<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-cao-opsawg-ipfix-sav-02" category="std" consensus="true" submissionType="IETF" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="SAV IPFIX">Export of Source Address Validation (SAV) Information in IPFIX</title>
    <seriesInfo name="Internet-Draft" value="draft-cao-opsawg-ipfix-sav-02"/>
    <author initials="Q." surname="Cao" fullname="Qian Cao">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>caoqian@zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="M." surname="Huang" fullname="Mingqing Huang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>huangmq@mail.zgclab.edu.cn</email>
      </address>
    </author>
    <author initials="B." surname="Claise" fullname="Benoit Claise">
      <organization>Everything OPS</organization>
      <address>
        <postal>
          <country>Belgium</country>
        </postal>
        <email>benoit@everything-ops.net</email>
      </address>
    </author>
    <author initials="T." surname="Zhou" fullname="Tianran Zhou">
      <organization>Huawei</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhoutianran@huawei.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="13"/>
    <area>Operations and Management</area>
    <workgroup>opsawg</workgroup>
    <keyword>IPFIX, Source Address Validation (SAV)</keyword>
    <abstract>
      <?line 66?>

<t>This document specifies the IP Flow Information Export Information Elements to export the context and outcome of Source Address Validation enforcement data. These SAV-specific Information Elements provide detailed insight into why packets are identified as spoofed by capturing the specific SAV rules that triggered validation decisions. This operational visibility is essential for network operators to observe SAV enforcement behavior and analyze source address spoofing events detected by SAV.</t>
    </abstract>
  </front>
  <middle>
    <?line 69?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Source Address Validation (SAV) serves as a fundamental defense mechanism against IP source address spoofing. Despite its critical role in network security, current SAV implementations lack operational visibility, making it difficult to answer essential operational questions:</t>
      <ul spacing="normal">
        <li>
          <t>How many packets are identified as spoofed and dropped by SAV?</t>
        </li>
        <li>
          <t>Which interfaces receive spoofed packets and which source prefixes are targeted?</t>
        </li>
        <li>
          <t>Which specific SAV rules trigger the enforcement actions?</t>
        </li>
        <li>
          <t>Are SAV rules functioning as intended or potentially misconfigured?</t>
        </li>
      </ul>
      <t>This document introduces a set of SAV-specific IP Flow Information Export (IPFIX) Information Elements (IEs) that enable detailed reporting of Source Address Validation enforcement actions. These elements align with the SAV concepts and operational models defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, and provide traffic observations that can be operationally correlated with the SAV configuration and state information available via the YANG data model <xref target="I-D.li-savnet-sav-yang"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC8174">RFC2119</xref> when, and only when, they appear in all capitals, as shown here.</t>
      <t>This document makes use of the terms defined in <xref target="RFC7011"/>, and <xref target="I-D.ietf-savnet-general-sav-capabilities"/>.</t>
      <t>The following terms are used as defined in <xref target="RFC7011"/>:</t>
      <ul spacing="normal">
        <li>
          <t>IPFIX</t>
        </li>
        <li>
          <t>IPFIX Information Elements</t>
        </li>
        <li>
          <t>Template</t>
        </li>
        <li>
          <t>Template Record</t>
        </li>
        <li>
          <t>Data Record</t>
        </li>
        <li>
          <t>Data Set</t>
        </li>
        <li>
          <t>Exporter</t>
        </li>
        <li>
          <t>Collector</t>
        </li>
      </ul>
      <t>The following terms are used as defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/></t>
      <ul spacing="normal">
        <li>
          <t>SAV rule</t>
        </li>
        <li>
          <t>Validation mode</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-sav-overview">
      <name>SAV Overview and IPFIX Export Requirements</name>
      <t>This section outlines the operational requirements for SAV telemetry export using IPFIX, based on the generalized SAV architectural framework defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>.</t>
      <t>The SAV framework establishes four canonical validation modes that model validation policies:</t>
      <ul spacing="normal">
        <li>
          <t><strong>Interface-based prefix allowlist (Mode 1):</strong> Validates that a source prefix is explicitly permitted on the incoming interface.</t>
        </li>
        <li>
          <t><strong>Interface-based prefix blocklist (Mode 2):</strong> Validates that a source prefix is not explicitly blocked on the incoming interface.</t>
        </li>
        <li>
          <t><strong>Prefix-based interface allowlist (Mode 3):</strong> Validates that a packet is received on an interface explicitly permitted for its source prefix.</t>
        </li>
        <li>
          <t><strong>Prefix-based interface blocklist (Mode 4):</strong> Validates that a packet is not received on an interface explicitly blocked for its source prefix.</t>
        </li>
      </ul>
      <t>These modes can be applied independently or in combination on a router, following a defined validation procedure (Section 2 of <xref target="I-D.ietf-savnet-general-sav-capabilities"/>). Furthermore, when identifying a packet as spoofed, a range of traffic handling policies (e.g. discard, rate-limit, redirect) can be applied.</t>
      <t>However, the generalized SAV model requires corresponding operational visibility capabilities. Without integrated telemetry, operators face significant challenges in:</t>
      <ul spacing="normal">
        <li>
          <t>Enforcement Visibility: Observing SAV enforcement actions and identifying which rules were triggered.</t>
        </li>
        <li>
          <t>Operational Analysis: Understanding the context of SAV decisions and troubleshooting unexpected enforcement behavior.</t>
        </li>
        <li>
          <t>Threat Intelligence: Analyzing traffic patterns identified as spoofed by SAV.</t>
        </li>
      </ul>
      <t>To address these limitations, IPFIX <xref target="RFC7011"/> and <xref target="RFC7012"/> provides a vendor-neutral protocol for SAV telemetry. The exported data must provide insight into:</t>
      <ul spacing="normal">
        <li>
          <t>The validation outcome and specific reason for the decision</t>
        </li>
        <li>
          <t>The identity and type of SAV rule or rule set that influenced the decision</t>
        </li>
        <li>
          <t>The configured rule content that was evaluated during validation</t>
        </li>
        <li>
          <t>The enforcement action applied to spoofed packets</t>
        </li>
      </ul>
      <t>The following section defines the IPFIX IEs that meet these requirements.</t>
    </section>
    <section anchor="sec-IEs">
      <name>IPFIX SAV Information Elements</name>
      <t>This section defines the IEs used for SAV telemetry. These IEs have been specified in accordance with the guidelines in <xref target="RFC7013"/>.</t>
      <section anchor="design-rationale">
        <name>Design Rationale</name>
        <t>The SAV IPFIX IEs are designed to provide detailed visibility into SAV enforcement actions, enabling network operators and automation systems to monitor and troubleshoot SAV operations effectively. The design follows these principles:</t>
        <ul spacing="normal">
          <li>
            <t><strong>Scope</strong>. The SAV-specific IEs are used to report the outcome and context of SAV processing for data plane traffic observations. Interface, device or network-level SAV configuration is out of scope for these IEs and is covered by the SAVNET YANG data model.</t>
          </li>
          <li>
            <t><strong>Conceptual Alignment</strong>. The elements align with the validation modes and rule types defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, ensuring consistency with the architectural SAV concepts.</t>
          </li>
          <li>
            <t><strong>Semantic Correlation</strong>. The IPFIX encoding preserves the semantic relationships defined in <xref target="I-D.li-savnet-sav-yang"/>, which enables correlation between IPFIX Data Record in data-plane and YANG configuration/state data in control-plane comprehensive analysis.</t>
          </li>
          <li>
            <t><strong>Structured Encoding</strong>. The <tt>savMatchedContentList</tt> is encoded as a <tt>subTemplateList</tt> to represent the multi-field tuples of SAV rules. The structure of <tt>subTemplateList</tt> was chosen because it can encapsulate heterogeneous fields (e.g., prefix, length, interface) within a single list element. The list semantics (<tt>allOf</tt>, <tt>exactlyOneOf</tt>) directly encode the SAV validation logic (e.g., matching all rules in an allowlist vs. exactly one in a blocklist) into the data structure.</t>
          </li>
        </ul>
      </section>
      <section anchor="subsec-IEs-savRuleType">
        <name>savRuleType (unsigned8)</name>
        <t>The <tt>savRuleType</tt> element classifies the rule as either an allowlist or a blocklist. The values correspond to the check type concepts in the SAV architecture:</t>
        <ul spacing="normal">
          <li>
            <t>A value of <tt>0</tt> (allowlist) indicates the packet was validated against an allowlist.</t>
          </li>
          <li>
            <t>A value of <tt>1</tt> (blocklist) indicates the packet was validated against a blocklist.</t>
          </li>
        </ul>
      </section>
      <section anchor="subsec-IEs-savTargetType">
        <name>savTargetType  (unsigned8)</name>
        <t>The <tt>savTargetType</tt> element specifies the lookup key used by the SAV rule. It may be used in conjunction with <tt>savRuleType</tt> to fully define the validation mode applied.</t>
        <ul spacing="normal">
          <li>
            <t>A value of <tt>0</tt> (interface-based) indicates the rule is indexed by an interface (e.g., "on interface X, what prefixes are allowed/blocked?").</t>
          </li>
          <li>
            <t>A value of <tt>1</tt> (prefix-based) indicates the rule is indexed by a source prefix (e.g., "for prefix Y, which interfaces are allowed/blocked?").</t>
          </li>
        </ul>
      </section>
      <section anchor="subsec-IEs-savMatchedContentList">
        <name>savMatchedContentList (subTemplateList)</name>
        <t>The <tt>savMatchedContentList</tt> element carries the content of the rules that were relevant to the validation decision, encoded as a <tt>subTemplateList</tt> according to <xref target="RFC6313"/>. Each element in the list represents a complete SAV rule tuple. The content and semantics of the list are defined by the <tt>savRuleType</tt>:</t>
        <ul spacing="normal">
          <li>
            <t><strong>For Allowlist non-matches (<tt>savRuleType=0</tt>)</strong>: The <tt>savMatchedContentList</tt> consists of the set of all rule tuples from the consulted SAV allowlist at the time of the packet's processing. The subTemplateList semantic SHOULD be <tt>allOf</tt> (0x03), indicating that the packet was validated against all these rules and did not match any of them.</t>
          </li>
          <li>
            <t><strong>For Blocklist matches (<tt>savRuleType=1</tt>)</strong>: The <tt>savMatchedContentList</tt> contains the first rule tuple that matched the packet from the SAV blocklist. The subTemplateList semantic SHOULD be <tt>exactlyOneOf</tt> (0x01), indicating that the packet matched this specific rule.</t>
          </li>
        </ul>
        <t><strong>Semantic Interpretation of Standard Information Elements:</strong>
When standard IPFIX IEs (such as <tt>ingressInterface</tt>, <tt>sourceIPv4Prefix</tt>,<tt>sourceIPv4PrefixLength</tt> or their IPv6 equivalents) are used within the subTemplateList of <tt>savMatchedContentList</tt>, they represent values from the SAV rule configuration, rather than from the actual packet being validated. This contextual distinction is critical for correct interpretation:</t>
        <ul spacing="normal">
          <li>
            <t><strong>In the parent Data Record</strong>: These IEs describe attributes of the actual spoofed packets that were validated by SAV.</t>
          </li>
          <li>
            <t><strong>Within <tt>savMatchedContentList</tt></strong>: These same IEs describe the configured SAV rule parameters that were evaluated during validation.</t>
          </li>
        </ul>
        <t>This approach ensures clear semantic distinction by reusing existing IEs, without requiring definition of new elements for SAV rule parameters.</t>
      </section>
      <section anchor="subsec-IEs-savPolicyAction">
        <name>savPolicyAction (unsigned8)</name>
        <t>The <tt>savPolicyAction</tt> indicates the action applied to packets identified as spoofed. The action taken is a matter of local policy. This element reports the outcome.</t>
      </section>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <t>The SAV-specific IPFIX IEs defined in this document enable network operators to answer critical operational questions that are currently unaddressable without telemetry for SAV:</t>
      <t><strong>SAV Enforcement Monitoring:</strong> Use <tt>savRuleType</tt> (TBD1), <tt>savTargetType</tt> (TBD2), <tt>savPolicyAction</tt> (TBD4)  and standard IPFIX counters, to quantify SAV enforcement actions, analyze their distribution across different validation modes, and identify applied SAV enforcement actions (discard, rate-limit, redirect) at the data plane level. This complements control-plane monitoring via YANG models, providing visibility into actual enforcement behavior rather than configured rules.</t>
      <t><strong>Rule-Level Attribution and Troubleshooting:</strong> Use<tt>savMatchedContentList</tt> (TBD3)  to determine the specific SAV rule configuration that triggered enforcement decisions, including the exact rule parameters (interfaces, prefixes) evaluated during validation, whether for allowlist failures or blocklist matches.</t>
      <t><strong>Forensic Analysis and Compliance:</strong> SAV Data Records include both SAV-specific Information Elements and traditional packet-level details (source/destination addresses, ports, protocol), providing complete information for incident investigation and compliance reporting. Operators can use these records to investigate the source and nature of spoofing attacks, and gather evidence to support external trust initiatives and regulatory compliance reporting.</t>
    </section>
    <section anchor="operational-considerations">
      <name>Operational Considerations</name>
      <t>While this document defines new IPFIX IEs using standard IPFIX mechanisms, implementors should consider:</t>
      <ul spacing="normal">
        <li>
          <t><strong>Exporter Implementation:</strong> Exporters MUST properly encode the <tt>subTemplateList</tt> structure for <tt>savMatchedContentList</tt> and ensure semantic consistency between <tt>savRuleType</tt> and list contents. Exporters MUST also define the sub-templates (e.g., 901-904) used in <tt>savMatchedContentList</tt> prior to exporting Data Records that use them.</t>
        </li>
        <li>
          <t><strong>Collector Processing:</strong> Collectors MUST be capable of parsing <tt>subTemplateList</tt> structure and understanding the context-dependent semantics of standard IEs within <tt>savMatchedContentList</tt>. Collectors MUST associate the sub-templates with the main template for correct interpretation.</t>
        </li>
      </ul>
    </section>
    <section anchor="open-issues">
      <name>Open Issues</name>
      <t>The mappings between the SAV YANG data model and IPFIX IEs are considered based on the common foundation of the general SAV capabilities document <xref target="I-D.ietf-savnet-general-sav-capabilities"/>. The operational correlation is demonstrated in Table 1, which defines the values for the designed IEs mapped from the corresponding <xref target="I-D.li-savnet-sav-yang"/> SAV Management YANG Module.</t>
      <artwork><![CDATA[
+---------------------+---------------------------------------+
| YANG Elements       | IPFIX IEs                             |
+---------------------+---------------------------------------+
| sav-check-type      | savRuleType                           |
|   sav:sav-allow-list|     0 (allowlist)                     |
|   sav:sav-block-list|     1 (blocklist)                     |
+---------------------+---------------------------------------+
| sav-mode            | savTargetType                         |
|   sav:sav-im        |     0 (interface-based)               |
|   sav:sav-cm        |     1 (prefix-based)                  |
+---------------------+---------------------------------------+
| SAV Rules attributes| savMatchedContentList                 |
|   source-prefix     |     sourceIPv4Prefix/sourceIPv6Prefix |
|   incoming-interface|     ingressInterface                  |
+---------------------+---------------------------------------+
]]></artwork>
      <t>Table 1: Mappings between SAV YANG Data Model and IPFIX Information Elements</t>
      <t>The <tt>savPolicyAction</tt> element carries real-time SAV decisions applied to
spoofed packets. It does not directly map to YANG configuration node.</t>
      <t>The code points for these IEs are maintained by IANA in the corresponding subregistries of the IPFIX registry. Future additions or changes are managed via Expert Review as described in <xref target="IANA">IANA Considerations</xref>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>There are no additional security considerations regarding allocation of these new IPFIX IEs compared to <xref target="RFC7012"/>.
Other security considerations described in <xref target="I-D.ietf-savnet-general-sav-capabilities"/> apply to this document.</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This document requests IANA to create four new IEs under the "IPFIX Information Elements" registry <xref target="RFC7012"/> available at <xref target="IANA-IPFIX"/>.</t>
      <artwork><![CDATA[
+------------+-----------------------+
| Element ID | Name                  |
+------------+-----------------------+
| TBD1       | savRuleType           |
| TBD2       | savTargetType         |
| TBD3       | savMatchedContentList |
| TBD4       | savPolicyAction       |
+------------+-----------------------+
]]></artwork>
      <section anchor="savruletype">
        <name>savRuleType</name>
        <ul spacing="normal">
          <li>
            <t><strong>ElementID</strong>: TBD1</t>
          </li>
          <li>
            <t><strong>Name</strong>: savRuleType</t>
          </li>
          <li>
            <t><strong>Abstract Data Type</strong>: unsigned8</t>
          </li>
          <li>
            <t><strong>Data Type Semantics</strong>: identifier</t>
          </li>
          <li>
            <t><strong>Description</strong>: Identifies the validation rule type triggered during SAV enforcement.</t>
          </li>
          <li>
            <t><strong>Reference</strong>: This document, <xref target="subsec-IEs-savRuleType">savRuleType</xref></t>
          </li>
        </ul>
      </section>
      <section anchor="savtargettype">
        <name>savTargetType</name>
        <ul spacing="normal">
          <li>
            <t><strong>ElementID</strong>: TBD2</t>
          </li>
          <li>
            <t><strong>Name</strong>: savTargetType</t>
          </li>
          <li>
            <t><strong>Abstract Data Type</strong>: unsigned8</t>
          </li>
          <li>
            <t><strong>Data Type Semantics</strong>: identifier</t>
          </li>
          <li>
            <t><strong>Description</strong>: Specifies the entity type against which validation was performed.</t>
          </li>
          <li>
            <t><strong>Reference</strong>: This document, <xref target="subsec-IEs-savTargetType">savTargetType</xref></t>
          </li>
        </ul>
      </section>
      <section anchor="savmatchedcontentlist">
        <name>savMatchedContentList</name>
        <ul spacing="normal">
          <li>
            <t><strong>ElementID</strong>: TBD3</t>
          </li>
          <li>
            <t><strong>Name</strong>: savMatchedContentList</t>
          </li>
          <li>
            <t><strong>Abstract Data Type</strong>: subTemplateList</t>
          </li>
          <li>
            <t><strong>Data Type Semantics</strong>: list</t>
          </li>
          <li>
            <t><strong>Description</strong>: The content of the SAV rules relevant to the validation decision.</t>
          </li>
          <li>
            <t><strong>Reference</strong>: This document, <xref target="subsec-IEs-savMatchedContentList">savMatchedContentList</xref></t>
          </li>
        </ul>
      </section>
      <section anchor="savpolicyaction">
        <name>savPolicyAction</name>
        <ul spacing="normal">
          <li>
            <t><strong>ElementID</strong>: TBD4</t>
          </li>
          <li>
            <t><strong>Name</strong>: savPolicyAction</t>
          </li>
          <li>
            <t><strong>Abstract Data Type</strong>: unsigned8</t>
          </li>
          <li>
            <t><strong>Data Type Semantics</strong>: identifier</t>
          </li>
          <li>
            <t><strong>Description</strong>: Action applied to packets identified as spoofed.</t>
          </li>
          <li>
            <t><strong>Reference</strong>: This document, <xref target="subsec-IEs-savPolicyAction">savPolicyAction</xref></t>
          </li>
        </ul>
        <t>Additionally, IANA is requested to create new subregistries under the IPFIX IEs registries. The subregistries contain values for the <tt>savRuleType</tt>, <tt>savTargetType</tt> and <tt>savPolicyAction</tt> IEs. The allocation policy is Expert Review <xref target="RFC8126"/>. Experts should consult the SAVNET architecture <xref target="I-D.ietf-savnet-general-sav-capabilities"/> to ensure new values are consistent with SAV validation concepts and operational models.</t>
      </section>
      <section anchor="ipfix-savruletype-tbd1-subregistry">
        <name>IPFIX savRuleType (TBD1) Subregistry</name>
        <ul spacing="normal">
          <li>
            <t><strong>Reference</strong>: This document, <xref target="subsec-IEs-savRuleType">savRuleType</xref>; <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, Section 2 (Validation Modes)</t>
          </li>
          <li>
            <t><strong>Allocation Policy</strong>: Expert Review <xref target="RFC8126"/></t>
          </li>
          <li>
            <t><strong>Expert Guidance</strong>: Experts should ensure that new values are consistent with the SAV architecture concepts defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, particularly the validation modes and rule types (allowlist or blocklist).</t>
          </li>
        </ul>
        <t>Initial values:</t>
        <artwork><![CDATA[
+-------+------------+-------------------------------------------------+
| Value |   Name     |                 Description                     |
+-------+------------+-------------------------------------------------+
|   0   | allowlist  |  The packet was validated against an allowlist  |
|   1   | blocklist  |  The packet was validated against an blocklist  |
| 2-255 | unassigned |  Reserved for future assignment                 |
+-------+------------+-------------------------------------------------+
]]></artwork>
      </section>
      <section anchor="ipfix-savtargettype-tbd2-subregistry">
        <name>IPFIX savTargetType (TBD2) Subregistry</name>
        <ul spacing="normal">
          <li>
            <t><strong>Reference</strong>: This document, <xref target="subsec-IEs-savTargetType">savRuleType</xref>; <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, Section 2 (Validation Modes)</t>
          </li>
          <li>
            <t><strong>Allocation Policy</strong>: Expert Review <xref target="RFC8126"/></t>
          </li>
          <li>
            <t><strong>Expert Guidance</strong>: Experts should consult <xref target="I-D.ietf-savnet-general-sav-capabilities"/> to ensure new values align with the defined target types (interface-based or prefix-based).</t>
          </li>
        </ul>
        <t>Initial values:</t>
        <artwork><![CDATA[
+-------+-----------------+----------------------------------------+
| Value |       Name      |              Description               |
+-------+-----------------+----------------------------------------+
|   0   | interface-based |   The rule is indexed by an interface  |
|   1   |   prefix-based  |   The rule is indexed by a prefix      |
| 2-255 |    unassigned   |   Reserved for future assignment       |
+-------+-----------------+----------------------------------------+
]]></artwork>
      </section>
      <section anchor="ipfix-savpolicyaction-tbd4-subregistry">
        <name>IPFIX savPolicyAction (TBD4) Subregistry</name>
        <ul spacing="normal">
          <li>
            <t><strong>Reference</strong>: This document, <xref target="subsec-IEs-savPolicyAction">savRuleType</xref>;  <xref target="I-D.ietf-savnet-general-sav-capabilities"/>, Section 4 (Traffic Handling Policies)</t>
          </li>
          <li>
            <t><strong>Allocation Policy</strong>: Expert Review <xref target="RFC8126"/></t>
          </li>
          <li>
            <t><strong>Expert Guidance</strong>: Experts should ensure that new actions are consistent with the SAV traffic handling policies defined in <xref target="I-D.ietf-savnet-general-sav-capabilities"/>.</t>
          </li>
        </ul>
        <t>Initial values:</t>
        <artwork><![CDATA[
+-------+----------+---------------------------------------------------+
| Value |   Name   |                  Description                      |
+-------+----------+---------------------------------------------------+
|   0   |  permit  |The packet was allowed to proceed (monitoring only)|
|   1   |  discard | Packet was discarded or dropped                   |
|   2   |rate-limit| Traffic was subjected to rate limiting            |
|   3   | redirect | Packet was redirected to alternative destination  |
| 4-255 |unassigned| Reserved for future assignment                    |
+-------+----------+---------------------------------------------------+
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.li-savnet-sav-yang" target="https://datatracker.ietf.org/doc/html/draft-li-savnet-sav-yang-08" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.li-savnet-sav-yang.xml">
          <front>
            <title>YANG Data Model for Intra-domain and Inter-domain Source Address Validation (SAVNET)</title>
            <author fullname="Dan Li"/>
            <author fullname="Libin Liu"/>
            <author fullname="Changwang Lin"/>
            <author fullname="Jianping Wu"/>
            <author fullname="Tianhao Wu"/>
            <author fullname="Weiqiang Cheng"/>
            <date day="13" month="April" year="2026"/>
            <abstract>
              <t>This document describes a YANG data model for Intra-domain and
   Inter-domain Source Address Validation (SAVNET). The model serves as
   a base framework for configuring and managing an SAV subsystem,
   including SAV rule and SAV Tables, and expected to be augmented by
   other SAV technology models accordingly. Additionally, this document
   also specifies the model for the SAV Static application.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-li-savnet-sav-yang-08"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC7011" target="https://www.rfc-editor.org/info/rfc7011" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7011.xml">
          <front>
            <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
            <author fullname="P. Aitken" initials="P." surname="Aitken"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network. In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required. This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process. This document obsoletes RFC 5101.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="77"/>
          <seriesInfo name="RFC" value="7011"/>
          <seriesInfo name="DOI" value="10.17487/RFC7011"/>
        </reference>
        <reference anchor="RFC7012" target="https://www.rfc-editor.org/info/rfc7012" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7012.xml">
          <front>
            <title>Information Model for IP Flow Information Export (IPFIX)</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document defines the data types and management policy for the information model for the IP Flow Information Export (IPFIX) protocol. This information model is maintained as the IANA "IPFIX Information Elements" registry, the initial contents of which were defined by RFC 5102. This information model is used by the IPFIX protocol for encoding measured traffic information and information related to the traffic Observation Point, the traffic Metering Process, and the Exporting Process. Although this model was developed for the IPFIX protocol, it is defined in an open way that allows it to be easily used in other protocols, interfaces, and applications. This document obsoletes RFC 5102.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7012"/>
          <seriesInfo name="DOI" value="10.17487/RFC7012"/>
        </reference>
        <reference anchor="RFC7013" target="https://www.rfc-editor.org/info/rfc7013" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7013.xml">
          <front>
            <title>Guidelines for Authors and Reviewers of IP Flow Information Export (IPFIX) Information Elements</title>
            <author fullname="B. Trammell" initials="B." surname="Trammell"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document provides guidelines for how to write definitions of new Information Elements for the IP Flow Information Export (IPFIX) protocol. It provides instructions on using the proper conventions for Information Elements to be registered in the IANA IPFIX Information Element registry, and provides guidelines for expert reviewers to evaluate new registrations.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="184"/>
          <seriesInfo name="RFC" value="7013"/>
          <seriesInfo name="DOI" value="10.17487/RFC7013"/>
        </reference>
        <reference anchor="RFC6313" target="https://www.rfc-editor.org/info/rfc6313" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6313.xml">
          <front>
            <title>Export of Structured Data in IP Flow Information Export (IPFIX)</title>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="G. Dhandapani" initials="G." surname="Dhandapani"/>
            <author fullname="P. Aitken" initials="P." surname="Aitken"/>
            <author fullname="S. Yates" initials="S." surname="Yates"/>
            <date month="July" year="2011"/>
            <abstract>
              <t>This document specifies an extension to the IP Flow Information Export (IPFIX) protocol specification in RFC 5101 and the IPFIX information model specified in RFC 5102 to support hierarchical structured data and lists (sequences) of Information Elements in data records. This extension allows definition of complex data structures such as variable-length lists and specification of hierarchical containment relationships between Templates. Finally, the semantics are provided in order to express the relationship among multiple list elements in a structured data record. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6313"/>
          <seriesInfo name="DOI" value="10.17487/RFC6313"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-savnet-general-sav-capabilities" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-general-sav-capabilities-02" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-general-sav-capabilities.xml">
          <front>
            <title>General Source Address Validation Capabilities</title>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Weiqiang Cheng" initials="W." surname="Cheng">
              <organization>China Mobile</organization>
            </author>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Nan Geng" initials="N." surname="Geng">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Li Chen" initials="L." surname="Chen">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>The SAV rules of existing source address validation (SAV) mechanisms, are derived from other core data structures, e.g., FIB-based uRPF, which are not dedicatedly designed for source filtering. Therefore there are some limitations related to deployable scenarios and traffic handling policies. To overcome these limitations, this document introduces the general SAV capabilities from data plane perspective. How to implement the capabilities and how to generate SAV rules are not in the scope of this document.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-general-sav-capabilities-02"/>
        </reference>
        <reference anchor="I-D.ietf-savnet-inter-domain-problem-statement" target="https://datatracker.ietf.org/doc/html/draft-ietf-savnet-inter-domain-problem-statement-16" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-savnet-inter-domain-problem-statement.xml">
          <front>
            <title>Gap Analysis, Problem Statement, and Requirements for Inter-Domain SAV</title>
            <author fullname="Dan Li" initials="D." surname="Li">
              <organization>Tsinghua University</organization>
            </author>
            <author fullname="Lancheng Qin" initials="L." surname="Qin">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Libin Liu" initials="L." surname="Liu">
              <organization>Zhongguancun Laboratory</organization>
            </author>
            <author fullname="Mingqing(Michael) Huang" initials="M." surname="Huang">
              <organization>Huawei</organization>
            </author>
            <author fullname="Kotikalapudi Sriram" initials="K." surname="Sriram">
              <organization>USA National Institute of Standards and Technology</organization>
            </author>
            <date day="7" month="April" year="2026"/>
            <abstract>
              <t>This document provides a gap analysis of existing inter-domain source address validation mechanisms, describes the problem space, and defines the requirements for technical improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-savnet-inter-domain-problem-statement-16"/>
        </reference>
        <reference anchor="IANA-IPFIX" target="https://www.iana.org/assignments/ipfix/ipfix.xhtml">
          <front>
            <title>IP Flow Information Export (IPFIX) Entities</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 341?>

<section anchor="ipfix-encoding-examples">
      <name>IPFIX Encoding Examples</name>
      <t>This appendix provides encoding examples for the SAV-specific IPFIX IEs defined in this document.</t>
      <section anchor="template-record-and-data-record-with-sub-template-list">
        <name>Template Record and Data Record with Sub-Template List</name>
        <t>This example demonstrates the encoding for two observed SAV enforcement events representing different validation scenarios and address families as shown in Table 2.</t>
        <artwork><![CDATA[
+-----+--------------+---------+---------+-----------+-------------+
|Event|Source Address|Interface|Rule Type|Target Type|Policy Action|
+-----+--------------+---------+---------+-----------+-------------+
|  1  | 192.0.2.100  |  5001   |Allowlist| Interface | Rate-limit  |
|  2  | 2001:db8::1  |  5001   |Blocklist| Prefix    | Discard     |
+-----+--------------+---------+---------+-----------+-------------+
]]></artwork>
        <t>Table 2: Two Observed SAV Validation Events</t>
        <t>The first event represents an IPv4 allowlist non-match event where a packet from source 192.0.2.100 arriving on interface 5001 failed to match any source prefixes configured in the interface-based allowlist.
The second event represents an IPv6 blocklist match event where a packet from source 2001:db8::1 was received on interface 5001, which matched a prefix-based blocklist rule.</t>
        <section anchor="sub-template-definitions">
          <name>Sub-Template Definitions</name>
          <t>The following sub-templates are defined for use within the <tt>savMatchedContentList</tt> element to encode different types of SAV rule mappings based on address family and validation target type. The <tt>savMatchedContentList</tt> element is encoded as a <tt>subTemplateList</tt> according to <xref target="RFC6313"/>.</t>
          <t>The template IDs used in these examples are exemplary and chosen arbitrarily. In actual implementations, exporters MUST assign unique template IDs within the IPFIX session for these sub-templates.</t>
          <ul spacing="normal">
            <li>
              <t><strong>Sub-Template 901: IPv4 Interface-to-Prefix Mapping</strong></t>
            </li>
          </ul>
          <t>This sub-template is used when <tt>savTargetType=0</tt>(interface-based validation mode) for IPv4 traffic. It contains the mapping from an interface to source IPv4 prefixes as defined in the SAV rule configuration. It can be used for both blocklist and allowlist.</t>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 2           |          Length = 20          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Template ID = 901       |        Field Count = 3        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   ingressInterface = 10     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   sourceIPv4Prefix = 44     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0| sourceIPv4PrefixLength = 9  |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          <ul spacing="normal">
            <li>
              <t><strong>Sub-Template 902: IPv6 Interface-to-Prefix Mapping</strong>
This sub-template is the IPv6 equivalent of Sub-Template 901, used for interface-based validation with IPv6 traffic.</t>
            </li>
          </ul>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 2           |          Length = 20          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Template ID = 902       |        Field Count = 3        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   ingressInterface = 10     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   sourceIPv6Prefix = 170    |        Field Length = 16      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0| sourceIPv6PrefixLength = 29 |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          <ul spacing="normal">
            <li>
              <t><strong>Sub-Template 903: IPv4 Prefix-to-Interface Mapping</strong></t>
            </li>
          </ul>
          <t>This sub-template is used when <tt>savTargetType=1</tt>(prefix-based validation mode) for IPv4 traffic. It contains the mapping from a source IPv4 prefixes to interface as defined in the SAV rule configuration. It can be used for both blocklist and allowlist.</t>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 2           |          Length = 20          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Template ID = 903       |        Field Count = 3        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   sourceIPv4Prefix = 44     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0| sourceIPv4PrefixLength = 9  |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   ingressInterface = 10     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
          <ul spacing="normal">
            <li>
              <t><strong>Sub-Template 904: IPv6 Prefix-to-Interface Mapping</strong></t>
            </li>
          </ul>
          <t>This sub-template is the IPv6 equivalent of Sub-Template 903, used for prefix-based validation with IPv6 traffic.</t>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 2           |          Length = 20          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Template ID = 904       |        Field Count = 3        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   sourceIPv6Prefix = 170    |        Field Length = 16      |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0| sourceIPv6PrefixLength = 29 |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   ingressInterface = 10     |        Field Length = 4       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </section>
        <section anchor="main-template-record">
          <name>Main Template Record</name>
          <t>The main Template Record (ID 400) contains fields for exporting detailed SAV enforcement information including the validation outcome and the specific rule content that triggered the action. The template incorporates the <tt>savMatchedContentList</tt> element as a variable-length <tt>subTemplateList</tt> to carry the relevant SAV rule contents using the appropriate sub-templates defined above.</t>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 2           |          Length = 28          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|        Template ID = 400      |        Field Count = 5        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|  observationTimeMicrosec=324|        Field Length = 8       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|      savRuleType = TBD1     |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|     savTargetType = TBD2    |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0| savMatchedContentList=TBD3  |      Field Length = 0xFFFF    |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0|   savPolicyAction = TBD4    |        Field Length = 1       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </section>
        <section anchor="data-set-example">
          <name>Data Set Example</name>
          <t>The following Data Set contains two Data Records that represent the two SAV validation scenarios in Table 2. The <tt>savMatchedContentList</tt> element for the first record encodes the complete set of allowed prefixes using Sub-Template 901 with the <tt>allOf</tt> semantic (0x03). The allowlist includes three sav rules. The <tt>savMatchedContentList</tt> element for the second record encodes the specific blocked interface using Sub-Template 904 with the <tt>exactlyOneOf</tt> semantic (0x01), indicating the packet matched this particular rule.</t>
          <artwork><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|          Set ID = 400         |          Length = 88          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|              observationTimeMicrosec =                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                      0x5D2F0A0000000000                       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| savRuleType=0 | savTargetType=0|     255     |   List Length  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     = 33      |semantic=(allOf)|      Template ID = 901       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                ingressInterface[0] = 5001                     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|              sourceIPv4Prefix[0] = 198.51.100.0               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|sourceIPv4PrfLen[0]=24|         ingressInterface[1] =          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|      5001     |         sourceIPv4Prefix[1] =                 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  203.0.113.0  | sourceIPv4PrfLen[1]=24|  ingressInterface[2] =|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|               5001            |       sourceIPv4Prefix[2] =   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|         192.10.2.0   |sourceIPv4PrfLen[2]=24|savPolicyAction=2|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|              observationTimeMicrosec =                        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                      0x5D2F0A0000000001                       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| savRuleType=1 | savTargetType=1|     255     |   List Length  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     = 27      |semantic=exactlyOneOf|   Template ID = 904     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                     sourceIPv6Prefix[0]                       |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|sourceIPv6PrfLen[0]=32||     ingressInterface[0] =             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       5001    |savPolicyAction=1|            padding          |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </section>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
