This document recommends ways to reduce the forged-origin hijack attack surface by prudently limiting the set of IP prefixes that are
This document describes the architecture of the Locator/ID Separation Protocol (LISP), making it easier to read the rest of the LISP
This document defines a YANG data model that can be used to configure and manage devices supporting Protocol Independent Multicast (PIM).
This document defines a YANG data model that can be used to configure and manage OSPF. The model is based on YANG 1.1 as defined in RFC
This document defines a YANG data model that can be used to configure and manage the IS-IS protocol on network elements.
This memo describes per-packet stateless strict and loose path steered replication and forwarding for “Bit Index Explicit
This document defines a concise “problem detail” as a way to carry machine-readable details of errors in a Representational State
Electronic signatures have a limited lifespan with respect to the time period that they can be validated and determined to be
Several IPv6 transition technologies have been developed to provide customers with IPv4-as-a-Service (IPv4aaS) for ISPs with an IPv6-only
This document discusses manageability of the QUIC transport protocol and focuses on the implications of QUIC’s design and wire image on