Wesley,
Thanks for the review.
The Replication function is performed by nodes within an SR domain. The
trust model of SR with traffic filtering at SR domain boundaries applies to
this document and is covered by the first sentence referring to security
considerations of RFCs 8402, 8986 and 8754.
I will leave it to the authors and shepherd to respond, including
whether to add a reference for the pseudo-code in 2.2.1.
Just to save one piece of effort, the pseudo-code technique used here
was introduced in RFC 8986, and is used in almost all the SRv6 related
drafts / RFCs. While I am
Reviewer: Wesley Eddy
Review result: Almost Ready
This document has been reviewed as part of the transport area review team's
ongoing effort to review key IETF documents. These comments were written
primarily for the transport area directors, but are copied to the document's
authors and WG to
Hi Sasha
An alternative to ISIS MT as you described a non default topology “NRP”,
but now instead we can use SR Algo sub topology that would have its own
prefix SIDs range and no need for Adj SID as it’s a sub topology or
network slice or link coloring, discrete color of the physical underlay