{"id":328,"date":"2019-08-08T18:03:34","date_gmt":"2019-08-08T18:03:34","guid":{"rendered":"http:\/\/rtechblog.psg.com\/?p=328"},"modified":"2019-08-08T18:44:08","modified_gmt":"2019-08-08T18:44:08","slug":"rfc-8642-policy-behavior-for-well-known-bgp-communities","status":"publish","type":"post","link":"https:\/\/rtechblog.rg.net\/?p=328","title":{"rendered":"RFC 8642: Policy Behavior for Well-Known BGP  Communities"},"content":{"rendered":"\n<pre class=\"wp-block-preformatted\"> <code>RFC 8642\n Title:      Policy Behavior for Well-Known BGP  Communities \n Author:     J. Borkenhagen, \n             R. Bush,\n             R. Bonica, \n             S. Bayraktar\n Status:     Standards Track\n Stream:     IETF\n Date:       August 2019\n Pages:      7\n Characters: 13429\n Updates:    RFC 1997\n I-D Tag:    draft-ietf-grow-wkc-behavior-08.txt\n URL:        <a href=\"https:\/\/www.rfc-editor.org\/info\/rfc8642\">https:\/\/www.rfc-editor.org\/info\/rfc8642<\/a>\n DOI:        10.17487\/RFC8642<\/code><\/pre>\n\n\n\n<p>Well-known BGP communities are manipulated differently across various current implementations, resulting in difficulties for operators.  Network operators should deploy consistent community handling across their networks while taking the inconsistent behaviors from the various BGP implementations into consideration.  This document recommends specific actions to limit future inconsistency: namely, BGP implementors must not create further inconsistencies from this point forward.  These behavioral changes, though subtle, actually update RFC 1997.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>RFC 8642 Title: Policy Behavior for Well-Known BGP Communities Author: J. Borkenhagen, R. Bush, R. Bonica, S. Bayraktar Status: Standards Track Stream: IETF Date: August 2019 Pages: 7 Characters: 13429 Updates: RFC 1997 I-D Tag: draft-ietf-grow-wkc-behavior-08.txt URL: https:\/\/www.rfc-editor.org\/info\/rfc8642 DOI: 10.17487\/RFC8642 Well-known BGP communities are manipulated differently across various current implementations, resulting in difficulties for operators. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,9],"tags":[],"class_list":["post-328","post","type-post","status-publish","format-standard","hentry","category-ietf","category-routers"],"_links":{"self":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts\/328","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=328"}],"version-history":[{"count":4,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts\/328\/revisions"}],"predecessor-version":[{"id":334,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=\/wp\/v2\/posts\/328\/revisions\/334"}],"wp:attachment":[{"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=328"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rtechblog.rg.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}