value="10.17487/RFC8446"/>
</reference>
<reference anchor="RFC9000">
  <front>
    <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
    <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
    <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9000"/>
  <seriesInfo name="DOI" value="10.17487/RFC9000"/>
</reference>



    </references>

</references>


<?line 3800?>

<section anchor="AppendixA"><name>Data Tree Examples</name>

<t>This section provides examples demonstrating the use of the model with RESTCONF <xref target="RFC8040"/> and JSON encoding.
The examples are based on a 4-node network topology depicted in <xref target="AppFig-Topo"/>, where RSVP-TE tunnels can be established.
The loopback addresses for each node, which serve as the TE Node IDs, are detailed in Table 2 below:</t>

<texttable title="Loopback addresses used in the following examples" anchor="tab2">
      <ttcol align='left'>Node</ttcol>
      <ttcol align='left'>TE Node ID (IPv4)</ttcol>
      <ttcol align='left'>TE Node ID (IPv6)</ttcol>
      <c>A</c>
      <c>192.0.2.1</c>
      <c>2001:db8::1</c>
      <c>B</c>
      <c>192.0.2.2</c>
      <c>2001:db8::2</c>
      <c>C</c>
      <c>192.0.2.3</c>
      <c>2001:db8::3</c>
      <c>D</c>
      <c>192.0.2.4</c>
      <c>2001:db8::4</c>
</texttable>

<t>This network topology forms the foundation for the subsequent examples, which
illustrate the setup and configuration of RSVP-TE tunnels using the model.</t>

<figure title="TE network used in data tree examples" anchor="AppFig-Topo"><artwork><![CDATA[
 2001:db8::1      2001:db8::2    2001:db8::4
 192.0.2.1        192.0.2.2      192.0.2.4
 +-------+        +-------+      +-------+
 |       |        |       |      |       |
 |   A   +--------+   B   +------+   D   |
 +---+---+        +-------+      +---+---+
     |                               |
     |            +-------+          |
     |            |       |          |
     +------------+   C   +----------+
                  |       |
                  +-------+
                  192.0.2.3
                  2001:db8::3
]]></artwork></figure>

<section anchor="TeTunnel"><name>Basic Tunnel Setup</name>

<t>This example uses the TE Tunnel YANG data model defined in this document to create an
RSVP-TE signaled Tunnel of packet LSP encoding type. First, the TE Tunnel is created with no specific restrictions or constraints (e.g., protection or restoration).
The TE Tunnel ingresses on router A and egresses on router D.</t>

<t>In this case, the TE Tunnel is created without specifying additional information about the primary paths.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/tunnels HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_2",
      "admin-state": "ietf-te-types:tunnel-admin-state-up",
      "encoding": "ietf-te-types:lsp-encoding-packet",
      "source": {
        "te-node-id": "192.0.2.1"
      },
      "destination": {
        "te-node-id": "192.0.2.4"
      },
      "bidirectional": false,
      "signaling-type": "ietf-te-types:path-setup-rsvp"
    }
  ]
}

{
  "ietf-te:tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_2 (IPv6)",
      "admin-state": "ietf-te-types:tunnel-admin-state-up",
      "encoding": "ietf-te-types:lsp-encoding-packet",
      "source": {
        "te-node-id": "2001:db8::1"
      },
      "destination": {
        "te-node-id": "2001:db8::4"
      },
      "bidirectional": false,
      "signaling-type": "ietf-te-types:path-setup-rsvp"
    }
  ]
}

]]></artwork></figure>

</section>
<section anchor="global-named-path-constraints"><name>Global Named Path Constraints</name>

<t>This example uses the YANG data model to create a 'named path constraint' that can be referenced by TE Tunnels.
The path constraint, in this case, limits the TE Tunnel hops for the computed path.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/globals/named-path-constraints
     HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:named-path-constraint": [
    {
      "name": "max-hop-3",
      "path-metric-bounds": {
        "path-metric-bound": [
          {
            "metric-type": "ietf-te-types:path-metric-hop",
            "upper-bound": "3"
          }
        ]
      }
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="tunnel-with-global-path-constraint"><name>Tunnel with Global Path Constraint</name>

<t>In this example, the previously created 'named path constraint' is applied to the TE Tunnel created in <xref target="TeTunnel"/>.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/tunnels HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_4_1",
      "description": "Simple_LSP_with_named_path",
      "admin-state": "ietf-te-types:tunnel-admin-state-up",
      "encoding": "ietf-te-types:lsp-encoding-packet",
      "source": {
        "te-node-id": "192.0.2.1"
      },
      "destination": {
        "te-node-id": "192.0.2.4"
      },
      "signaling-type": "ietf-te-types:path-setup-rsvp",
      "primary-paths": {
        "primary-path": [
          {
            "name": "Simple_LSP_1",
            "use-path-computation": true,
            "path-scope": "ietf-te-types:path-scope-end-to-end",
            "named-path-constraint": "max-hop-3"
          }
        ]
      }
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="tunnel-with-per-tunnel-path-constraint"><name>Tunnel with Per-tunnel Path Constraint</name>

<t>In this example, the per-tunnel path constraint is explicitly indicated under the TE Tunnel created in <xref target="TeTunnel"/> to constrain the computed path for the tunnel.</t>

<figure><artwork><![CDATA[
POST /restconf/data/ietf-te:te/tunnels HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
    Content-Type: application/yang-data+json

{
  "ietf-te:tunnel": [
    {
      "name": "Example_LSP_Tunnel_A_4_2",
      "admin-state": "ietf-te-types:tunnel-admin-state-up",
      "encoding": "ietf-te-types:lsp-encoding-packet",
      "source": {
        "te-node-id": "192.0.2.1"
      },
      "destination": {
        "te-node-id": "192.0.2.4"
      },
      "bidirectional": false,
      "signaling-type": "ietf-te-types:path-setup-rsvp",
      "primary-paths": {
        "primary-path": [
          {
            "name": "path1",
            "path-scope": "ietf-te-types:path-scope-end-to-end",
            "path-metric-bounds": {
              "path-metric-bound": [
                {
                  "metric-type": "ietf-te-types:path-metric-hop",
                  "upper-bound": "3"
                }
              ]
            }
          }
        ]
      }
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="tunnel-state"><name>Tunnel State</name>

<t>In this example, the 'GET' query is sent to return the state stored about the tunnel.</t>

<figure><artwork><![CDATA[
GET  /restconf/data/ietf-te:te/tunnels +
     /tunnel="Example_LSP_Tunnel_A_4_1"
     /primary-paths/ HTTP/1.1
    Host: example.com
    Accept: application/yang-data+json
]]></artwork></figure>

<t>The request, with status code 200 would include, for example, the following json:</t>

<figure><artwork><![CDATA[
{
  "ietf-te:primary-path": [
    {
      "name": "path1",
      "path-computation-method": "ietf-te-types:path-locally-computed",
      "path-scope": "ietf-te-types:path-scope-end-to-end",
      "computed-paths-properties": {
        "computed-path-properties": [
          {
            "k-index": 1,
            "path-properties": {
              "path-route-objects": {
                "path-route-object": [
                  {
                    "index": 1,
                    "numbered-node-hop": {
                      "node-id": "192.0.2.2",
                      "hop-type": "strict"
                    }
                  },
                  {
                    "index": 2,
                    "numbered-node-hop": {
                      "node-id": "192.0.2.4",
                      "hop-type": "strict"
                    }
                  }
                ]
              }
            }
          }
        ]
      },
      "lsps": {
        "lsp": [
          {
            "node": "192.0.2.1",
            "lsp-id": 25356,
            "tunnel-name": "Example_LSP_Tunnel_A_4_1"
          }
        ]
      }
    }
  ]
}
]]></artwork></figure>

</section>
<section anchor="example-te-tunnel-with-primary-and-secondary-paths"><name>Example TE Tunnel with Primary and Secondary Paths</name>

<t>The example in this section uses the network topology depicted in <xref target="AppFig-Topo2"/>.
The loopback addresses for each node, which serve as the TE Node IDs, are detailed in <xref target="tab3"/> below:</t>

<texttable title="Loopback addresses used in this section" anchor="tab3">
      <ttcol align='left'>Node</ttcol>
      <ttcol align='left'>TE Node ID (IPv4)</ttcol>
      <ttcol align='left'>TE Node ID (IPv6)</ttcol>
      <c>A</c>
      <c>192.0.2.1</c>
      <c>2001:db8::1</c>
      <c>B</c>
      <c>192.0.2.2</c>
      <c>2001:db8::2</c>
      <c>C</c>
      <c>192.0.2.3</c>
      <c>2001:db8::3</c>
      <c>D</c>
      <c>192.0.2.4</c>
      <c>2001:db8::4</c>
      <c>E</c>
      <c>192.0.2.5</c>
      <c>2001:db8::5</c>
      <c>F</c>
      <c>192.0.2.6</c>
      <c>2001:db8::6</c>
      <c>G</c>
      <c>192.0.2.7</c>
      <c>2001:db8::7</c>
      <c>H</c>
      <c>192.0.2.8</c>
      <c>2001:db8::8</c>
      <c>I</c>
      <c>192.0.2.9</c>
      <c>2001:db8::9</c>
      <c>J</c>
      <c>192.0.2.10</c>
      <c>2001:db8::a</c>
</texttable>

<figure title="TE network used in data tree examples" anchor="AppFig-Topo2"><artwork><![CDATA[
                       +----------+          +----------+
                     +-|192.0.2.9 |---+      |192.0.2.10|
                     | +----------+   |      +----------+
                     |                |          |   |
+----------+    +----------+     +----------+    |   |
|192.0.2.8 |----|192.0.2.3 |-----|192.0.2.4 |----+   |
+----------+    +----------+     +----------+        |
  |                  |                |              |
+----------+         |                |              |
|192.0.2.1 |---------+                |           +----------+
+----------+                          +-----------|192.0.2.5 |
      |  |                                        +----------+
      |  |              +----------+                     | |
      |  +--------------|192.0.2.2 |---------------------+ |
      |                 +----------+                       |
      |                       | |                          |
  +----------+                | |                   +----------+
  |192.0.2.6 |----------------+ +-------------------|192.0.2.7 |
  +----------+                                      +----------+

]]></artwork></figure>

<t>Below is the state retrieved for a TE tunnel that is setup from ingress node A
(192.0.2.1) to egress node E (192.0.2.5) with primary, secondary, reverse, and
secondary reverse paths as shown in <xref target="AppFig-Topo2"/>.</t>

<figure><artwork><![CDATA[
{
  "ietf-te:te": {
    "tunnels": {
      "tunnel": [
        {
          "name": "example-1",
          "description": "Example in slide 1",
          "source": {
            "te-node-id": "192.0.2.1"
          },
          "destination": {
            "te-node-id": "192.0.2.5"
          },
          "bidirectional": true,
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-1 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": false,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "name": "primary-2 (rev)",
                  "path-scope": "ietf-te-types:path-scope-end-to-end",
                  "explicit-route-objects": {
                    "route-object-include-exclude": [
                      {
                        "index": 1,
                        "explicit-route-usage":
                        "ietf-te-types:route-include-object",
                        "numbered-node-hop": {
                          "node-id": "192.0.2.3",
                          "hop-type": "loose"
                        }
                      }
                    ]
                  },
                  "candidate-secondary-reverse-paths": {
                    "candidate-secondary-reverse-path": [
                      {
                        "secondary-reverse-path": "secondary-3 (rev)"
                      },
                      {
                        "secondary-reverse-path": "secondary-4 (rev)"
                      },
                      {
                        "secondary-reverse-path": "secondary-5 (rev)"
                      }
                    ]
                  }
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-1 (fwd)"
                    },
                    {
                      "secondary-path": "secondary-2 (fwd)"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-1 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-2 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage": 
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          },
          "secondary-reverse-paths": {
            "secondary-reverse-path": [
              {
                "name": "secondary-3 (rev)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.4",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-4 (rev)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.4"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.3",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-5 (rev)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.3"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          }
        },
        {
          "name": "example-3",
          "description": "Example in slide 3",
          "source": {
            "te-node-id": "192.0.2.1"
          },
          "destination": {
            "te-node-id": "192.0.2.5"
          },
          "bidirectional": true,
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-1 (bidir)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "path-scope": "ietf-te-types:path-scope-end-to-end"
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-1 (bidir)"
                    },
                    {
                      "secondary-path": "secondary-2 (bidir)"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-1 (bidir)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-2 (bidir)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          }
        },
        {
          "name": "example-4",
          "description": "Example in slide 4",
          "source": {
            "te-node-id": "192.0.2.1"
          },
          "destination": {
            "te-node-id": "192.0.2.5"
          },
          "bidirectional": true,
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-1 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "name": "primary-2 (rev)",
                  "path-scope": "ietf-te-types:path-scope-end-to-end",
                  "candidate-secondary-reverse-paths": {
                    "candidate-secondary-reverse-path": [
                      {
                        "secondary-reverse-path": "secondary-3 (rev)"
                      },
                      {
                        "secondary-reverse-path": "secondary-4 (rev)"
                      }
                    ]
                  }
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-1 (fwd)"
                    },
                    {
                      "secondary-path": "secondary-2 (fwd)"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-1 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              },
              {
                "name": "secondary-2 (fwd)",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-node-hop": {
                        "node-id": "192.0.2.2"
                      }
                    },
                    {
                      "index": 2,
                      "numbered-node-hop": {
                        "node-id": "192.0.2.5",
                        "hop-type": "loose"
                      }
                    }
                  ]
                }
              }
            ]
          },
          "secondary-reverse-paths": {
            "secondary-reverse-path": [
              {
                "name": "secondary-3 (rev)",
                "path-scope": "ietf-te-types:path-scope-end-to-end"
              },
              {
                "name": "secondary-4 (rev)",
                "path-scope": "ietf-te-types:path-scope-end-to-end"
              }
            ]
          }
        }
      ]
    }
  }
}
]]></artwork></figure>

</section>
<section anchor="example-multi-domain-te-tunnel-with-primary-and-secondary-paths"><name>Example Multi-domain TE Tunnel with Primary and Secondary Paths</name>

<figure title="TE network used in the multi-domain TE Tunnel example" anchor="AppFig-Topo3"><artwork><![CDATA[
                            XXXXXXX
                         XXX       XXX
                       XX             XX
                     X                  X
                     X    Domain 2      X
            XXXXXXX   X                X    XXXXXXXX
         XXX    +-----------+    +-----------+      XXX
       XX       | 192.0.2.1 |    | 192.0.2.2 |         XX
      X         +-----------+    +-----------+           X
      X                 X   XXXXXX    X                  X
+-----------+           X             X             +-----------+
|192.0.2.100| Domain 1  X             X   Domain 3  |192.0.2.200|
+-----------+           X   XXXXXX    X             +-----------+
      X         +-----------+    +-----------+           X
      X         | 192.0.2.3 |    | 192.0.2.4 |          X
       XX       +-----------+    +-----------+        XX
         XXX       X  X                  XXX       XXX
            XXXXXXX  X                    X  XXXXXXX
                     X                    X
                     X    Domain 4        X
                       XX             XX
                         XXX       XXX
                            XXXXXXX

]]></artwork></figure>

<t>The following state is retrieved for a multi-domain TE tunnel, where both the
primary and secondary paths consist of TE tunnel segments, as shown in <xref target="AppFig-Topo3"/>.
In each domain, a TE tunnel segment is established to form the complete end-to-end TE path.
The nodes (192.0.2.100) and (192.0.2.200) form the multi-domain end-to-end source and destination
respectively. The nodes (192.0.2.1), (192.0.2.2), (192.0.2.3), and (192.0.2.4) act as domain
border nodes and transit nodes for the end-to-end TE tunnel LSPs.</t>

<figure><artwork><![CDATA[
{
  "ietf-te:te": {
    "tunnels": {
      "tunnel": [
        {
          "name": "Example_Head_End_Tunnel_Segment",
          "admin-state": "ietf-te-types:tunnel-admin-state-up",
          "encoding": "ietf-te-types:lsp-encoding-packet",
          "source": {
            "te-node-id": "192.0.2.100"
          },
          "bidirectional": true,
          "signaling-type": "ietf-te-types:path-setup-rsvp",
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-path-1",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.1"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "path-scope": "ietf-te-types:path-scope-end-to-end"
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-path-1"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-path-1",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.3"
                      }
                    }
                  ]
                }
              }
            ]
          }
        },
        {
          "name": "Example_Primary_Transit_Tunnel_Segment",
          "admin-state": "ietf-te-types:tunnel-admin-state-up",
          "encoding": "ietf-te-types:lsp-encoding-packet",
          "bidirectional": true,
          "signaling-type": "ietf-te-types:path-setup-rsvp",
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-path-2",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.1"
                      }
                    },
                    {
                      "index": 2,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.2"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "path-scope": "ietf-te-types:path-scope-end-to-end"
                }
              }
            ]
          }
        },
        {
          "name": "Example_Secondary_Transit_Tunnel_Segment",
          "admin-state": "ietf-te-types:tunnel-admin-state-up",
          "encoding": "ietf-te-types:lsp-encoding-packet",
          "bidirectional": true,
          "signaling-type": "ietf-te-types:path-setup-rsvp",
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-path-4",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "primary-reverse-path": {
                  "path-scope": "ietf-te-types:path-scope-end-to-end"
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-path-4"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-path-4",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.3"
                      }
                    },
                    {
                      "index": 2,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.4"
                      }
                    }
                  ]
                }
              }
            ]
          }
        },
        {
          "name": "Example_Tail_End_Tunnel_Segment",
          "admin-state": "ietf-te-types:tunnel-admin-state-up",
          "encoding": "ietf-te-types:lsp-encoding-packet",
          "destination": {
            "te-node-id": "192.0.2.200"
          },
          "bidirectional": true,
          "signaling-type": "ietf-te-types:path-setup-rsvp",
          "primary-paths": {
            "primary-path": [
              {
                "name": "primary-path-3",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "co-routed": true,
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.2"
                      }
                    }
                  ]
                },
                "primary-reverse-path": {
                  "path-scope": "ietf-te-types:path-scope-end-to-end"
                },
                "candidate-secondary-paths": {
                  "candidate-secondary-path": [
                    {
                      "secondary-path": "secondary-path-3"
                    }
                  ]
                }
              }
            ]
          },
          "secondary-paths": {
            "secondary-path": [
              {
                "name": "secondary-path-3",
                "path-scope": "ietf-te-types:path-scope-end-to-end",
                "explicit-route-objects": {
                  "route-object-include-exclude": [
                    {
                      "index": 1,
                      "explicit-route-usage":
                      "ietf-te-types:route-include-object",
                      "numbered-link-hop": {
                        "link-tp-id": "192.0.2.4"
                      }
                    }
                  ]
                }
              }
            ]
          }
        }
      ]
    }
  }
}
]]></artwork></figure>

</section>
</section>
<section anchor="AppendixB"><name>Full Model Tree Diagram</name>

<t>The full tree diagram of the TE YANG data model defined in
module 'ietf-te' is shown below.</t>

<figure><artwork><![CDATA[
module: ietf-te
  +--rw te
     +--rw enable?    boolean
     +--rw globals
     |  +--rw named-admin-groups
     |  |  +--rw named-admin-group* [name]
     |  |          {te-types:extended-admin-groups,
     |  |           te-types:named-extended-admin-groups}?
     |  |     +--rw name            string
     |  |     +--rw bit-position?   uint32
     |  +--rw named-srlgs
     |  |  +--rw named-srlg* [name] {te-types:named-srlg-groups}?
     |  |     +--rw name     string
     |  |     +--rw value?   te-types:srlg
     |  |     +--rw cost?    uint32
     |  +--rw named-path-constraints
     |     +--rw named-path-constraint* [name]
     |             {te-types:named-path-constraints}?
     |        +--rw name                       string
     |        +---u path-constraints-common
     +--rw tunnels
     |  +--rw tunnel* [name]
     |     +--rw name                                    string
     |     +--rw alias?                                  string
     |     +--rw identifier?                             uint32
     |     +--rw color?                                  uint32
     |     +--rw description?                            string
     |     +--rw admin-state?                            identityref
     |     +--ro operational-state?                      identityref
     |     +--rw state-change-timestamp?
     |     |       yang:date-and-time
     |     +---u te-types:encoding-and-switching-type
     |     +---u tunnel-common-attributes
     |     +--rw controller
     |     |  +--rw protocol-origin?        identityref
     |     |  +--rw controller-entity-id?   string
     |     +--rw reoptimize-timer?                       uint16
     |     +---u tunnel-associations-properties
     |     +---u protection-restoration-properties
     |     +---u te-types:tunnel-constraints
     |     +---u tunnel-hierarchy-properties
     |     +--rw primary-paths
     |     |  +--rw primary-path* [name]
     |     |     +--ro active?                      boolean
     |     |     +---u path-common-properties
     |     |     +---u path-forward-properties
     |     |     +---u k-requested-paths
     |     |     +---u path-compute-info
     |     |     +---u path-state
     |     |     +--rw primary-reverse-path
     |     |     |  +---u path-common-properties
     |     |     |  +---u path-compute-info
     |     |     |  +---u path-state
     |     |     |  +--rw candidate-secondary-reverse-paths
     |     |     |     +--rw candidate-secondary-reverse-path*
     |     |     |             [secondary-reverse-path]
     |     |     |        +--rw secondary-reverse-path    leafref
     |     |     |        +--ro active?                   boolean
     |     |     +--rw candidate-secondary-paths
     |     |        +--rw candidate-secondary-path* [secondary-path]
     |     |           +--rw secondary-path    leafref
     |     |           +--ro active?           boolean
     |     +--rw secondary-paths
     |     |  +--rw secondary-path* [name]
     |     |     +---u path-common-properties
     |     |     +--rw preference?                          uint8
     |     |     +--rw secondary-reverse-path?              leafref
     |     |     +---u path-compute-info
     |     |     +---u protection-restoration-properties
     |     |     +---u path-state
     |     +--rw secondary-reverse-paths
     |     |  +--rw secondary-reverse-path* [name]
     |     |     +---u path-common-properties
     |     |     +--rw preference?                          uint8
     |     |     +---u path-compute-info
     |     |     +---u protection-restoration-properties
     |     |     +---u path-state
     |     +---x tunnel-action
     |     |  +---w input
     |     |  |  +---w action-type?   identityref
     |     |  +--ro output
     |     |     +--ro action-result?   identityref
     |     +---x protection-external-commands
     |        +---w input
     |           +---w protection-external-command?   identityref
     |           +---w ingress-node?                  boolean
     |           +---w egress-node?                   boolean
     |           +---w path-name?                     string
     |           +---w path-type?
     |           |       te-types:path-type
     |           +---w traffic-type?                  enumeration
     |           +---w extra-traffic-tunnel-ref?      tunnel-ref
     +--ro lsps
        +--ro lsp* [tunnel-name lsp-id node]
           +--ro tunnel-name                     string
           +--ro lsp-id                          uint16
           +--ro node                            te-types:te-node-id
           +--ro source?                         te-types:te-node-id
           +--ro destination?                    te-types:te-node-id
           +--ro tunnel-id?                      uint16
           +--ro extended-tunnel-id?             yang:dotted-quad
           +--ro operational-state?              identityref
           +--ro signaling-type?                 identityref
           +--ro origin-type?                    enumeration
           +--ro lsp-resource-status?            enumeration
           +--ro lockout-of-normal?              boolean
           +--ro freeze?                         boolean
           +--ro lsp-protection-role?            enumeration
           +--ro lsp-protection-state?           identityref
           +--ro ingress-node-id?                te-types:te-node-id
           +--ro egress-node-id?                 te-types:te-node-id
           +--ro lsp-actual-route-information
              +--ro lsp-actual-route-information* [index]
                 +---u te-types:record-route-state

  rpcs:
    +---x tunnels-path-compute
    |  +---w input
    |  |  +---w path-compute-info
    |  +--ro output
    |     +--ro path-compute-result
    +---x tunnels-actions
       +---w input
       |  +---w tunnel-info
       |  |  +---w (filter-type)
       |  |     +--:(all-tunnels)
       |  |     |  +---w all       empty
       |  |     +--:(one-tunnel)
       |  |        +---w tunnel?   tunnel-ref
       |  +---w action-info
       |     +---w action?       identityref
       |     +---w disruptive?   empty
       +--ro output
          +--ro action-result?   identityref

  grouping path-common-properties:
    +-- name?                      string
    +-- path-computation-method?   identityref
    +-- path-computation-server
    |  +---u te-types:te-generic-node-id
    +-- compute-only?              empty
    +-- use-path-computation?      boolean
    +-- lockdown?                  empty
    +--ro path-scope?                identityref
  grouping path-compute-info:
    +---u tunnel-associations-properties
    +---u te-types:generic-path-optimization
    +-- named-path-constraint?                leafref
    |       {te-types:named-path-constraints}?
    +---u path-constraints-common
  grouping path-forward-properties:
    +-- preference?   uint8
    +-- co-routed?    boolean
  grouping k-requested-paths:
    +-- k-requested-paths?   uint8
  grouping path-state:
    +---u path-computation-response
    +--ro lsp-provisioning-error-infos
    |  +--ro lsp-provisioning-error-info* []
    |     +--ro error-reason?        identityref
    |     +--ro error-description?   string
    |     +--ro error-timestamp?     yang:date-and-time
    |     +--ro error-node-id?       te-types:te-node-id
    |     +--ro error-link-id?       te-types:te-tp-id
    |     +--ro lsp-id?              uint16
    +--ro lsps
       +--ro lsp* [node lsp-id]
          +--ro tunnel-name?              -> /te/lsps/lsp/tunnel-name
          +--ro node?                     leafref
          +--ro lsp-id?                   leafref
          +--ro state-change-timestamp?   yang:date-and-time
  grouping path-computation-response:
    +--ro computed-paths-properties
    |  +--ro computed-path-properties* [k-index]
    |     +--ro k-index?                            uint8
    |     +---u te-types:generic-path-properties
    +--ro computed-path-error-infos
       +--ro computed-path-error-info* []
          +--ro error-description?   string
          +--ro error-timestamp?     yang:date-and-time
          +--ro error-reason?        identityref
  grouping protection-restoration-properties:
    +-- protection
    |  +-- protection-type?                identityref
    |  +-- protection-reversion-disable?   boolean
    |  +-- hold-off-time?                  uint32
    |  +-- wait-to-revert?                 uint16
    |  +-- aps-signal-id?                  uint8
    +-- restoration
       +-- restoration-type?                identityref
       +-- restoration-scheme?              identityref
       +-- restoration-reversion-disable?   boolean
       +-- hold-off-time?                   uint32
       +-- wait-to-restore?                 uint16
       +-- wait-to-revert?                  uint16
  grouping tunnel-associations-properties:
    +-- association-objects
       +-- association-object* [association-key]
       |  +-- association-key?   string
       |  +-- type?              identityref
       |  +-- id?                uint16
       |  +-- source
       |     +---u te-types:te-generic-node-id
       +-- association-object-extended* [association-key]
          +-- association-key?   string
          +-- type?              identityref
          +-- id?                uint16
          +-- source
          |  +---u te-types:te-generic-node-id
          +-- global-source?     uint32
          +-- extended-id?       yang:hex-string
  grouping tunnel-end-point:
    +-- node-id?        nw:node-id
    +-- te-node-id?     te-types:te-node-id
    +-- tunnel-tp-id?   binary
  grouping tunnel-common-attributes:
    +-- source
    |  +---u tunnel-end-point
    +-- destination
    |  +---u tunnel-end-point
    +-- bidirectional?   boolean
  grouping tunnel-hierarchy-properties:
    +-- hierarchy
       +-- dependency-tunnels
       |  +-- dependency-tunnel* [name]
       |     +-- name?                                   tunnel-ref
       |     +---u te-types:encoding-and-switching-type
       +-- hierarchical-link
          +-- enable?                            boolean
          +-- local-node-id?                     nw:node-id
          +-- local-te-node-id?                  te-types:te-node-id
          +-- local-link-tp-id?                  nt:tp-id
          +-- local-te-link-tp-id?               te-types:te-tp-id
          +-- remote-node-id?                    nw:node-id
          +-- remote-link-tp-id?                 nt:tp-id
          +-- remote-te-link-tp-id?              te-types:te-tp-id
          +-- remote-te-node-id?                 te-types:te-node-id
          +--ro link-id?                           nt:link-id
          +-- network-id?                        nw:network-id
          +---u te-types:te-topology-identifier
  grouping path-constraints-common:
    +---u te-types:common-path-constraints-attributes
    +---u te-types:generic-path-disjointness
    +---u te-types:path-constraints-route-objects
    +-- path-in-segment!
    |  +---u te-types:label-set-info
    +-- path-out-segment!
       +---u te-types:label-set-info
]]></artwork></figure>

</section>


  </back>

<!-- ##markdown-source:
H4sIALPqxWkAA+y97XYbx5Ew/H+uYpb+QdIGIImSbZlOHNMSrXCPLOsVmTjP
yXp9hsCQnAjAIDMDUoytvZa9lr2yt766u7qnZzCg5NjZNZKTiEB/VFdXV1dV
18d4PE6aopnnh+lR+v+OXjxLn2ZNln5TzvJ5elFW6VmVXVwU0/R4eVks87wq
lpfp2Xq5zOf1KH2enUOz05uimV7ls/Rl1lzBt9lylp4sm7y6yKZ5nWTn51V+
fZieHYcTJLNyuswWMPcMZmnGRd5cjJs8q8e32fIS/jV+9CgpVtVh2lTrujm4
f/+z+wfJNGvyy7K6PUzrZpbclNXry6pcr3CCo9P0O/gbYXyG3yWv81toMDtk
eJZ5M36KMyVJ3QCUP2TzcpnT6HlSr88XRV0X5bK5XcGXJ8dnXyer4jD9a1NO
R2ldVk2VX8Dy6tsF/2NaLhb5sqm/T5Js3VyV1WGSpOMkhU+xrAGeSXqaZTP6
gpd5llX5a/dlWV1my+IfWQOTHqZPinpapqe3dZMvagB4Sm3yRVbMAcQaOk1g
AV9e4hcTmFvmoqleTdJnsKCrIrFzvcpe5/WV+nrAbDIZNoROX06xDU2l5/rL
JH1erN1Ef1lf5IBw+c6f5WieX6THs8tcjf6G2k/mxXqCG64WpGf58yR9OUm/
AorLFm6uPxf11XINhHadLdWP/qT/vl4Wq7xKX+QNUket5r4+pz5f/o2bIEL9
PTuBOavbGkhIbdsJkJv3tT/fyXJWXBezdTbXO1b8cM49vrzNrkpB47KsFtDr
Oj+Epidnf/rh2eTx/ceTB4fUUw7is3wJ52yarqqyyac4R1rTEUO6HgOil3lW
AdHCNHTWgHKXvFTVhQY0ZJmmAvUhTjo+S1/lTLwzWkIqUFA7+Apg+Ca7TQ/u
P3hEX9UATl4Xy4vSDHXVNKv68N69m5ubSdHARi6be1U+vXc2fnX8ZCzDjXGA
+x+PT5IE+9qVJ+PxOM3Oa1jBFNB/dlXUKXCCNR6mdJZfwPrqNGNmMUNmsbDc
qLnKcY3XBZ5TRAeuf5Ets8ucepcXSYxh7Z0d76dNH9dK956fvqz3mXkVlnlN
ALpc5p+W13lVM0RAOw2MDjM2JTI2Ozb8GwficeAPNxTAnjUJMAD4bpavAPcM
MLS8TWHTrpblvLy8hV2iKVbzbJmn+XKarer1nLZpkjpgijohossJ2jKF7WeE
wc/rucyWZrNZldd1el42V4DZ62Kaj+tVPi0AQQlCKN9piHByYHLr1arENV7C
upcXxeW6IhhGaQlrp39mc2DAQCyj5FW+ALJLX1blNJ+tYYVPsvkcUPrq5ROD
0vwax16WDU5N3QG3RAiLYjab50nyAfLoCqBn8h1MFojhJeJhAH0kgO5VCT3G
TTmmf0Tvt+HkkgTk4nYIx9GzLdbzppApj80Nmv744x9eff3k0eNPP377lsY6
zS8R0PGrck3I3zt9tZ++LOfFFE6gNP/s4ONP3r5NLwjJ0K4GMqCVA7de5Thr
c4X0IbibJETECmWzvJ5WxTks5iqv8mKZIqb7qInXtSv3827CXyNlNBmwzfSS
Odaom55wbY0aY8wt7VBCqbDGgEyp/yQkB1j1nOgBx7wqLq/Gc6CweVrlfFTq
q2IFZA9cMc+X1Mg7HEWTWIICwOB0wHWRv0ERAagamWg5LecRFMDWITyJIj0+
CvNb6D+dr2e5cAgLP6ATT3hdXEIz3FIz/CgFmWN6lWZ1+ur0zy/HMPYeb/DD
g/ufvX07gu3+N/zr0acP376FcwT03SIP7vD40f0D7uDoYz8Fir3CtSf5GwCm
YVZPfIHmVTyHllNDh/kckCaHDWkBWP8qg+OeW9TXRKbUMlsTMIReAJ5xAquB
YwSUNMEjfZZXC8bxk3J5zciq4Qf+peDpmT4vyvm8vMFFNdyp8gDhpX1y8OgB
kD4OiL+va/4R6d1inG/lJPkwnc4LPPQf+iyMd/BDZl78R0Bd2bwugWuA/IQz
8IEKARTYkQaIaRlA8iQQcrHDcxBn18CDZEc//ezj+2/fEoiCQ/iXO5/mjyX8
Qbh6CfJm8QbpdskDv4Bf0hcgmwAuT2T5BvoRCS01Qm1H0WSu+EB5/jegC0b1
iueYJeualojsBGXkrJrJb7C1dTktAGkzS1qA2QrO7aoEEQh60dKLBd4cMJKc
nBHSRH1V3ix5H5vsHPYQyCP9SVaW2s9P+szpr1/lF8CqllP9JQwwDj/tb7q/
xgFS1DTSVE9FHIoVEFAEavM1b91nnz1AAnQQwJryJjIAfj1sgMprZweo+Ijb
38wAjw8+e+QPANw0NkD7axjgZPx0Eipb1cX08aeffjJer1D2a429yqav7Vrc
2MHXdxo79T527PBrj7594OC2iAwgt0v/AD8eph8gLbLY/fsde8rwrEToWsh5
5y2dSdaQz6o8T58W2SUoFTXzMWrb4Pcz+R5vFhR1UUapygWdG3MTKQ7nA4ln
8hLEZTw0qJvW+d/X+H3N4n2NhwqVHDqot3APv/G5JZHKw0f36aR9kD7N8QJC
LozSAjPCui1ksVyAYlYgeA+TcROWOuMyrpNq3c0zSb9dWgY7YxiZK8HSa5RL
8PpEvmvZe8ICeDCQucKgeZUj027cbW1uJoB2VYKGfz6/TczdVTTCy+xIEckD
5PA5yY+1AdUbeQSrxaufTCPHyjpikJQoLeAqu87TeZ5diIheIIqKi1saVq1n
nt3C7t6ggIY/3cKycOcmydcliirZYjXPR9QJpkE9oaT58TimU1COu8YNmXiW
WJBRwIDBYMlHcAGOIiiclbACEOJZF4rINIIzRFn7x5rva9gikBnhbmkQDENN
RDWbhVlWJkie4aHOcwYG/jq/Ndcpk7c+EHL3GSFmEsoc8jtT4NQ7JQRZA9LA
koXjbDot10uhG2QSAAtCQpKEZxnAC55Eb+ZG+kwYvBYBC1BStvAIpqCUNvU8
tyhkpYYHKS8u8MTSLKPUCJUZToIiegWrzKtJ+t0Vy8IwmFEiw+GU3GqGa5QC
LOK+EIYQeoKWhQK0p4xEUsvigpEmqQWgZ/qzY1yqBZqn32XWs5vOi7pxYABf
0LqUcCNuC3zyksXVCHQMkBxAWYybU4ABGtG759jC5q0zyo3soBnINwf09yGi
IzTB8LCZlZF/cEGAsPwNoAIXpEaMQuN+39XXGIxi7wjQLlC7gfVkKzirGZBP
vqxBj6/5JNSg5Uxv8XihklVllzivEQ6Lf+RInXYahqKgkzNi1s180SEQNYpF
3qAxhQ9wwJP0cLjLVZ7Nbu3qYKtzYoujFA7oFV2BcDSAAdDEGiUwUN1U62lD
a8GhBTWsreDW7MDefAPdFqD3WSZfaCplPYS4WcN7sbPApTdldbsDC4BJ+IK6
gDt/hrRfpnBtz0peXjbLVkxkio+iin2VF5U7Iyu2fODSkbNbJoa0c7ouQE6Z
E2qz9VwEdukqhg88C1bLwbZmMTjAd3SLwKIv1kuRHqDLRZ4xYhagPze4D+VK
7DoOVQAQMK15eZvT4RI7o+YKs3w6zypWxReIHjPKBNnfabkAOQZt8bAzPeIO
36BAtLLGXVbPaAkjAOLmqgCyFB4IyIIlojlxSovH+36a1XSorsv5NetogEcY
gZYKHS4KvIsmMBTLPMzp1YVGFkrZmfRyXZDqltcKzwD0qTWuPpo8eIi3E+il
KPfSWQPsAE5I5n10/9PzosaDBW3/WN7gwRnJmuGgsyJa1NqEgLiDuWuNL7XR
UzQy4OHPinlZybbjyhVde0aOTlwjxcJxyOc0JevWdg3u+WUFp2s8LRerNZMi
SpIpMbLpum7KhdxyllcQ81hVdKmf5yDnFEiXJEs7JpJNKxDBeJ0wGtlrAEZj
ZEFRlSXrbwFh10V+EzFedSyLZRJRSpncDYUbsTRBq3e5nN8a+yZLDbPigrhr
Iwc3OINi+5EuuOloKkKbI1z3pou+Huy8Re3JKnlB/OocRQFfVEHjTmIJo2Yy
hN7CLoxU3WuYAeSJYoL3xytlCWMcmvc3uWCcnEEGUzgQScR6d74u5iRYns/L
6WuHyTS7XJY1HkBAh7N1GTmzgNEAKXKpirTOUt9U29JYMFJgjYJbLAnvx5FB
XB1IS3ptSNbz+RpfGBoaKvnxR2CN06aagwp6fqsE9pi50YpQ+sZOs6YB5Wjd
sIaYAD4ykj/QwAI65ALuMxEr9dZGNQY6u3ZKixdrs2lpNzhhTKDuFZpTZQH+
r//6r4Tfbuzdx3rwR9Yc8lGSRj5OKf+p9Kwn8eZquOCX/4i2x09J/219ujv8
hL9u3QO6OJIzKNjQRa3HLWtTn5YZ4qfNsEUn2twrvQvq/H+8j34dHcM1fdTz
Ew9gDOGyPcYUVl+vAJ3/CSSoADJIBl5d/ycahAZB8B+dP21ee99aIw23aLlN
063a9h87/9MiwQGnXO2q3qyyWfKGuW1VXEe1/E8L8zvO7miH9PJvz150Ljz+
oTu9ZrNY5Oe/wFzl/0MdHl8YjEwha/qLu5Tkm/8XG+M/VffMtOw2UjDXRjOl
3F3GUqnvdmT29sCwkhOzy2jjpZUEWFTYIB2I2MPXrXpqxyvJvgWTjU8pCKJP
ilQPeiTocKiujnD84uKW/omyYZXDpZqjxO58BGC47BxutbgxzdMN+VURFCmn
Qibqnt7LJ5eTND2aLUDFI2mguM7H5BoEPx49w9fp06sMpelXRf0aXStep+bn
01fPqUHeTCf7aBQD9QlEZm3ajV/uhffccbRCWap48xVZYlFC87bvK3mjtGul
pfJK8anZ7o4dG0UylMHKNfp+kEY+Z5EXBW3Sd+tDZwkhey3K8vxYjQY+FL9q
aj7NV6JOTmFPcSBRgGi23drpzwSQ0R+BuJpbFHYM0IdJ8kVqXqJQ6oPTNGKK
EHtMla9AIqYjkqUoIU4JagGYnSPcmywoFfwcn5P6sCSDMMyJrih0pdqn3RsQ
q5czelg3invitNTbFetNOCTQGDlD7NXluprm+/yKCFPJ10CnDZmJyuX+JD0y
gBd1MgUSQft9hcYOEh9xFYrMjLyIL28ja4wdWe0HfXUAvn2W42AJeS3anrFm
wbk3/gvw/zdoWIHjC4ARrM5QBudoDlDQMlGHDRHEm4KEQ1tyRDvP1iM2Rzix
k18UpiQuukdCYBsk5gN5XV5pbIq1TNwl6AGYzadEMlWGzjHW7C64I2sbLwEt
JQrDiGDXbpHdsmG8xNeACqiv8qxCQsG1Nm6CprnIqttEfkv32PcDV4pIwe94
i+scEDSDpnaYdI/QecGWAeNjBRoY4LspK0MCx2gJo7GNDcBumdnRkcxIlrmR
8ETQBYxuPK0KJJuMkUdWBSIepVYLjHOGAvYPTijv3ZJM+wWdByC/dUYvDdZy
7ja+XBrK19oDzsg7hOjiGR0u9RY7rn3S0JsLfAWoWM/JYSamd+yFngvONyEV
34R9WFRDJsr1KlE0zc/u6Hl5aaiFuBMcm+x8bt6ehTCAtKZZBVsndCcKlnbz
SLOFDKVZWkEHTJZ/iMzbUVvRchsx/Iifnhh1hhmZlykgqsRjRXQXwVRo9UB3
MNRrmWbcVGiwahG2peaErVo8E7adFfhKig0zegFL8RE4r2N7JfIHHBz3KJAo
7iAQ7NYee8ADJGsEzALUQMWanomCFUnDiui9SVbFh4Fo1RmgRt7i7FuOptRE
7FMWdo+RpS3qAHiBJeORDQmACSdR7wuOpCfkDFGvF8gX/NtHb6ZcIdKAlmR+
vmJuBqsFmYSZrGvNt4UcSRzIO4sLUNYzEDIWYiKh8woXjzGu6MGMgVmtm86s
b8E5NVcv0/wuCmPuthAYmnKVMg2rn+IPSXTtJ3wLT+2jazAsHcK81sbitCYn
4fENPj8CPawrFFMTfixeiTn5wo0hojG9UKQgo4hRjiaKgYt2OcHSzGHGPByY
9245+XAS8lzPRbZS6OhPlHjDa3EMROkxnnyCQlyJnD/ceQ7TwlSX8/I8m9fE
hwn58oVG1QJPjH0PA2aHWOB2iD4lHxA+2HadZKvVHHgNmujZdVQ/X2lPQvJ4
wTY//niWP+Pp0esPLfe8BQA3GoMRNfI27+CVLzyKMcI4gksvaaw6GADU272j
60mi4Tj+4exPL14cPz+NA5KWS+OBKRzR6gU8CUA6r1cKTPxrCIzEVaIAIhw4
ml2Hj7njH6Dr9uDyM7h15mSPMPf+CUJnr8+r9XhKQhWgg95ku7TNPTdCAIzI
DBPENUAIMSwtP9Dzj2d/NshG+LF3xkKAjEDsJhyEvb4yNOtPWSJBRjxHwdgq
eZPkSAtshBN6fudnJz69uwL9GM3sxHqI0OWA87CgRzEE7BVUJ2M4PvkAAlOY
yqbyxB7DkUIHtxNNsMpFOsvJm7LJs2oMix3D4V2v9uU1kp76ExTMlGHbOkjg
Q5vAwGZV8xF3t0Njl0rIUFHBhZL/W2LsFvCncJJEbCb4mUwmukVj39XjLcoU
j402MODP+JqymtbsoY8mkjdpjKoSGRRb3MCGwXfmK3+qn8xkIIKoRqnXyJ+H
cW0hC6doryYyhb8mjV8xhDjubcwhzoFFiXTODQtfkdhpiywfwkrTHz9wbFVu
2AiTF6d/xSKYmcvDRqaee3brxD57qStzZAVF8RVBuU6E4Dq8mS4Nn098PiHX
IqrVnmCPEoPBTw+N8beonc7GGRpDxnRtugbdbT5M/4rffa+b+jQQdq6r+WXn
yPjj9kMKAVsxVR+NnnZ2opCEBD+KgMw3RDYgIxPlKHKydhCkpKSNSdG2qXtb
pTc3GfUDXiTPh3BPeJYpFmZqT7QneQEkaBYWSDufGAAI09vMTCYtPXwiw6ex
4UOsd8+UBfPI9WJ7ii4d/ZEMLMCbStRh6P4VUUqrJUqCMhhJ4daNXWV4S8Un
Cvqj2xEFZcxzT3x4GQBvLzs43krpmIFGOG1AwneSp7t6SboJsaA6U5/E60P3
DpoTQJ5gAd08Z7fGAdm7AnJR7qRWY5vF147mljhS0Ox3a4RTNMDyLkTnDZgV
U4lqQD7tihm951OsmpvPj8bJ+TA+xds/BL3cPGnfB/qjSTrWF2Y8B+YMrJ08
lXSD4HYLOuLhGjt70x9ak7LLZnMLmxkdgKQUGAEuGGjV7p+uYcmPo12vyvms
r2dPV2v+IURH+m4Cm/ZkgXb+6fgcjdb1Vmij7qj7o1NZXo+vs/k6v/sQt0S2
d+hPzHaMfO7OnbefeVbUf0PT9hIE8ZCUzT/IFx/m0G2jg+VvUPUsGgotAAGd
oz+2XwxceuJd+W/bd4apu3qntnfiX9ctRmMu7hfR28a7xPG+/gIUDI7kldsL
/a/5TsGDwdpmD3s0r1k18O0CNAwjjtGlh4Ia2d/IKv06v53AbJpJHLbvzGBq
5Xxu3WrgXrAjaEYOgweMpHdV2FYbudk/3K0PNabCeJOZDsYvU7RxK35aGzJb
28bMke7hbKlhLocOltoBYx3VqQfhjL5G+Ydi7m1/RGMr7IsD4mhGjxv1Lt1N
h03d04E2Wb/CMdsMavOWiYzCvVLulSrbDpsWEm11Fx3S4C7O1wbPbNhZyv3I
cLvI6teydUSRnRLSOMYSB0/NJ8UCEJqP/dAZoqGa31c4RLLm9wqWqMl6eGFM
zFvArtjxYMBR/NX42h7SrQG8C2YJzH86VvX1cUjyK2s+AJZ5hvTaaC5iHend
WxtOkRhzmpD+VSYu0RzVUuK08UupH2Mthu/s6fQkT0MR60aFXd6d26ZlNOMx
AdFFNE53NQxjiecdZ/Ob7LbePVRajj+B84mkliYQWInnLXwTft2+EZ7coLfW
uZUm7Ng0vI/QdbmsUP+o0XkFlUge24fQG47eo7J0F2XcabMLOF0RM2XOqywO
Njgd4w3FDp8+nDyYRNEll4VBWx++Suvubah3lrvw/Rau8AWqZz0W/UznBvvs
o24XV6C5Fx0BcPdt6JBFwuC1/4dxqDrzXoL5Yt1rr2s/LbTiR/45dCrVdnvq
ottfE4ZUe6QRoXumgAajxOAKwuQgGkEYY4fuqx2jpOyxUa8XjmKl5wjD4wrr
IE/AIOdf3lrDrCcZhA6vdNV5COsnGR0RZK3K3oJheH4z5bWYAGay7o7Yi2HE
Isy+vBTIUXQbYqWZFqF5kNJTDLAOtyh0FVms4MLbsAg+s+RBbZ8YnJa/B19j
Poh8SUDJt/J2zg4L0kfFy+DzOIad8VuhuOg4Rlaha9fhfzhXvwcTNIoPh9al
ziCfCkaNLNmB6xYReME1xM8R38sy2JlAkByyDe9/FQpy46QQrGBZ2l7ywBsI
xlnTHuTdIIXzmLPPDMG5yLMlJqYwl4jx3FDvxOLnUkzyySigKjrDfIXO9l2k
3yBg5IAT9COxJinACmE/Mx2/CIzUZkVwsL371jn5YU8G3o9uYx3fxrYIwjIH
fo0mH+cpJt9qUrGSm9Nvu8QQF4Jor7g5ZYlBByK8UOQZhGUWvG/V0xJHkXox
phjnu0xB75MkT5QzhL1BWXTCSDZZsvWAwmeuWYmv0Kx/ZHiRmMiKJsQTc3WM
ksIYM8yNwu4WktVGeMp6BfDn2aI9hMWOUuD/z6FnVt4suxFkn5hsdp8P1IOm
8eJoP8xrbb37Vd6mNUI2ig/L7LZIh6uyIa2Bo037hQkNpjQ0uaPq97WeB8zO
18ngW99Uq3/fZHHVBlfdD3T9rI4ZLDf0k/D3Iq/indHe+fCg3W9azsuOLr39
lDdMtHfn+ugNiZ4Do/1axlXXudSpuKJD9HS+sV6qXYvt7Wzz0XUYhfs7kzKp
v289C7vGymd0YI/zgp9mCC+R1Z2X5Rwu29jemxDwgTM5d4IxxX+FkyGxPPgk
suni2QoQ+lbYjTMG+f2GgGg9Wgf2ENYxLmZxyljeHLom7e7IX8oVGzPdIRw4
d/ttZWOXTa8q/ZS44UVFvYrobpteUzq6bXpJ6QX1CrCYVdOr28GUQpINPQ0M
pS4rOt2xl8iNw3tb3xFxHRnYx2332CRtQ/cWDMv3pk3tEFFHEnsVth1JPDcA
/+3fytY6JmNYGo14Hgv/GbgemEyjM5dGonJpvFMmjSTIpHH3PBomhEWQa1zq
rH7jp2drpfQMtF0HmTEWhoEoLakUxggcsMmhEHgjupzXV+SJ53IFirVTXHDs
9aOe6ikBHIPLCsUkDQIvvBAWcbgHLKF/uu+/2OELrPO9wHhAW0bTMp7QjjZM
gEUqvuoG4rQXYgLYBhsIUshxXgUWjGHTYRfymY280UgjFwUiNApV4nAslFfd
3mIaBWjF+qJArnGtdDqLdR0o0gm5r4vLIoxAH6iLnGmpdvI8meFYg7DkjQF4
bEgrnbAdmEAa48bqU/QVvf0t14tzJrbQ95d8kPMm4jNiSHmvV1Lfl8SiqMyo
sYNVSqYS7Vp6yL48+lR0vX2GrrqsK5lfEFQ3Ez+DwjrsDS8Pmfyzn2lFvmRT
pB00cWbCMxcrcc5GfFijeVD907Igs/4r8wZxwio/nOW9P7062U/PbxMXzW8W
U68yPhGcnEIApmcLmZcWxqEj5NJJoCSGA5o3A8wWKUxOYrmEuUkOA+X7qvgn
rAR9hapcUkzYbIkKmyYQPQeamc2kURGeCezAKb/U8PRimEnuCuGfHpdXPLhg
t0PUps/neeIwEpi0OGdkZlEFJE6qVx/lZMicqvEFcogZmdbpLm5kncKPXCCi
hLtg5IKJyxulQMlkfjIhHwV+KTDA5s+L10FQWcJBdvgdQWjohgJL0cSO5w1T
KoNEbp5OWLe+yOk7R3j2NDtBtXe9S6VWmmEa6/CFHgLuZ+csIPFJojabS1Q/
D5Ftyij0csEnCamim04uNYpm5nTrE0rFhiImJCSqrPBCrJucmGClrnKOuIFT
yOYW7louww0NH00SST97/8EBGReUbrtpGWZA3x2SusJALT134HCtVNUwllF7
71kV1kUjmN926bDv+kruLp2O0LlBYre0iJaovB2Fea9oQcW2mviz08PPHn1M
GGSWd09dhwSsL92EbhZNeJ16IgFlKzF2UKNyFPhsYrkozZF+iNoYtgY17jDt
w7bJgaKofy/04hiUHHTfHCqxEHyRUjZ0BX14aUySLxhWC2jfLbcRSM6H9nEL
kpRiTIZBIgpNs9oETpuX2Ml6Z8JpUsmfzC1esk177+zsJceetFf16Wcfc5Y3
GOjspZpbcshIzi4eW8jEEBa/F2OAyJx7Y95RbMBPszYZZd/AHGxLKWN5jr2T
l/e+efn8dF8smOTK7plu4oecTMHuSd+Z/9nhJxCJ0JKrx0xa3kVAg5xgmziu
uTfjaoTeQIkrxHjbKp/n1xnXAoA7wi7ZJhT31SIKdUefYnOPpypTUuZfKE1W
XeYNU65xCOdME3z72ylsruULLz0oOlvMGEr8gVybn6i32mNOc4VhTJwnYu/l
k+OX+0rEAP5xj3JTzfNL+sIFv4Tmr/aGlST1NuY59RqTq+dVUcqrmskMoEOm
kQwi9rHNG6Jco1z3unV6ECgS/IOgsSPdyamz0oldYdC/61Yy0kokuR0eh1PX
rb4k1cAiq6DeVBUg9i0paalqAcMombLPx9yEvCpHwCE4Uv2dV6AKYU50EPyW
I6qe/pBxo+Cg0U0/zS5j4o5txylzeXfMs6LajUq5MfZwyiRxRs44I5qqoz7X
Udh+6l0X8vye4HsosoE1CG5Eo21p0+35EY/+PWZNAYnNOYvnar1CGJBjI7ui
EjUUwD3j7/aeMTOX5Xqechka5TITX9IO6baZb/Y4Yb8aRbL+P7j/Kd5eJsMI
QVZ7uWltGv6QJs3iKb6f5rfCj8tDmqStfbMGN+pj3FwIPsnNbK1edDjnt176
55SgDAiVWYPbjo64V2vqwp3FYgDy6j69HZs4X9gkb2HC+ZSSKLkGvVfDitd5
7j8mytqKxSKf0XWEDlIVLxJUsVWpZFjE/Lqqcl3FBKkKKQmJmQJqxoyftiPX
kVoKZ/p117QH0QU6QqBR5RzNRDbhwPlt20kK7xjOUIT4bvCA4hvq0myWAKPo
myynmQ+Kt2sKFPKA4koQQlZEDlqxiJDGbm0omBDOBz9IcOFVqfG3LjLihClB
7/kYIdnsWWoeFYwRp30e9iLz7TuTmU6USY/kQYCx86kQVtKeQaeuPL/VT+dx
k5+no9T+qXGjCnOy94LNzCPaQ6j5MPMJrYlaYqXbVD2bDLqgzJu9diWpMQjN
c0PSxgECdBfNGLt4JsJ2Lr+GsQ/gFEmQNt0mwNGWY5SAzZ1i5Eh25fWBTPj6
gcmQBmVz2fhJjUw0WQs8401jWZTKtnXIgRYGg/oxaIM7b3gb0RnkWbUrkni2
Bs5JXkIF6OnJ+1rEY/BslpVx8NrVD6PzZLEDkNOJ9jWqhU/qpCxRnzTHs9hN
OlWymFhrbC6YcAq7N0aEECJBTmPea/weyvDqdtaqnEFjYoC+u2oY7AIqV2N1
Lks0REi2cowZFZeGK/ZImZcY2rEDvy053cI2CNec8BZkLedXrd23howqFY7Q
x2cJ12PhHTN1W+9y/p1dOwOpneQmJ/7q81sFW9t9TYTzL5IkJLMtFJlgcyb0
wOGtB7eri6/EEaoiRe3C7SHZrZPdrgPCb4YTvSDvvfduC9OnOVig/JRs4p/x
wXrWm6j1ptH1eguThXfPZPI0y3lJrEmX9G6dNhiRULqKUr73YVCRwkZBY8Zq
nkgPRVltMuOgakYyXpOSW5GADLOgmd1SWSFY1QZZ+Krs0Hb8DGjc0nE4HsWc
fpeOqTUF5b4bpvi1JD3uq2+LG/MGbs+CsYfA6fz7GqtWzsis4zKS6Kx4LVvR
iJKBcwL6kSeR1qUIRDaK3EtvlXa+4gYdg2RmpNHUmCKf0tfrlFRyiShjAIUv
CKdBvrquVkJLDv2ZEArtvingKDVuMKMma6R5WISFfDHFgEa7uSj4EcUmIJwQ
pORbqXQvQ/5eChgYrCMJzIxrVqyL+gqBsvxHUG6zxsNZaw8SmSvD14y11CsI
WTgQyVhu1yCWyhM4lrZySsqvbM5SxzeK/jHRtUmMni4SEegd+MQm96hOs+YA
1ikRErSpi8yNm430yqpnsHAv6lLDvgsHapaj18sulkig5DT8AgdXFz6jIcVh
6Sh6XxDNj0twcpC/N3ItdWbwUOVe6gE1JeY4u6Q8ZWthj/p4x1mHM9LC0KSU
lhVdpbGAJhbhlPCUKWlEuApmokdP3B4DMTJP3zhsC6bQrDWchvkMoYAhYDpO
/zFHgl9l5PaPMUfWvjkzvIzyq2/ikGaZ+oRkzjWhCnwKrB3P3FRDOLCS5HTg
1Mh6AU2vSuQOxtVCpLulCLJGLSBNn5gC+S5IzFRxKeAnWhV4ySKuOWp0wykw
KAIL0/zywcz/jvWQXdlBvjJqV7YRT4YPI7RbACJejyWNk+Rz6HiD9vHhfC9e
j2FzQWGVVFk27VUYj0dnObxdRiLCI5RV3qwrk5mZxNzzjHKUEKRF5Y6Ptl/j
QTQFzKBFTe4qdzFoO42jbUj2rat6+mFimJej1NVbMy75rYNJYjNVVStFPZWb
pitXTLhlQCY8tEstyacAY9HstkjyvA25ZBKyJ7vw+sHChIun3+N0Y4PeJJHh
BAH3A+gxGnffGWyfbAq23xZiF5hv/VQJahxFuaqbtGxiX1Z5Bk2OaImWlgeL
PGH5NUzXGKafCckBIfID97cGBm0VCIsFhf0mbZ9ymW8BTSTk/5dFT0c2gF8P
UCZJwK8AIh36/6sB59eAHS+E/5cFpSOs/1ewXSq671cAjY6m+2XBMfcNy1xj
J2FsvGCVfhCmnfM1jHCWMcBcVmMs/LClrT0UUGigVFWQ4GTH9MTPuRjTVbla
c0G4aBYBq/ZkdrSaYqTW6LmQz7QrYU+0u2fzyGlpemWmslvqx0myQ5ktkWDf
iAKjj4sFBFnQRSUak4GHEHI+Z8dxNiOY6H21jvYLnVe145BdmsYtEWykvu4Q
JTkXvmvm+zjADy9ANEJHT04x6/wh2NMh86PfWz6bI//P3do3sGtYeyH0vTM4
Y4CxC4tzbewlYhQaV30Lm/dooVIeDxP3Xa5j8ryiJ9Aw43HqVbw3E50s0d2n
MO+ieovRhugoadR+k+h72XGER2q7n0/FxwSsc5x+i5aq1gyW2vVJ7jQ317s0
qzghiCQds5p2TpctzZTuscyz7Mb8SNTTE8vdJnmraiuwk4lqg/F4d5/3f6yf
e+/M9tA+570b/3PZXjj9xAY8E8lStDNl25ZQ597k3s5jYRO9TxIdnOK/AmTp
wzFoOvM83ZPQJhLEdkc0+7iY4b/wOZk2YkD94XjcFq8kFjOVOOi9GihiNdxz
oQni3011YaDpUp7LqJ61+UV1HQhvLMbLQZt4Z87gWgU18DiRQILUVDHgEqEE
4EhCs26135NsanLnwQUXlBrEhLRjzWSshHCG4XdPudZSkriwGPga0/JcmSAj
l+xZFWaa5avm6vePtJOVLoBsyyOwmbdd26mvjNOwvN86bJ4LK1DQpxeA/E9M
2KzTpZoUxN7oo1ifNEixGu2p8qy+v/zQreyu+OMdJgxk3V8k76wGL57lvTuP
QghpGOCqP+3EtdvnUdD9tsmjoPttk0dB99smj4K3vm3zKLjOd8ijoGfeOo+C
7rx1HgWvs8qj8JP63yD/akcehY09tsqj4O+9n0dh40zb5FHwNr0rj8LGGcM8
CgNADPIobOxxhzwKuntfHoWNc3flqO7psnUeBY8Sh+dR0N22yKPgzbZtHgVv
Tj+PwgBKaeVR2Ngnmkdhi16RPAr9veN5FDb22ZxHofP+CmqQ2K/g5lJyeMpC
ODl0tpIClalu2fWJJ84pzci9n3j+lZLAaaeaUJKOi3xrd2au+4c791eM+O6D
COa6eEvv6q0A5waJwXGbLS8PZyVGYo//vs4iQGy6NvHTm79oY2r5TQNwMG1P
b/jky/Uib2fAcVRkfFxoDeu2kNQ/QDl9jTbc8gI2C5TwLRIOlekFqBv/6Ia8
v7NYFcwBRqVpS9D9AaI72It9UQsNld6dmvP3NA6uiAvvybODsox05IV5H0WT
+NuW3Vd1ilVR4q+9XlJzsw3LoMJK/K051AaAAMq9iwJ9hAiZ+34Dh5VwTJ4+
HDP1fzakEyEZ3XhW1NV6hRZY7EAZItWyYrWg+GuBgVH0h2CezvQ+qM+b5D4x
88D4kR97QRl+Pvhgi/LYxcJVx3bOmxKOSdZQU6ee6PcOUdFmCGTIMggZJfE7
GKqJDoxx+J89eOB624yApqsRPm1gWkeoGa6/sHXNlf+Gv2Jbtfww4d6PDu5/
8vbtyGRSfnTwKfxlfnv86QH/9m82u7/565NPH993LT999OkD9xunFjB/Pf74
U9Xy8cFD9dunB7of/PbI/fXok48/9n5TLT99eP+x+o0wYGc/+JhWhCj88ceT
sz/98Gzy+P7jyYPAJJT87sm3T4/Tr46fnbw4/SKFE5enO7K/Xx7cP/hkfP/h
+OCTCW7oTsI37RglPrTbP5g8+By+c0lMdtbV8hB7H1K8Wn34ZjE/XNaHdD/L
qDufJ2S4hh0EppHTX/c+TE+INpF2LzFeD+vYEal8eA8bMOUG5PkjHTw7En/7
OX1pt17O5k4/4R5ioDE+O9C5eYqu0Gc4mDnZaJY7kwjAY0mVhEblHZztbQCf
on0PQvy+AzrYsBSPQBccZqJgJnNOvGl2ljc7wTQ8ARKIDRyhsb8hUy0u7oWM
dMYHrMjr3hndQQymbt7v1GV1mS2dsxpg6uT47OvYVqRHGG+F8oGp/35qS0Hv
nR0fncoF8h1Mhd89Q8sco5XszlPm4jvfPUu/y88P4Z+/u2qaVX147x56xjcV
pgOoJoiECUB17+byHtLRvS9k2Gfp86JuoN/vFhncWuUh/vqlaf5Fws2OZwVo
5jj6WVblr9PTzJdV8WMHqOHHCSD8y0v8ZgIXb3uYVxjud5U+gwVfFV0jIRLh
5y+nRT0t4+P8uaivluv0ZXadLdOvAKXZomu063P6+cu/rZcFCNUIYXu8v6wv
cozxKtZdw6RvqMlkXqwJq32rPLkEOvmquq1fFy3ZyIxX/HDODb68za5KXiaz
GmWm4z0mKqR4B7koLqw3tUvtNuIsLMxBsVDqRMB6Uq5uQZS/atK96X4KLPLj
VIhyLUFH9LwHLBKfadUTUCbsJFs3V2VlQxCnlJwiPZrPUxqWkiChg+fMzPgq
R2d0et80OefQv7FY6rwp56CncYDdoh5JzjAxwRiHes46NJXlYRwrBhhS+qrV
uqrXnBaCV+x8wnkMftqb5kt8M4JutX0rw0uYH3Ne5dcFvvl8dfoUdp7b1rmI
RwAYehcv01PxMnw0mRoUOPzt1unz/DKbY5IHfrurDQ7mnMyvKbn5U3OH8+97
5rQ2OEyeu5MqUJNEuG9QStjOZQYEg8bEhZ8cvTgCdJiscSIcuYRfa3yIbxxS
mJpe2vDsHRj3Erfrlh0oWFxPDXg3NzeTIltmBFpWo1ZJq7hHt4aL8jaAsjOh
3LeErqL2pDvcxqyi90nktH+Bz+fomeMgxK+Lps7nF1Kmdo45IhDJ6F8/5dsF
L+F71PR4NjlE9445Xug4HBMT6yrUQvyXOXBjUVLxcYrFgxFgyHwSDMZ3LL8X
4j8o25tzzuYy8gw+IX5q+D0MEkwi46MqJLuXOiFFLqPwvOOtQSlC3JbrdzYj
biikTsJbTN3TiJGuqyx2L4mwPjJ86zklFz+9keR+5KjOR+7EFdR2NyDKEbPc
+FWP0TeZV0lOusZd+UcZndwAduBmguuH/pcnd//Ef6G4JgtMjZvvmB+x0UM/
m9c5//q2C52c7kUqldAzL8YiCUO1icBN7E6IRc7ZqFLRSfSvW/S9Dz/Eth+q
6GuzS8YpiY49y4bWT8nopyBAKZewbqp4Eg1XM5tP3tJk7jPYpRWzjc+grz0q
okd8nCgh3o7GJY1Z3y7OS6Dy8d0GR38EGcFNw2EbV+tFhmpnNqMQYx7NuKbI
R2VBBJZGjgpeGnaJtmhP4YZY4EUHhxK9VegdkS6OK9iGS7pneNzd2qaxmyhy
C2hB5EPQaw67M/7gRoG0MZUMUib/T9tMkpqcQMdoN2Tmjgfz1FTyhl9HsW7m
Uvp08nBy0N6yjvBDf/OUkm9/SCkOw1mEOgYy6Hlrd56DzHb8jvOSEhEaG8xs
ZyOl9Ac/snsYZ99wWJFZrD/kyIQncvBDZoIbOTLK9XOpYCipKpYOtuHH7sDv
+yfCedx0xF9aVFKs1I5Ukx0jKOOyGuO1tjeZ3OtA7CjdcQB+lO7s+gh1IZhj
WePu/o7avE68nrxE7zXyAHE3STtJmhnfwdARKepOiCEB2LLasyQKBzQWxd6t
PzKw+WC0Zndw+WAo0tfxfcFeANpjkXXp79NdkMLy3U2YREBdQgROlhYJs7Mx
UW0k0bkju1wvOr5TedjCYFBD45zb0wWROiglzZFIyhRrx/J5i3OemZEXmUp9
ToHd9nBQjhqrPnOMYh3BexSzP+dZCJkLnITPNZrFuO8QbVgUbHU/IyL0M0kE
gY5mG2a3cMMUPttRG0Bp3dB7nNwXgcFcop+Y5D1jmWusZS4Uy865PIp89s6O
n+6zmEW42yUxR4OzZPs25kzIllKt0PWXuUn90pMfP9X1lyLbaOI//atiW5Id
Fh7KySLkszFKtOOWo6jRO15s1Je+GHihcQcXX2rpiO8LLYx24OmkFbDbGclK
IeakRTksNcabjq9Cdilth7zi3el3comFFB7fRsVR+8jSLYkeOfdle1W3WKHw
QTMhXxDykq48w5XoqxsavJtrhCM6lLt5IPW2/MTs1hcX44s8IzvbzgbXMp+D
hNpKW18R10KjpbQHvKdYGDGxrpYtRedtHxW9suZKTJjozo55ZojXW67zxj9F
hOkQZNFIPo/ThyRhGKSv2OtFRTprZUUFOHvnl1xTFNYrvHPSnQeTycHHH0cQ
JEf1QT9XP7UxpFk7wruoVZ6bMHLbbaGL3o6syRNCpF5ccANu0HT99Ep3E0sw
JsUbpjGlL0Ag6pBIuq5KYmcD7kpKRFqmCK3m/ZrD+fX4QCHz5A2HL2tlEd+g
bnbVCmXvJ8Su0HVff+4aVFNmC00bCO/sriH08rlrJL13AXSF1LcC6vuvB7Ix
9yD6mPIX8z1PTZWFUN8DLZFPEunL5em0rL74Drs3g2/fAUEedi8pIqFn+s2n
8vnm0BITOOKmFULkeao8q5UYbekwLuHQYfKknA7wedjPVce36t/x1YTYk0Xg
PBr4t7Fl6KDL1lp8G1IvAHiSGlAO12QaFWnTCxUUoKgazJSyaQbvVRJy0wq3
2bQENAsBRS9W7QWwMxfGKWUohUHDYYuxIwLsNtuSrWvBKzGL2AifaNlt6CLO
PYPAexEkdMecEfgVp9jdEjpygN0EHWV1HwTbc0wAcfJUYHH7PgAecW1sAcIO
fYOpEOhnDACg8MCsuOOM32RB0SzDrmMgvlVihMcB78DpzlRMkh2rzdwUIl7n
t+kObTHjSAG4mb/V8bzRnsZh90C7prY2oi104ycUvBEp8v9OhBp7ArS/+d4i
6KJqVBWYbnohhLw7kNpx9/c7PkmQXiCZf/f2700mwYq+/ytvyKB+3PR7UicA
9IHYuMr14TbxiHyDA5fFjCB3OFM/N5YUitzSh6/YxD1aHtezRELFmK1fP8Nd
cOLZS6iSDmXbMtVNKHmc8wj2McPbBJwmnWN6Zn693MBgOjV/XxobZAGwV1Ys
hbQZyYDj+FpnToTtmd2TrixuXZzPz5QQmVrYIVxay1n+ZjgrDHIyhJxPxotf
P48H3z6vx7hMXKuV/q3uELHV++RyJPrta8n5Y2xPVL2PVIOMirotjbb72u/v
etXR89JjvokiOjVVN9KdoNFOwDm6cAJYMaH55s1AzWRRJOQZshWdo8FjHpE3
DRv447ejvdUJYqhHAH1E4qH16n6fBz26V2ykYRwS6M48A3hQTFp9OD+7PbCc
A1DH5FNOdita1xK1H3ywjtRivZDCHaW/dMr8KUXfdKri4MPnIwqPn/QAIWp3
90FsAdDOnRBu7dv2BiL3tK8JHUzebmM/o9+8d1Hhn0jXMnIDSh/ob1sHMC5E
dqaG2Z7Zvmw9eTnteSDDvYsS3X5p26w+vze9873onK2MML+wzklE1kIrlodc
rJqNwL2raaIlc7yTaeIVQ6PTdbZzGG0lEqnoHxeeOsjs/dJlJmRvMFW4p2UN
U/4ErtuPvedPlRZqDWct6xb64Cbq3aOo8UgPFKOJ9lNZ0HG9lD/yITol69E6
tWPbaB2ukY3L+C+4CMgKHiw4MHB3mrg7wXoq4yrQ7KRo+r4RN23/qvHgpYDc
8uKCTmsIIIfsOzDWS8yLs7Mo5sA+6SKrNwN5ZnQHWxBMZYGezrPKsq1MvM3T
r7PC0yb2Tr/ex1dF+flpfllloBfunT7dR1KV/EdroJ65WOkJH2M9BkmeJvYe
ZIFLDEG+opwfrvQZ5VkpOIOQFMjUY+CxKJZroFF9aNveWOKPhREwh+krQBSV
Q94LjuArdwT39SzuwxX/2MfhIqzBRHV3jBdXvL/2kiQXfi7Z1EEKN1nR4HMt
kVATowVtihJaGE4GBReIxVnS8/wC5Xrh6sb0aWn3fyN2s1U95uhX3yoRfVvs
el2McrgHw87g0bopUR6apgpTCvqjl6f7Ep/bemFMbRoi90RJNgFx1TUu1br8
rMCnB2El7YJc3ipS6Ew9sDp94OkFagDVCwSeKhurToCbSXpy4XvQqWomI/gF
M6argawTOruN22RFXn95zyouiJTIaau4GIkAT/50kvGiBiYeKG+uitEmKlbx
ZIdMfegp6jbHsatx+hxu46xChBUd5JimJuTABDSpEjMBTYaCuJYGeq/5V71i
g5C6Fk3e7aIPR4qfg84rWy+r587Ws9TTq7x9EQ6DuD3OuwLNowwA++eXNZT7
2SiVSWoPWE/0wKMi4ocm198kkd8kkW0kEYQrSgw/uyhiMfK/G8G/iXrvEbtt
hb3fs7DXZSVSA8IM21bTI3mx+i/yeLXiwD7WHjV8itAt4Isdj2j+vkbfRr4/
JcjynvsX/jD8CUOjgW5dWeUw+nn86QHQz+mfX45h3SqqBQMppSwfzHHM7qrH
y1Y0MX+6qSYkkHh/UzHXEHLLPhhg852sg6q6NW1Vq1Sxy3zqQ6sxrQoBdlve
Wq8KW1nc9Jp9aWmgkU0vNPT7idPE+6WKd6eLfsoIsP2ObiIaW/E35n8Ozt4D
0gZizTFJeYzS6BsaHzQYpzzH/1YatEJE/HawmWK3vSY0w+69MMSpfCxbaROb
beMYZIHUnG6b6wTz1fCmpUenp98+OTk6O/n2Rfot35BuE39j778oe39XofHd
xcZOwdFvfkea+nVdDP93sP3rvlD+7+wDUb1/H0QPgLYbDUS6lKXbEvfvvhp1
n3W8rl/lb8Z3vCbsvXeH4/0OS9ugGmOMINnLu5VhyTBhe5q7ji+4W+XUq1P5
OO3XJF9N7VxBeorAS52wjcmaB8SIn+miNG4Cdlx1iJbpVDCWc3z35+3xjN8K
APhuMwy8BY3nKGuj0g14wALIi9eAMyDyyweqIYYijwYEnPLgx7IkGDONG6qG
yFLPUdgPDKMkTXfFSidQtncUZZJSJT3F2s3iY2PTqOhMio3KncihUGMkWBzo
Q/y9FY5uUubkc26jxvorZot06fYku5Hf/3tM4NI+V5LBRZX0GXy+sG4zweCX
XFIPPi37U8B/N5icjPRutsWxIR2Oa3/WdOum1Ad74LxRXrDF5HRo/DhG7+y+
a8SieV4pdCnjLBo5GaFMyidkN5EC6onyOomOyY0rzbwforOp1gcZOY9cf8kd
J/tkh4nFwDkKcM169/+J7SCzuH4V5kOjVUdC7TSpYSUYuBlvxyZudSMLfO6V
8jUFg9wjuXmGXoF8hmWP5nPPH9VMCWN4NnLSvFvweMICh8yEQSfdIoLjkg2V
I4/AqYCUyX1ZLnRSbmd9UqfEJeH63Puxx5H6qV2wFyBDbgLyBRYpwuwNtqJU
KJx6BdVu88aHWOuivgxvqn2QT6NfvaPbQNImUszLQRFnm0nnRCWX8vpzjeE9
TBjFVeTn2W1eeXJ1a/uKVhDUJP3q1vCmUej6YHOqyBXXnr6Qal4ZPfLY1j4Q
Zls+H2SeP7j/yWE0pVu69/z05X76R3tgEf641vG+jPOx7HN7Z8f7+gySqL4M
ntm7Htp7ntp7TqV3H/BcdceGOFbrr6xm+6HxcLEk0a1+kCDWHbTZFol7l8BJ
C6aUIdETRPuCtgiCiGxsgbhr5KiDpi0ZbwSIIkWbeDzZsjkcHiPqoKCt65OM
B+tmd0gL3I/7vtXeLTTWQ/5WKw9gxCSWfdRxBxLlIbcgCYHhvdKEAPHrIwpZ
7M9GFbLw90MWPwffeGUB3IJpdAWWA13IbwNFM+PKZy9a67WoVGhxt8KR/9nk
4epZxc+i/XkwQbRWrBbqAoG9W9AbhMioffU55YLcrFSt0ejiWmbcSGUub8W9
a8LJhy8HV7DpJt9qORsCbMMcS90KG5cij+dxqv3E3waI0GXFR6xJMxsC4qwW
sV5e9GY7UNFv3BrbK08fqpTU2tWLt1vMEVaYiB/3U+U1MxaNJsOSIFJ4OL8u
ynWdzkp04fOVHDodgXhu06vJe5zEk0t/t6Px1G0XQaY1o7ZVZY2IWKAsjOVy
eTRMjebJwE6Wz6dXbPUfpTUauVT0qt5mUrCoxrgaJHtNJXxt1XH7vphn0yuz
ENf+zKdhu/4aECnyvzC19QomzrOFa+1GkW6hAcc6EKPYDzvZUExf3IjE+dvW
TeeGO0THN56Tadt7S5kAW7v/27YP33ZM9mg3Xk3oddx241tZsS0d0DeUBltV
5O7PKCVPRK3Q0phyGDcObrICivEVrW7lEvEk+QK5aj1PoRJQ0v/do3UJn6Z7
nex0el2SHbDfZvZMGtmq4uMb2F+fxXOu8khsrZurXc54wNvBsVww1C2VbpFp
xBjWmsO7l6NpFqMFjT3RqSc74+bOWxrgjKWQVw3L1wNvYVdrPwv22tSOeCAy
GLEXzlxJJzVVGg+vrsIk19dbxJB2m9PEat6MV2VdeOZ6BXz7obYX+K/0cC5A
KBO4jhAuLB+RUQ45KlMTrmXv6Nm+pGnnAThnKS7x0hQsVwH9cAQDKxfBfoXP
UU1qYKkNM898CJgwoeUiq1+3MiD8mQOTcAUaTzUw2+YmB5Zwn140Hz6gk0+b
MA7HAEApqS9bibhMIvCAhwcE39GzemKmKXk3WgPYWb/4PfSyM7mBj4Xyw54x
bKd7x4BfE3KVUZUUevLHclth7oC4oiKqCtYKsy5yh9pHDu4KepFGvKFT+Zmu
r+0+ZtZDu4AoxLR1aANsyWv2E7UNYpexbyAkdtwhhrfZI1VH34Ivnr56/mwz
Q8RRN3PCVpX1d2FkRzy/ZWUIaPqvwMYQ0A38i1lE7DXDoBKROBzqJWOHht0w
NWbAfA8s8+yKk2m2cqJlDMuExTNTiyRMEYdP8isQOubNbVfqCJcyRGp3tLhl
lVG+VdwV0tMlJxvM2bcFmw5QqOJtcZZiSmzvsepK54yfu6R0xk/8mL3fQyLh
GMr6YNLa6DwmFr7WFfUt5fnCgluSKR2Y8LqScyf7zn4PrN0YlwcPcoxpW2aX
udJOcoxsq005AeNfoGg0HMSm8euAHODLKlOagzQcv+wKf1TdFdhbFK4z0pyg
V1lbsFz22qYMR7DReYBZfDxmQM5z0JOKstrwuNiT3XrTbra4bGvreixASkfg
y7JDRwhfueN+FdIorPnWqRcQ3K0H6xj197gVmcVbNbKdZieewnGbzDpD8zBm
8yKr32kquAiyOdUVaZhSzcOr8lTCIybeAlx8LjwV2fKW4lqFL2O0XrtoUMRh
OGbJ/J//jl8u//Pf0TX8z3/Df/ESxrLTGJTvMxj3EjwyLAgPMAvJ/iK4ZIKs
XgpNk80d83FhQVX8fhdRtCvZDzESP7ilMrxaCKawjBNzHrI3AMWNTLE19dl1
sO8C+VacJHBWG5uEnJiTp6l41fjdJSNAuppnoCrUrm5mPrmcSGk/ifM4PT49
Pfn2hd9fAuwyz5nMCMBYdcPU3fWqKPDMFTmyUGycaAxquZyJERUIY44nXT7Y
Qwexx7v+578jwjlv+p2E825ynJbzsmqfpW08eBVf+6tUGf5epXsIpR4UA5dB
GjfM12tzj8vWYZ099BNaTm/3yQKfXV7yOZOhwu2AhUzE2sWrsvZsJV5hhYR1
MWs5JMDagB8Ukjdqka3IVi8x4KiHGnI0a/W7/1WKJn//V6lf/P3gN0PsdkgK
8VfPzIaBrjPNVvVayMsm2Ozex63Tm4lzxAvQsIfpGSbxmZ7JFkwIKuFFQWSz
hc4ar0AcGtliQnvdWBsCXMKEVJEB1quBGHDRu74mS8P0rFyla31P69+88lgO
v4GrU+BuXNovnAzXAr1bv4+kuHfyQtMOrC3/X9dMJ2CkO2s+9DFTXCntMwZJ
enD35Ndc9dbVSHMjh7oEl73MqstcvOTRcw8ZNOdb5UdOO45Ujg3KDXIyINje
eT6iYjOzGcOCP2DtQpVJg+te+f1BSckvOc9GW4ZUmdzQfWzMtrSYFtZ9VFp5
Bf3BWuclTP25QY83w4mdj5btXoGN9tPmg1HrgtmoMS8mfMu/o8a59DwUUIRt
eyJyokqaNaivyR+bZElFeLTlo8cHDw+2sihih0PQaF29ETKKRhwQueRlCJb7
nN4up1dVaYqrY2ataT6jNxpWr03JzO4hgFo3mD2sj4upOkZMq0NU8qP9OjN3
9Jzxr6n0C7ralmpSlRpH8m8BubAVNNRGQNqbpEdiMYMe99NFni2tBzTnDcd3
U8wB4ndVldV6eOKAal228caMmSH3DK43pVjH+WzM5T3GaiWfcVC/p3cnzpSV
Q2VDrgcLdP8i0eViGdAYCjhQ3ELWy4Bshl6NOScmxnijkQ5Z+A8Zepd3L366
RJx+GFthHy7mY2mgIGRcZXXUpR1dIOaUwlRVafLWi4jtTzLtFT5adBwNv2G7
2lqkZatmVddourZfVxuSm/wf2ydLinnF6EdFtfF/u8uabbV9Z7qGmEK88skO
sb8FxodhaQOePHEPZCEq/jm2acg9rNUttPWv3+dRlhHN3EQWOz1J11NzNg0J
UylJGdTlS9e12lpvE/hhWVykSVsAkqvoqb1pb4jJBr4BOxHkCGeKt4/Mk7I5
GY7EOaVsqGJN+jGuyzpYLHdgKQqB2M4Gr7C3bIr7cAEVe8Dsf1sFU9yHC092
kOJdO7ZKVvqft9FvN6GcjEuVLm/p5/L36gjGJFnzMdTZFHyZ2hczOaSc5JuI
tWsIby7y/kRKilF1fLV9dxx/+m46/vTdd/wZgNF3vfv4074Bt2AZhI/IFcmf
NvbCb/y//b/62W6c3W68bIQrxk4+j6iZYHtJPVwxlZqZ/nBZFRnFptfVCWRc
hvtWpQuQ99uDMNlS0U2u7Y0K5rQxLoBl97a5eyZSSoS14wJTat62IeFFob+h
WUJ7BPc+waSR/pELzthRjU9LhUyxjgDIRVixWPTYar6YriCT6MpMSmoUJCjw
qO1R7ptIu0VJwrEZk3frRNgGWRlEsWqPQRsDw1ClbCzcfRsgo5tS2hxK3FM9
OaeH/3TeqR03TXCTdtygG+/PDfJK393pqwgxfhHXGmi1/q3aeZsOuEujN6l3
3224IMPrceO1GLsmNkohvReivQg7CQw/Q65BQ2fxEbovv/aaNl18m669TZfe
Roy9jwuvfd11UvIQrHRfYDE7lMr30HORDbFn9IL6v8ai0csP3sGm0cWyOvjT
YIWzq/65+XTUKuBPV8UC/oSEF61esAkB6Z3qpbc3kMsbjCT0qqd4ehz6bTSo
Dfw+4PVRln4HNelOClJ7i3r2IcL9W6q+iDlXMV4Wqa2+TWm04eaj4fZff9yW
KWUoQ+w2qGzHGD3lpZe59BDgb0zmF2YyHfxF0luQhMSRVbEhyH1RAXBTzOf0
VIrigpQJuMyha/UvcVoyqZ4l7zd+VbG+Tdk54rZIWZl4ZME/ihW6pYRZqlp+
Ar0CxdYOTMFL9KkkVzyY+ORYLAHPAQFbAbRdF4U/Gx+Vu3xQYrXQQuz3o5gQ
ghRtNgkj/WAV1+XrHCvg+EgeVvwRtLV1048GoDI8oO+OiHzsjfjOaBDAxIJg
3p4ZN9a9Y7samPYAqFNm/BzGlrS3OA+xc6DKB5mx/QXaiUI/058/xejwxKIs
gwcnLUwnOuy89SD73cmubyffiQRftrfR7NwA2VS8Z8etMvF2kR1qrnNSAyV1
uzuzQ7m1j/5C+zFFPlut5oXjMp7vb7t1kLzKDMyDWGddGSRyLYf156MYzN8V
ge1UT/9EDObaeVrhq91xIwJ5kM0IIykgEq3S4z00gAtrh3hnUqIlBqei1d8t
Zyj03Veyn0wids0OLon9c6/EOOd0LyYnV/2sJXzxB3+V6ny20F7MWLbR2IWL
huWs0dGUODe6VgPXn+bGf7FzwcGqCUtBwcA99vWli2t/mPmPV7ae/8rWhW/d
AtAW6/ArIf4aFkIQ6f3JfSDjg4iTuYnZUtKLLWrvggT7hhhEBFtdwc7h9+aK
dCx+jOnFWMzOIeJWLz2PLC1EWLSpsVmlLaS2F93l+Pj+0sPj591TxONnY1Ut
/sSuZ42EsUso2sG+OxKObiQA87yGaZrwuc+GLfrHr4nHnacDyToaxoGfvcWh
Vhb2RzofAT/0bjhiZyaCbONRbwc4psEqjdA87Drqit71YhBBra47IhDntcoV
Ent56Ur1TGOyn31XCCKMrQiFTGRCIiRvYOHRYhYKiqaemeSu1qmkpTP0ka7a
JvtRumMzhtiGatwN6YNpOTG36bbSplO63yEEMkyaviH0UZbammObkiOej7iJ
UHYPgYC3MB4QfYt9Qv1ahwJktYnNC+LtXjw9fvXD2THwlyNMsBLeaV+fPD+D
Bqcvj5/YSkAqM4iEkHFsCTkoUDBeGPhV4y5TOj48+GRDIGKpedeKps7nF1tZ
prrR39JM3jk5Ko3oUtKhyYuPEWUSB8rJr7tCVfhBpKMEx7vAlM1mtO1tKrBl
lsXDwiZ88LeE3hUwN5tvyZFcBwAXZtyb3wbhnu0xhJGe8g4fCVjEIP3XWENy
ge0iIECmsZ/PSNm9S7Gs+T/HVuV32SnMY/Ze9unYTHmHnaLQ3F9wh9xt8v54
q2/GlNRGnBeOAhwweqtsRWOwC9RFHu6Jx3I57QO7NbYeMVzIdLABQST0XdDd
jcH2ffv+SP0o/TuIUXJjSR0amwrDlKeTu2zpzkOAWEkC6HLJpifoK1VV/Ob0
aHx+22ASp/TBJ/xPuocC+03sVEj5DgTFJjuym+B37zkS/q74IVf+IGYz3tPO
vcfwVJRPhkTl9rA0PK5bRaCaCPq29WUr0PlFzRvsTvC7HAQ2XtCWTsox+pQP
L8pUPVviAhbbK+q2JZGVwtzXoVbWq3Z9yyGN0rdfGWRbyN0nyYfOAUcF+Hn7
oWrIJNJ36JtZ75ZKvKcwZK6kPefQb5MFupzaWL0W4+Ec7KLyiZAcOltE5Hwj
yNKBWkcSnmygA+PKtxX2jmw3iRfMKDDkNsXA7nNQ5DBIE3/Cm5W04Yjt5MpJ
4SSzC26Mjx0ptUVDYcIdLrQUVkw5PQaQifOZ2HKpnrO0ZCLEf4mDgEALx/i6
QLEi5resFCeXhqRczm8/TzGNRQwP7UFwKsxnG0XOQFwMImYm3fbObPd6j+6A
I0Qe9X00OZg86KHkcvoaU/2WF2OxvrXoOFq8o69CB/JROHiqcJMy0WRmSkrW
RFMGN7iYVlpPfKk3ONk9aHS/uzfVFACv2hO25vCHsBOyM0tX58D2E6yi1Gas
rZ6Ruzfrosrzfwwtr/IOOyTzbMBO135EtsAfIRjex7f82Das+WNk87nSbYzl
Dw0MOtWZsxOGROIZId7/TuEFof2GylhVnA0XBGYlwoVsyTVNN2QmJpAk864N
wNUcUx62OZ0BWbqLiScvyNLvBsEo/nZnj11P0qN5XY7S18vyZkmpTnlovp7q
DgdIBTvHkoRGPh/AIUKK6vHb9dO7bL5+kFK3Kym91XXjn4v3oM6Eo3UpBdsn
3CExSUpMqMcKZ0bHDCFIVxE5y2W0pxTznsxlzUE+MfclpVOuK+9VcQ/y97hK
MZGMc843KrrUsrK+hpLB3savKOR1uGsYV42Im4V54vsug5vlrJTXuDzd++7s
VfAcxxlA8KBS5EgsxQ5GucmFdX9C/9n142wk8Q9XMAiAvEGOZMw+Hq70BvXs
Y/4LbWP+69nFs1e/6m3y3trQexKfB7k4iiqHOcwfkSycFVwiFRqcaBBjPIqW
1iQykae4YVP7GRy0UeL36a4sdndny3sPN3FK2SHLpX5cqOni6r9x6dmwWM7y
N8Nd618RhgQ/tH6quRl1pbcHhNEq6BngZx1U+/Gyvb56+aS+l7/Jp2tCsHl6
hWbVyr5j62KvfTUwkHphQFbNpSZPevTyBHaqrO3tyY6ZKN+KM7DO8ot1LN6s
chP2e56zjDGjJGBmBEkMVltFg3OCGayF9zXf1J98TPWtKInTE5Wi+njOSTH3
Xj453h9/lak0xUdYgAnP/bqyg/tupUHdGO1MrygPMO426MP0SLlwqozZuakR
jbZzWWLg5fKhpElTbEPeybvpbId2hKCOnjxHHS3v7I7VtVy0f/n1CeAbFvg2
pOtMvKY7SRrHlqBV41RdmyfEJufsVy1/6Sj93T2soB1Q0EWD5nXDp77ujOdG
UIsz5OlVWWCMS4HZiNvmXtRQMf/3bYqK9KCr+msaSgb2eRz51WToitcqp4wf
ya08b7Fz1iUxmD305OmGrw9GgpN0e1HjR04Ld56xKAbM55E6AkaW6FXO3obr
Bv0pVrbZe/57r45MeM/dqsUQRXOI03TbmI7uXPwSf7EtORoBK06VKlbk7rpT
f5TMYNu7iYwJNMbwgb2oq/WqFWTO0ssM7sjrfDbGF7dxWY3RIWQP5BkeepQG
wZwfpTu7HatwmfJ2/UCI+BHpXJgLdTNejmHKP/MAFkY+wT3eFFNgkhUQFy3P
useZU801ZK7LOaw56I0/rdCLsJG7f5phOhBjcDRYZILFumSB6BzN/t4WgVqX
XG/wUS9VDQ04eruR9rcPL9KX2tvkd0++fXqcHr94evpF8l/2kyQfIFqeUukC
Luz5TQkXcJKIX9dM/SJ3826RNxdYNpV/2+X6DTVbWkzqEssqmjKhtOKoxWdu
RJPqWsZ04hpPq+abAIwfYKVRbHcKjJpkLQYwBsqaKkTgy3Nt1CFVZoBkyvB5
lkBPIqCzBYnGxuiK6XzNj+WUaYYe0Zw6h1XP1udc+GxkCG1EmsGIprUFZGpa
kka8VE4bWXMttsee/cvswZrts2seqXalhtvuKN0V6HYZsF30m8T8+Nc4NSyH
V5qr1Y8NUhIPnXUcn7C+H3+EVuOCoL7/4O1brAByUzMg4WoAbU2V56wOOFvm
LF81V79/xCTFx+I8l2IbiSydoYD5/kvRNGPgMPXnQcHOiJQYzt7k+L+ClEM6
Kx+Nx9UNOymif8sc5STYs+ts/gdzEDmzfNAabfjL9Wpga2Bu2RyTb/DN57rY
1m0wZcPcPzXAUn9UjcpMgcBQnOlXvkakQvl/t7qShiOTCCsBP5nvkdMvcgtG
AIptho0wrYes9g8bmqGrW1Xe/qG9sFLVlySBxQwAn8lENTPVR12j1DTSVPrj
YfqBPiMAQjPPf7/juMKRpnE8lyGbGFk+wUf/lA/SzltmGxelqf4gSaG0467c
Ii6BNrFvOGlUhZN4ARwrKQp5RvhP9wQiHLJ1hPYPadaavd4DtqEqXypmrLR6
xUzpDYEmHFmTmaonCVDFqDc5TA5RrSxXwolYMEbeUVtxhZEwx5xaMAGydHnF
gKnO8wu0m2bpMr8B4US9W5j3DZmSPJqE6UtWU3KXoccLEkoq0ig42IKhDU/P
e4N2aYBDBXoOuJzfUmHzay+5HWEvzS5QtSoaNgum83KJNQslG5LBauTcvjOw
UmJG3iDFiX+3ttnATCVYwiwB4NYnjmqc68gaVrmKLABtKhIxuT3NV+i+hj6c
NoV9B9W2OOr+pI9+OwmXk7ORskQ356y4LmZYaMIa0OBySbpYdAu1WpCMYNgL
tOdKuiRFZ246hddZni8UTk1RGXzzR142Iusr2V32f65TZdNfaN1RNk32GLON
2wfNAWdM/Hudlz06oVbFzHOmjC3m5zqL266RAIAVrleDlxLC/LMe1771eEcZ
VzXgDAeHdvj2RRYHC0eG1zrvlDO/46grwcI/5FjnaYxW+4hKoI44m5dxzJAr
zPImK+a1lFKwRx93+pB3SCQX2hJthqM38nI+Q0RUVPidWo7NPdgGiGoDELuX
a5EfIdjnoDDsxz1HwEpZROqhh8J/GCsbdN9p0YOXg98+7CsIYapAzBo8J3uU
k1IVpUO6jlkkIJ7H3nyubAXX6qCdvI1dvoFc917gcndv/qaorTcIJeyslsRa
YeZQWuwhAf1+lZ2jNxUdT1fOfJkXl1fnRACzlCqV20JpIT3YZ0BTMKFsUKrD
oyqOq0gX7wSY6f6ewDJOu6FSfGL1ZWuNcDVYTdlIUxXLSyymd8Z1cR7pifid
sCbq9PJdrUH/z3//+OO/vfr6yeOHjx6+fRuqtAdapfVBM+qsFb+cGaXLgqL1
3QnL7hziDcPMiuwSWBFZJq7QWQjLyvx4tELOV7z5ikC7i/arNUiHAqOv8PfN
FewMkgIZsDxdSzln+X1gU5psDMxhirrLpe5VNcZZ3f7aNZ9hsZlRZDvng1vR
dqs/1CBung+PWEfvjX1h3q7uG/tafH+Y/hVDJr9XaiK3oFjMDZ/i4tAONDb6
vYfOfLzAILzpH9RPP8n/a6skt2r131Ol2qnxfjAQNDvco5vcK2y/77cyOvIk
0pkr3fZ0TiOdBTqqQL0BLKqTvTU8sV7dgPScEvuJkG/aeWIiE/eQVASO1ukZ
BId/ku4IRHgm7jhM5HTdcSRX92yarbLzYl5gTjo4eJEfbr9vkUR8hFtsEJrW
gm6m+lpIEPFuYobCg3SNafNqcjmo2XkjeOGhphfzspy1zXGpZ7gK+mABuTF1
zLmKXcyKF/RZ5m+27uPPUxWXl3nF3eL0Zzvaxc/GZIIag5ie4Wa5v773+/EH
j2Wfde1AWdfcZcfXfc99Tb+TYYyEDTSsJZwCBeOA2CukTtccwU0uXXZo9cZZ
wV2b+EwCvvjCk0O1r3NEVXOZgGQUFG0WOQaXF/XCpegnnONvLmUE1wuU2mL0
Iq3BlJdd8yjz7YqNjeYFYJd40266ZwdGSVCC2lOQ27KGJUb81qX4p1776NS2
69ZNtbLzmR6MpEIHKrdAcc6EDtreqLiFfLKFRPeTxD4yYkT21PhHaUrWZtNm
GT9UWRzsMD7vw+FC+dUBydoQ0zT5PJ88eylIjuN4ojff48x9VLAB9jZaqaYh
480+y8KewKrmNlHs7qKoqhJT4Qt/3XVj17hddY56L6xk1/wr2hKVZ0tzQCt4
SOmBb4l7b/+0SBOd37hJsJLPKmsMXd5FxEiyJbzDPa4NolCE7oMaABqZtyRC
EjltllT+3RblbB8bXKrsts45HyUNshE7ZHBx+NgCg6uNlvivs0a1wz1rbN/g
W+1kD6W+l1Ui5Z6XuKBO8o2uv2fF9o9gob5R2L8jyKjskvAZPnyMjzDk5+lH
C0kxbqVt5ksEkNdzJo4Qx1Jk0axpaiqworptjVeuyis14pfb9KilZ9uIcyqy
SnqzK6g+EnRb/bv2tO82vP5CE8QUjoYoI5xZewyHw6OxxyZ/aOnaIzsvL7Vn
4gnOZFUdmS5qCGIWJ1Nxc7FWtlPqaCOpgoroWEylyr2RHTRg6lCvMqsXfzry
COeHBXzBc4RCq/SLN7PSZO0uDtEcWCGxSVy1zlShgbak56hdI/S0NbkAMJyF
zlw3IDytzHdeNIusfi3zTsxmz6JzmOPCoMVH91zouXB3BzHYO8aIEj3DEmBW
m9xmM05fPX/2fpBvsE+qJ4GgcSJD4HRmHLHKFlivcfmaHapXnLSGx1OqbGs8
hoChD3G6HUJpDD5cLQm3R7ipi0UxzyrjPCNmf3+IUQrcyZ4vmts+TXTw1BFv
Ep27vBortmMeGeTdWyZ0fN1JzvlVdl2UFa0pJnJukjl9/yEfoU6mK8htp0Mm
DfDZEhr7EPsus7elSoKkJY9tuMY3wzBAkAllSydM0sa0RYt/GlBRCVfw9LPB
1S8PDRFnfFjjZpEQXtsq1a1AZV5J4B9JBBpo5j0xk4lhQkvvkVspX5nDRWTe
W/N+/TKbvs6bUfo8W5zPslH6dXGeV/s8r7G5uLmiL+uBxscJp7inJL1rLVDB
YVNOB6JFzHJjEOqeGoOHFoldqSMvfvr1RfnHXJU37ctvt/bkOXyesqYURo1v
L4ogSEIpfV3YSagAXgEYmjpOacbSXNmjgpa5qWtWfNiwBeihXQqrXSHtA+FO
Wb7HsVIPwwxI5+Qtu9Xgyd3b3xoohuPocbS0xhrva3pz2gKQmDEsAou2AAW7
kF/nJhOaU2B6kSJHBSUDYBgjd/bHbN0Y2e3kF2o5PnHzW0t6QIuH+h1NJawF
xMiSpJM2QaO8oikUnXzP0Az3lN+7zHsbv2CN0ULnPbmRac57IHO1CSJOyyoX
Vfj69tv72W/vZ7/29zMZr9U0OupPBoTDvY2vcnZs1TI63E/uO7ty1acTAptX
byMo9vOjnSDa+W0UPov0WJ+uHq0VxTrf8dXS0aHfUkjW+/L7CH0NwsWos6Nb
E882CJUajy0g8ScpSvde32J5BBaHATn0j+876Mk0xD9bz0+D3nD14qiJ3Q/8
a8hGuNaDsYiN+9D32wuyXsxvL8i/vSD/c1+QZU7bwoPtt6ChX/Ea/1WDhuRk
XJWrNrfXkmWDCfP9TuW6uSyRl1jhFYeICrNuIvHUNN/aH4rZH8ycl/nSJINp
NTPXUnj4fnLn9Tyft5Ziueulq/UxntsybT3xUvzTSuEnjpU0usJ02ArTAStM
YyvsWVdC6SMcbxi/YS2c0wrzW6QaeHzDqRp8Pg7f7qmkCkEeJxJyQI2eXo2B
OIMffzID4Aul/VBsd+comFzAEk+7hosBs4/aos43SndX/jcmksC6xMIfLW2e
XG0++MCEJM9sTHJXLGyxQINdLREj5hGAf0QLxjgNnH2VSSDVnr6mJebOMZmU
Y40PPnvkGhviDNqdjJ9OZlV20YylVVaPq4vp408//URIQQ+hO5MlZVZO18jv
NHYlkPur42cnL06/wNQbebrj4+TLg/sHn4zvH4wPHk9us+XlTmJw5DWjQHX8
fYyVgNEm82DyAIPHUWatV/hqsrOulofY65DCIerDN4v54bI+xF6H/mg7nyPp
Y93Z4k3K334uqYROaGvoNZXh4OxBvGN28Rw2bwfozpPyF/igxzqRBmUj+oZo
qOsFPEyWoisIAbKpqC5HUjqPc46if9taAG9yDH7Z/2AV/G3HWvop4xBTEC1g
V9w6z3Aws4yO5RrIffgU2XsQFhfdeMbj0IVni6n0GwzuJ0kzOrF/iry5DRPt
gQDOWBca7KPrK54hPYI7xO1aWV1mS0lHQSPunByffR2lD53Cicjg1KZA3zs7
PjoVhvid5N58hjofTUSW/Cmz7p3vnqXf5eeH8M/fXTXNqj68dw8dBzFd/uu8
miAyJgDUvZvLe7jZ976QUZ+lWLUH+v1ukQHHLw/x1y9N8y+48lF6PCuassLR
z0A+fZ2eZlkrnaYdoIYfJ8u8+fISv5lMy0V7mFfZa9CK0mew3quiayTEIfz8
5bSop2V8nD8X9dVyDYfoOlumXwFGs0XXaNfn9POXf1svC9C2EML2eH8sFtmy
vlqnp1dZKze3Gemqhh8BqnyZxaH6y/oix6icYt01RPqGmkzmxZr2pg9XJ5dA
al9Vt/XrsJKBG6/44ZwbfHmbXZWMLGaJYUKPHZ33wiSqyJSXKZ9sa8X2Ey4I
FyNpgpkWpmebCMxPytUt6EpXTbo33U/hGvg4FbLHRLfYmlylgN2Tk6dz7MmE
rWTr5qqsbAbOKRUDTY9AlKBha/GJIos9dXiVz9CbAt+dTHoNTMmC4VKSuRW+
OS+WmCYWjf/Aaek90whq+AfGFcHKrblhhI8DLs/Lal3Vayw20pS84nrNWQJN
zmN6CQFULSnXCsxh39jwKuUyea8Amfig9NXpUyALblvnInYBYPRyavNoPZpM
DQoc/nbr9Hl+mc3TlyY0vDY4mMtbTcnNn8q9Lb/vGYbQ4DB57piBQE2S775B
KYdHypVMUBS195ZBxeS5OhGmDcP7MJjo5uZmArfJOCcapqlwinvwHbbe/xzW
zs9qOADXmLKo4NijOS11WTaFXId4Fd6j9sezySG6pc2R/+N4vKWckpFaSBl7
jszDYPRUkrjBCDAk5bTUg4n7rOTrzVO4oMsbV7ZsJonUsP1qfT4vbCpgGCSY
RMZHMTznXUqdONSdxe1kWTQFQG87mesl+pzUl8btjuKJYSy+HOIuNDI1YntU
bSUOlTXc7kVJIB3H20tOBeEnNgWSq8sWaPY2j5GtIvTwwKQWAg4OvGBHIiJt
xqGe8nomsJsf/1zksQHjrQ9MaDh4z8DI8JvhiJok3jMwHEGtJjIBpk32mn1s
e3Dm0wbmlbxcjc0L/Vg9+3J6505SeWJuGfR2BWloIUHNl6tITIFZgjWt+peU
R1qBl5GHuniCd0pLThbtYXlkTYxCpPo1lS7xr2zJhQEgrQFufi13Hvy1pFPw
+4QRAegWYh3Hvvh9qnLjhVnOeR3ldLqu6rbjSDQjHNeOCT2xhuHi7I+vjk//
+O3zp+Mnr749PT1+GmDFB86iKMCK2FvRoVY4816r+uEVBdsS/vaVt7iHGuNJ
7veMNGQEo1/RVAIsisZEgwQ54NDPCbNWQOscq2rhpVsuXUJjS5Lic9qZ6a3r
UMaibSQkh7FznruKSLTpt/4axT8z4okOt5OYtCdpnGrdKF1700WxjkjdGAOo
NUagbgBHqVjMAlhSLJzH+UDns1Hs2A0hrhY99a4iCFHopCWNTp+oBtNRuK+R
iyJ8fbNH1WafDpjg783u69zTPYn/1NC8XZQ2A53JzvVWxo6bImFx8nTtOaNC
1h6+vPCHiOE5zDMoLD3yntZ/B/rLE+wvsjfFYr0YuwiMcevySXXKkcxmNDE5
CDlZIvkmeTFarvt5To6TciDb29rxGDpkd9unZOBOgyAuKghgwkRxGddPL0Ar
QqCO9VS5bC4xqgoIvIDW+Fc1VvtvX0a97aaOoBt17HDPpR36qA67s1q9gos8
CGILrzCf34dMOuIX6w/Q5STL2zvDDDALdgaU7QjmLy1DY/rSrMh46nPmEiY0
v7skokDyBGkwtxmfeySD0EF5GJJbvdpIlhbb45dlmn919G6QCmzKIheY2xVl
2Xl3DCDOAGGKW23EXARZse4xrHUjyo0Q8UDvOqiMqD1iV/6R5cn33wURxm+e
q05H/PV15HRYoK/bO17QclPM58z/eNi5ejWznLN9WYzJNdZzf7njPeGm+yjd
QRi9jv5N9PvI8gdcNM6R1wd4uFQRBldS7iPrmYxJjymikRZFuI6LJGTMMxca
qOO0Jcic/FBj3Vnustl7FD/UZHv5Gwy2rE1WoU7JJJRO/SDR/Y1hqHj4lHDa
jr3tCCruorzA0+lfgfZCkH+jvl8p9Tkm2cP3fhECbN1IWxGgpr2wFnaPyNgl
0dSmHKAjXiJnVs89cWwg2ToI6d0j1MlqdHHvptt/DWJ1ldSM+0mEet0QmoyN
7DJmGYK2LErBA67/lkn13ofkLfqhsv97KcfpR6w7Y1zSdtgnzVBgrPbRscqC
zCFgZlqut+Qe1Z942WZNxSVs6aLHWk/6Hfvmj9V+ZiwCpwdCsxST6jUmm8Z0
nlykrTuBVO0KnUmUtN2j+7p0CXZhXnKD41aNDwryaFf4CHyTBpW0OCMjh8oh
2JFh4TiumfEGuj4qe6iqTsRmBRMu0l/fjtsMg13PzP06qrdxRHsYPzLQtKxn
iYbR+7qXzVshSY1aNTOprk07+CWoyiIwxyNftivdpk27esawiI0pNdQN1Kap
8J6JYOjeKylxGemQTudZu6o8frj6iIrDaMMS0o9q3R5vE+hD9joG59uk/29C
ajQMJbKi4mJ8kWfkkrPTHwITgWTD1hzLMNGVvcMexcAbsFmxbu++a3nfIrff
vt7iVO0gp7BIFbL2ja3eadejXXtCn1oD2NvKa9dqtqEociSJiRACZvMp8gj1
2KtsE+EQ2UgIUZSu6CVZql3yf12wwr2dKNGgoA2N2ntzL/bt5kEGENZm1tmB
vVbNy2FE2rr/bKzasIvvCfeCTaX0K9Gnbhnf3WgUWhY7BWJnCrePqI9+247i
ngu9hZlh2nj1UsWYRDFxYmT7XQcBsr9DlP4qeoHcuT+ZPDr47NFnn3x68NnH
74Mg/kzwiKaAK70THXjMqnN/un/u5TEqHLCPs2Czd2MptNFDeAnFHP4CTIRQ
d8/7897PwBwsHt6ZK2yl7AiVxEMCPXzSrscC/zxwu4vNh9qQn4ElkmzCG5cz
W8TCDv0931ATMaxgF1/355347q1sfGqTvDxx4G1a2NtwkTZxyzstDJ29zEja
LX3rRR0bcPpy5HSsKFZnuyOe01uOOHddwAkdVmU1kO/18JKqo2WiUBj340Zj
ePd94jbiTJwAOtLLbNj/VkTqUIA6XPU2Q9tOUEN5WBTgplbEBtBbgbH/FNA5
vY0YNCivzfaQx8JzY8DHnQX4Q6/ZkqFme/36uXS0sAsUm24DPW/r+Xz4zNT1
jnM7i/ZdFv6VtWyKPZWQCyPZYbcG4254iAPiW6IHghKmJ3oXYPBimuJNwkMN
hIBcYwpyAm8CZ8tB85/YrsDtcbCB85LceNdFkwy0qjBz2Lbr9dM/bT/1S8Ou
uX/+ZuU/NcQnD2/RiwwL2u74wGzBzoTxGCcUx4Z72FehU2Z5SQICLJAA534e
DpYR3fTQ1iU5yK4b4tZBBs1CdDLrdVkKwl3rvC8GGEbR9YMGBVzSFOJg0YIZ
OWebIiTBV92/gCHlwdUTTGqfTOrYI4zEYQYvMEpd6XmMMYUt7evOxkp/Zi2k
LrSCMD73oTbFrGMxXAPX0Mre0Pe05IVUz2xVND2T55Xflf3BklSP+OwLzl0j
eSXT+32rGPh2GAQP5D86D8I+Vdoz+0qEOQzlKplE/zsehm0MQraT411Gisjb
eH5YAisrlvZtXGpiDXrQdkW2ggpw9P7cfv2NbsKJ6yeBQq4jUQxnzlDgRJlN
p2Da8+6HU/LobVj5xczPxvFzwBDkfYxVntM15zRTK5a6QmWrBF3/kiRzyD9r
SUHFOikjaovWBbC+DUg4SGWykY7/DQg5H0zHT125O50nUqx+AO5ASo6PE1Az
Jl4Jkd5KMLIRzWoqUuVw0Gw2o2p28X1v524Joeh+vR6Ct5aBwczudtEW7XMT
GwuYXT6lNQF5TJKlbIcIUxOwFxFcLTBYe3dalW0goA6baNlLOjOIkrdgyX9a
vQ9Cjo0SkPHqvZDxn1YhEcP2rTAStlzX/UT985LVn9qFJv+pRGXn7yQpJXQo
txUMyb+Xv8mna89/J6HUQO10QD2ihi0zpNPoqmJDKpZr2j7+lFnI4sPUcHB5
hRSqFqA/Z3AT4MW1zjdi5msaRIbUUj49sdjcRJ6Gwn4M86jBkPIT+bpCF0Td
UBFk3+DckfIsm02uDnIvH1J7DfGfBngfDQHcK7o82GKsKfKtpAg6fvH09Aud
OSj5IH1RNtaDsk4S70/OGk5qL5YrASQsSY3FGuxNuSrn5eWt8h+jiqiUCemT
h5+9fUsOdeaLRw/gCynOk2G+BrtqVbQMO2Tpal1fJe5LJGpbda2G7Yetw5QI
WLLZtqrT6bqqALz5Ldd7IA9htLoAoIdJ8mGanvKcJN5QFgO3TKpghtUhpvMC
lwj6TIEZNLCXxHPaknBE5lSz4y/fPKdUQenzbHm5RjfHvb/g3/u2UU3pKEjR
t4neyaJuXnFA1lPxBcvGn1OKhVg7OMwJWtQsx3PgrwAr5aYnRy+O0E+QIuDM
fp7prFEg/F2CsMdF6nVSrD+9OqltxAfmq8C1cePqVjb14SePH2Np2a9tLx4D
7yFObmUbjYLhZSRHVAl6osLibcjhIpvlknUbUQbwHKYDMk1h21cyOCzvCaff
OSTygIWcPqNoFVjMYfri3tFIAhfN1DAL2SeWtFyb44qzbgwFwWQD/3kg4VPa
uYk3pc5BYbdQpUhLX+BgidlLOY+f3D+4b8sEI2DY6lA4iMLtCwMJ/DZwO15S
Kicey2yQOFHCl5INA7/+BqQESclyfkvEC6hJOoBRWN4SJtXTB83buC0gNIzz
FC7zCq3K7SPnJ5p33t9hFjeV7AcLCSwyLiaSmYjVok7geiguly40dzplD+vr
IqNJxuwlvrA5t9D625TTco6FRDB4PquTF8dnT7598TVs/h9w8w+IGVOmoONT
/cvj+4+QLIS5RodP7PDp3oP99Cq7Jn6KGX4wYHC6ppJq2bKmhF/z7DavEik9
cHr6RwfBAXKJs+enZuZHjz7BbxCo/+9PJ0/k68/u3weA9unrvQOeLpHpFmtK
LoP5idAmNTWltBD9L6TWl+/pfETIo7NZlXNJwrL34ujJN/su3x+ixlbgwEtk
kcNqcI3IrUFWbWQTaK/Qa6aYrrFukUEyfGvRihcQ9c0Ab7kqnYEXIIcGolyS
XWfFnOw1sUEMxl09kDoxNdz4zjgjuyxf1pJoB8NpkI5QsPZyELZyB3GgHvDk
G6BmBOIeusDzv7CcOv0r3SsmOeyhvCuj/GXqvBUm0JpM9/tCPYmafZFRCI8K
zq4xmJCcD2Gh1+s5iuGUZgSTRC1yU6styZfXRVUu6Rl6kn4HAOYKC6amBeY0
EqeMfSkfVed6+ZJSKuGHEUKoxFRjgAbRMNp2LtkfMr+4wFxS8KspGeemNGcD
8UWSNosFXC9PzSiJtYrKLhU4xT2zUlP8Bg2N94xl+lDyPAVcg7F7aY3TfvIv
Fl1M6bw/LTlbFyo0hkpNDSGnl00p0HKa4SFyhffIVHi5xCwzKyqnUyeFTXAB
tJsjanBZgD0ceCLgi1Hags/OMB7wga3bVBZEGrXJP+tEfMP9coBIH1M+r/O8
Armvb4k0Na0u2by6tH91WIglaxpK1ZcgAcMWMd9h2KmyaoW9tEafnWPmMq4O
w6RjxORRInnKarz0SU4tK+D5JBaBrLSuOHCYprTIddrKXfDrqTuJppSBaBxA
JIDGpJdITvE8i6UDSx7ROVcnJcaSehhG0sswUp9hnDTMnda1ZKDknHGGohKE
x6xeeAneq5dYSwr+R3gKZQbR4naUyUwSyxnS98QZ8PEB9l1viqnaqWhOnjOI
8oCcAC1FjVlMyd4vAqGgZ5Ioqibex9tb+CP+7LStaeLVyyeapW9JDpg18H2R
g1BCYjc3yvYJaAWw3c9k434Kq5TnMNxaLgpJCwY8oPjjbw/lQLx1Jnp8ERNv
XoMUfFqgJHCIDXliYDmK8+dw1hPEDPGCar0ye4weGpjKL8ExKDjxWoqWW3Lx
4aaHPa5bmg8AvsK4o/w6V4e3n55E7KpEsJDgSZNZKUJSiSOpUOhWkjXLWfJy
WWCiALL+MZJMojS7xXRKE9xoxBfFS7DoXeUcVAjETeSsFS/qbKaGFpw/EeT8
nLIPJvmbVYnks7zVrMBIXqmRvEatX+XEu2JxieT5RAER03ym6REnNiKVUqTA
JRY9AKGo4NJxRlEp6hqdwV3huKQJsEZzLnO7ZnfkAMXfiJLJtXjlXrD4c6vp
ylkt120iSUZv5e7ScbYW1KmnU03Sr0v0KMkWqznVIGXSw6OeMBupNSRkURGU
r4CPZdPbsVm0pkBm+cku0bW82I3FeQboZHefzCpH09fL8maez0QBIlIzWVFv
6OabF69zvhOy5WtaVrrIUQy3aVMXcAbhACxn1phFel3SoC355qpMmeCuy/m1
y73BdXXdUwELh2Rn2wTDWblIX+ZkPgQiP5pVBRymr+GcS5QnmvLzG4l6Tfjg
UXm7Or9YQxMggXM4WeqQml1kUvfnJtlIAEgYgOdlBiIU7GBdY/rW5+U6/Sqv
LvMK9ED4/6KEP+dl0xQjYMvZHP6EPR2lT7IK/v0yB/FhelWUo+Rr0CWBR03L
9Hn2j3/ArTRKj4qrdZY+W5ej9OlVtb6G/y1nt5L6Nvt7cZ7+e7kUh2i7ssQu
qQzIkjaZdEJMWQuLEqsIWgC+rYE3ps/K5T+yef4P2JD0aVGSh84ZaEYX5RIk
Amp4jEl/D9MS208upT3wDmj9ZWObYg5gat7KafwEMxfrkYKExgn99hcQTp4A
W6ch1tlNXgAc06sl3sJAsLr/3wBnBXSF1m+K7Msrau1G+gpI7Dse6Em5mGZ1
ozvDrz/Ar1+SDwF2wgbcmVEzHo9TRCaijhNwo230mA9onf74wdEKfSCKN0dv
xXpVi8JlVevcNJ7li3LJ1kGxKSJvMeeGdHRK+xq1VdCm//vpty+s0zfJYW50
PFc2kD5LH9FLU0uCQZ8N0OxNln6A/uvicnwGv6JRgt2eXp3++eVYOfLI9aRE
Lp56XpYrPjv8MiWUmGP9dpzc6M2UPs2kKYNxXyBgJ0/xXiImCnx/zgCdkWxz
wDlwQZj4idvS5yfVNd07eXn9aB8LPgRffgJfJj+N3Uf/u+ubMXQxrwpHVEbi
wWcHk/uTg8kDM/fB/fsPDmfnjw8PzVeuy1del4N2l4NWlydel4ftLg9bXZ56
XR61u5ivqAQFbNWBqTvxvL1P69oxX2e9NrS0Y2i5RT2Uxlp6rZfiq2Qf46xc
bEcSEkjgnlqLREMt80aSN/gaHeY5DojPyF65vRHIkNvajwDbCi1JuJutvbJI
TajeB34+Mk2DL+yfiS2jZXco+ML+yU2PVG8a7Sv3xUe8v9gUv/loAwAfMQDe
5B2fnyLNWmuMN2utzzazyzCjPPG//Ch43wuw0fp81NPPnpHIb+q4JKb2iuJo
qu6KIWRD92x5RlauaR6LrnyV1fj+yH55p0SnP35wlvMX5lxIJ3nlZ64mXewD
nnD0ThkR1TE0P6KwnBiqr6n8AjSX0bBsNpkf2nWaQVQsqroZBfOjAYyGleLZ
y9K9qhq7LtvTyN6Eh7LAhzqxCiiLIQlP+AzJpgDm+Woi9gnJyTKHpS5AUzii
M523f3gK5/ZEMICPzRugRlFM8suS5OZE/LheBbLvArPsk9YoLOLlt6dn6T1c
AfIYKkhxT15KDp2ql/7x7OzlvQeTB0RefyyxHIXsLokB+C1a01fwfcbehjj3
Paodg2N+9Lda3rOfsJV6jCU6ehsn+HS+Y2FhB9fD9K80inlW5+QhhxixT9D8
AATwA2Prh6MfDnZMauAdjhQmZQmbeyVZZPCxajNer1xfQ1Dtjl5MGJOg68ZJ
AqCT8wHAmFBxbcHBLMc1QZNvbWd0+yuWhJghIzxqj3AOcm7FRJoh4ij2ywFn
KpjQStorIx2ILqBxVV+vdqz3wPfJ2/eyNSKH/Mp3SF2gd94jdcn+c3eJHyY/
SMWT/QVFxZKHwhPH0rp4dcihFSNOdznAlvyxHXfcFRMFy8E2VQ6ZSJxdnxlk
0HVkGT+zvXmxKJrwzrgqV66mj5idGIhhvMxEKHPUsRivHB4I4784n4sC1322
FtkbdL8bP3RETX05x8/4HMXP2ifO1u92dP74Hks70rKH/qQFgLHjZ2LfWa/Q
icZMsvNQx4Y7DyVTbPOtR72GeGXz6ZYWQg5I2N2Z1iLEtx27J6KfjVyaXXSL
rha4QWzn8qnO9CVF0Eo4b/8vXJ//f3tH19s2jnz3r9DlpUk3ujZ20nYD3BW3
2O4XsMAB7UOBRVEotpzoqlheSW6Srfa/H785JIeUZMeNncoPu6k0M5whZ4Yz
Q1I8/XhyAJ2d3KFFEd5mCp4OzUfWsx9pz+64R9/qnNvXX2uj5aEZM3zbXsGr
sKnKwQRjc+KYZJXCur0Uli3gm5Cc12nhl4O+I0Mxo8cUyP/spnyuDDitDf3B
f+kuVf7vjj5BI1hOIGKg1Joyul4lv1s8i1a0aNnNJ4i1I07RnaXU3MU5+DY8
yBCC31twtx1nQSEdL7Gx7bcEIT4oi2WMcYG6QVgiKISCEzGQ1hPzVnD8pGon
5/WW3beOu6gnP7959yT6c5WWd+wuDlEEKYkelNyp8AV+tvN5BrJ7w6sQIlEH
ryJKSeLf//KHAQLO0Lxn9+SU5J5WtQFWXABI5VxV7IZBWsMSa0vZYpqvaNV8
DpcAzQotJXvOO8LwYah1OJ7MtIgDe7akinVVzDxaxy62ye/ksvjMorOWTR1I
YrzfwZKkafwGmAkVcASfYjLZpbcE6AQzYk9jEIRVr+KCXbmIQWFwqKXjtk4H
EOdQveebHInkzC9Tk8e4kMCu7x6jLoJB00BFehleF8S/cOV+pgrMBD1EHG9J
xNMtieg8+zAKQbR4TaXyYq8T0G565Do8oxGhzSnd0md2XR/tlPHZ5OyF9VIE
IK0J0RpeX9ACASSPXkU5ll0ozM7t0n+xy6ZHcNFS1Ubkmqmq0XRfthzTjHU7
q5FfvtTJxYREv8Ny5CbLkQrljYFy5qKcOSg/GSgvXJQXDsrPBspLF+Wlg/KL
gfLKRXnloPxqoHzvonzvoPxmDuVzByWRKGIBd9JpAVebD1vCEsdcsB9cocOf
4pjfxY0WtNHYjZYFW9Vj0lltNl3bdNY1G/PPZmRL40hnP+BojR5mZnmN1npu
iY3W6Uax3b811uIIXaANyRahrXVE0wMSNQgBBM0YCFw/7B9c/G20MUsNaNrX
pPHWfeitXDWwbWNpGjA4jhA/y0gC5AB7Hgn8yIo3v/gUOdQGjmx1WqOdoyPh
d3Z3mH3yspUD/GdwgC28j/uvvI9GP7B7r8UZG54Jyn21M/FRErUtRB4aExtJ
5mVxrb7+wrY9/Wd0qGyBbWJPwcs3kXp5dsQjFpE/HYtPALI/y5ReRM5vmh+p
5/Kx2KGcsIvN2J1ySFziJmq1rtkc6AMlKlOzalH0B2NBlcmJvovNSNAuZb/R
YVaVZ0RyCxwpInEuwoUk+vvbbhctKAWonfmp2cUlu4QbKBM5r5FsDEniVIIs
ME+iw/nN7AhJLDYuIDEi04KnjDO7dAZgZM22QxJKoCFQLCoJcXrL/u/JSH0J
W3tW6nK3qpJL0o6XntFNHEUyKbJmb0t90sO+ObCVIpIUoko9n3lGc0T8qZ0n
oumy0jXhT6S2oqNr6+c4OiRomH7ek4b21b91NdCvg120sK8ebqaJvXUR18ZJ
oIE++ujTSN9zVys9ZZyDKZnw6Hfo0ljNeoaWBpSgDXU9RfDSAm8mwiR8feLr
9A2bPX2YZs9amu2uAZ18FTasIU3wIvSfihx88ERO07hnxrt+rYbGwYa6TQHB
4iGEN4Ohtg53+e4R77hdua2IZ4hmOO7m0cxJzwClpxm0VOsfS0BmW6PNUCej
GQ9G4xhNtJtWM95/qznbPavpPYeFw0h/6LPWnDbxZknfrnnupnWe7b91+leh
92tOOx2MZk+M5nT/jSZUC9knozkbjGZPjAbZDMl/+2M09u4fA37X4kD1N+jJ
4IrWpN+K1mRY0eq6osWY+DprWu6hCwYyuDGO+ygqKBsuafXXuU4s7G6lWpjf
vUwzLbXqYFNfKdPfdrV6y95scFUcd6hX74a3vZc0ZTyYzd6YzVCwlpLtaKJy
2i9ROR0SlZ3bejekKUOasoM774b9V92bbdt/hT4fNkKt29CwEWqIkAG9IbHc
+/nxvhLLwWj2wmiGtFJK9qBT2P7ug7oXf3Gvm0zWyfFH8K28OpR91QB+1uB3
epdBPCvoPeK9vnEQOITNfu/5zw9DXuq/fGAKRv4TB3yPPApA/sjFHWOQgm+M
6HvwHiAJQeA5VPv8tDx2CvCUZA349EFjPhiD07EKU7PVpUVDQreb3iuJ8PcE
1UvU7RucM3Bm+/nzRnb+CUZBvJuAM79jghPkwce+ycM99l0DviJhDdgpPM7s
DnW3RhHd4u1jw+M1IqXHCBanFjJQHKndpE5bYDtbNH/XwUPI90wW7KT2JHBS
W93m4npAUQPl9wTA71Pxc9tZ5Rzdtgnxg87yxomLgnhUegXlEnhVfeSaH7Vm
N+VUtbhMTxwEr9JLdufVsf8k9oSexP51wb8Ewzk4Ng6TCxrsQ4ngWrG6YNcd
qM8d5ikRTc87lAD/RC/tAn6T0SEwZnGXJzDVI03P6A5Ak5eF+U1qurA7ohcH
0ars5zS/49fS2O0dHYOm4D8mR8cmI6eEMXq1ZyX6YnRRlPRDkODSNnqraVaL
J/Lbjqbkouvo1Wv/HG3vnLv8WNEvaTL7+GYxk18sesuHzKypb/AZRoa/3qcY
GWrPcv7z5xuU4Nf9uiJD3nr9nrWObVEbyvcYd18jWSS68qk902JQ9XLDIku3
/GnYO2RRCtVchUU9aL661ZLrll3G4A847r34g777p+9bP3UK37JMLyMHkad/
fMeDml0NIB7DrI9Vs4dZH+Nu1638wZdW9qy/+lbV9yZK2qJjVkXTwTVv3zVj
p1O/mmseQvtgaO85x/l4QvvtKd8w6XPcBwntv/VJv+/56wdPhd4lWb7LRdQ1
tjKPH3slFTshP+RUGHe77i4ebY6wZ+GWZ5p7POHW9lzG4A847iMLH0bwrbUZ
KvpplefR7+yi3Hf0q+0/ZsllmVxHX+g2AqIn2e0PchcAhWRfdp8JmGIuL1nx
34o+Ig9WeRo9EQPC7izlC/ns2hX+EXX5E9DnkYAesW0i5U3E/ozkv9JFcpGn
r+mDi6LI02QB34rrcvmjRj7llzry0OaS6MNSA/hhnkZ/0GcfIKj8fVHald7W
pKcs6scYTqRweFMo5t+vLVTNHBxteuHR4hIFvSBWsiwqdqk67aVVtqgnY7RD
qjK/9PYEfSm7AMirX3bkOMDq5yRfsZFU1CldFHRaVDUb84A4zNc5lyPbTDlw
zjiDny233QQQPgoMl3/kFFa8imzi9Dq268JQb7HdwhKfP8XkaGWnhTeOT+Lo
pHq9Pn42I6lINs/SMkzEGttID35etKAG8cH5zSAVr/w6JwricznruzKd20SK
iF5Il/B8JUgqQOSG78GKp1fJ4pIoZnZN9zRdLw0llEpF7ys8Z2FXQid+AmuR
IxqnvZjM3ShsdZPV0yuZOiFYPFPk2hknNem1CzLFIvZGlLkuizxPS4tD/npZ
FnVBBjcuyuwy02Pj6YLGJRtzQDL9vg6MX5kWZPCvs794n3lVierPyQuvwElV
FdOMjSG8ztCFp3Lx3DSml1kWfNyDKHYa7ndjmp8rYlBJOb2681NmnQxyWc8w
aAjMiUAtTthONU8HGvOxhav9G9ManGMHel6UN0k56wD+KRb3cMoLJ9u4WPKo
cF4EAZnB4Z2hOw5mYy5s01d+ByHAatOFW204badPUdyoK/pTH7r8/YHjIdpm
Tag4Hn1PFG7u+gmbQkhxQ1rrEdrTV604T2EPeCTHxW4VNywrIiPWAu4fHBn8
HqKflTMTSuck3VpMQzMr9cuvfBRw1bCoebutr0/o49nbnUlIgraxMAxvl8bk
YfszvlXTNaPr9mJMAtIF4cx6o15yPDYdU/nDwQiJ61a1SyyCpsiFW+V1gBzn
HHQHzQ5LGivSYSPuxOiJyCsIfBmgFuDEJM+uVmPVeUQXEK8CsdMgchs2G2Gq
1bgSonmUicxG0IWQf5s1MjvUhdRIIDafi3vbEW7SxepaxPberrglNGJFhyso
6XhBTT/QyV4R0duER4AOf0RsHdz6G/Hrgdl+fqNkxOEhZFsvWu1Qqt4fjJQh
3kLdoYv/dJirlnxcInzDvd/3dCICFpxQSp2IiO7j2UWPblClHQ8BnpsVNQ1W
/1wlSMtt2aJjvBDZXPtyeQ8i81zMp+uItkNkqjfE6NkAMr5XZt0gjFxMPxFv
GhdzMiLldZJb7RsOAyKSqT39K6AwXkTKLpyCijztwa6J7IxSsJehZ8X0q5N6
pmEa3YhQMcgstSKKJivl9CiTI3QnBOKcWDEf+QqLleeWJJAhiR2nwCdyglMu
pxUv68OpvIphQMFeI1M5nMPxAASbs+FkbWDxKRvhhU/pyjM7EzFgQ5q/ioBM
Lg/nWU7mZdYjRyYAJ3x+mOS5cCKVC6FDljwX79LrZX2HkyoWqSDlUopMjllN
1pqT3AjJEisyX0t1RMwAAs+yqlwtZb5isO/GV+BxMLAi0Kw4TY8t4rGvUrLI
H2LA2ZFCAvXgYep1Wl8VaCyFgrPb6UuovivDRC/TRVqS8ACaKiUkNbJY5HcW
p7q/KOBKpAOwVYEAXSAFpb52Vtxgc6NBU1oFW0J0gE2xnS5X1qdNulMxzeoa
2S+MrKjkafckx9ApzjvcwiRQqn3HAn9bgd4U3a1aaXUzkyudRfGBFts2rNUt
Rd0pcmm6zitI3mSPedtzVy6tqfRMKhEzBVogZrvPWUUAaGiRlmVRstGtTOca
gCTTwwfH6/LXZZpUhb8E7CJYRX1gqy6srpSzV57SuItnzay++dRFZMvCOCJb
LHbQeMBtqSwIL92MACYELOzmJODM6+QAFv3439GzOn1GqdL/PAOQDhVfFmfV
VtpECmJ4Vjd8I4b5G1N/z0HfCX8krMN2OQ0KBqBIL5MR1bENHDzxIrg2pC0d
ljFwH+e6Q4cx2/pawZTpQeA2S3Jhu1mSixc0bz2QbeUg6EclKBg/SABNYBC3
YqHxshr9i0QmcqcBnD0FylWRz0imMmdCIyMP1iIFxk2S1XQDDmvBnZ2gtQuM
ZFnFPJfDDcmcPUCPAZWAj7v1CYJXTa9SR8oOeK2dGXXrTGNl1+5N2hyCZObm
XQZAoyiFDAcrWhsBgNw6BVt2XxNzhA8/pXfKOhsXh7x2LVPAIWOKh9wUGFEj
s58EHM/g3Xi9PWD1Sqz2uwRER5BR0aM+okcdRY8w0aMesbqmwXchxbCQZWqw
gFN1Is0c86hX6W2sJLaVke7jWxaEHMhhrArA4ubcTiJ0yMKhfLEMg+UN1XL+
vsgWSXmHsOJsAdAsgW7UHWgJoIDh91C6YRj7v02vYjOJLZNrPtVbqL2zlG5/
I0H6XWzsuFH24QCYKzDAZEL5pfFD8+3I0b3WnRqmWNmU6CGNRm3N07vofD+3
aiYSR0LRW3KiP0v7bFxbE81eCJasNBG97xIhQkxDR9lI835kPFDXJMr0ugjy
H5Be4IY49zAuMEPIHRkP8d7a9TSmN/MaVP76XEBZLIhvUIXQad8pKBPd8r91
sSzy4pLu/JF7y5CMwM7UjTqEpCZrQzaKtbEpFLCT6OZ/1D0t0goFdmgbm6zN
ihHdacYP7/zDUyrKkwviKKq01hU4hU3r5wa6y4yFDnfgjv4PlSTTJhC/AgA=

-->

</rfc>

