<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-opsarea-rfc5706bis-01" category="bcp" consensus="true" submissionType="IETF" obsoletes="5706" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="Operations &amp; Management Considerations">Guidelines for Considering Operations and Management in IETF Specifications</title>
    <seriesInfo name="Internet-Draft" value="draft-opsarea-rfc5706bis-01"/>
    <author fullname="Benoit Claise">
      <organization>Huawei</organization>
      <address>
        <email>benoit.claise@huawei.com</email>
      </address>
    </author>
    <author fullname="Joe Clarke">
      <organization>Cisco</organization>
      <address>
        <email>jclarke@cisco.com</email>
      </address>
    </author>
    <author fullname="Adrian Farrel">
      <organization>Old Dog Consulting</organization>
      <address>
        <email>adrian@olddog.co.uk</email>
      </address>
    </author>
    <author fullname="Thomas Graf">
      <organization>Swisscom</organization>
      <address>
        <email>thomas.graf@swisscom.com</email>
      </address>
    </author>
    <author fullname="Samier Barguil">
      <organization>Nokia</organization>
      <address>
        <email>samier.barguil_giraldo@nokia.com</email>
      </address>
    </author>
    <author fullname="Carlos Pignataro">
      <organization>Blue Fern Consulting</organization>
      <address>
        <email>carlos@bluefern.consulting</email>
        <email>cpignata@gmail.com</email>
        <uri>https://bluefern.consulting</uri>
      </address>
    </author>
    <author fullname="Ran Chen">
      <organization>ZTE</organization>
      <address>
        <email>chen.ran@zte.com.cn</email>
      </address>
    </author>
    <date year="2025" month="May" day="12"/>
    <area>Operations and Management</area>
    <keyword>management</keyword>
    <keyword>operations</keyword>
    <keyword>operations and management</keyword>
    <keyword>ops considerations</keyword>
    <abstract>
      <?line 81?>

<t>New protocols or protocol extensions are best designed with due
   consideration of the functionality needed to operate and manage the
   protocols.  Retrofitting operations and management is sub-optimal.
   The purpose of this document is to provide guidance to authors and
   reviewers of documents that define new protocols or protocol
   extensions regarding aspects of operations and management that should
   be considered.</t>
      <t>This document obsoletes RFC 5706, replacing it completely and updating
   it with new operational and management techniques and mechanisms, and
   introduces a requirement for an “Operational and Management
   Considerations” section in Internet-Drafts, before they are progressed
   as publication as RFCs.</t>
    </abstract>
  </front>
  <middle>
    <?line 97?>

<section anchor="to-do-list">
      <name>TO DO LIST</name>
      <t>See the list of open issues at https://github.com/IETF-OPSAWG-WG/draft-opsarea-rfc5706bis/issues</t>
    </section>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Often when new protocols or protocol extensions are developed, not
   enough consideration is given to how the protocol will be deployed,
   operated, and managed. Retrofitting operations and management
   mechanisms is often hard and architecturally unpleasant, and certain
   protocol design choices may make deployment, operations, and
   management particularly hard. This document provides guidelines to
   help protocol designers and working groups consider the operations
   and management functionality for their new IETF protocol or protocol
   extension at an earlier phase.</t>
      <t>This document obsoletes RFC 5706 and fully updates its content
   with new operational and management techniques and mechanisms, and
   introduces a requirement for an “Operational and Management
   Considerations” section in Internet-Drafts, before they are progressed
   for publication as an RFC. It removes outdated
   references and aligns with current practices, protocols, and
   technologies used in operating and managing network devices and
   services. See <xref target="changes-since-5706"/>.</t>
      <section anchor="designing-for-operations-and-management">
        <name>Designing for Operations and Management</name>
        <t>The operational environment and manageability of the protocol should
   be considered from the start when new protocols are designed.</t>
        <t>As the Internet has grown, IETF protocols have addressed a constantly growing set of
   needs, such as web servers, collaboration services, and applications.
   The number of IETF management technologies has been expanding and the
   IETF management strategy has been changing to address the emerging
   management requirements. In the past, most of the existing IETF management
   standards were focused on using Structure of Management Information (SMI)-based
   data models (MIB modules) to monitor and manage networking devices.
   Currently, the YANG data modeling language <xref target="RFC7950"/> is recommended to
   monitor and manage the IETF protocols and the networking devices.
   Management requirements continually evolve in the IETF. Therefore,
   the management protocols used should track with current IETF
   recommendations.</t>
        <t>Protocol designers should consider which operations and management
   needs are relevant to their protocol, document how those needs could
   be addressed, and suggest (preferably standard) management protocols
   and data models that could be used to address those needs. This is
   similar to a working group (WG) that considers which security threats
   are relevant to their protocol, documents how threats should be
   mitigated, and then suggests appropriate standard protocols that
   could mitigate the threats.</t>
        <t>When a WG considers operation and management functionality for a
   protocol, the document should contain enough information for readers
   to understand how the protocol will be deployed and managed. The WG
   should expect that considerations for operations and management may
   need to be updated in the future, after further operational
   experience has been gained.</t>
      </section>
      <section anchor="this-document">
        <name>This Document</name>
        <t>This document makes a distinction between "Operational
   Considerations" and "Management Considerations", although the two are
   closely related. The section on manageability is focused on
   management technology, such as how to utilize management protocols
   and how to design management data models. The operational
   considerations apply to operating the protocol within a network, even
   if there were no management protocol actively being used.</t>
        <t>The purpose of this document is to provide guidance about what to
   consider when thinking about the management and deployment of a new
   protocol, and to provide guidance about documenting the
   considerations. The following guidelines are designed to help
   writers provide a reasonably consistent format for such
   documentation. Separate manageability and operational considerations
   sections are desirable in many cases, but their structure and
   location are a decision that can be made from case to case.</t>
        <t>This document does not impose a solution, imply that a formal data
   model is needed, or imply that using a specific management protocol
   is mandatory. If protocol designers conclude that the technology can
   be managed solely by using proprietary command line interfaces (CLIs)
   and that no structured or standardized data model needs to be in
   place, this might be fine, but it is a decision that should be
   explicit in a manageability discussion -- that this is how the
   protocol will need to be operated and managed. Protocol designers
   should avoid having manageability pushed for a later phase of the
   development of the standard.</t>
        <t>A list of guidelines and a
   checklist of questions to consider, which a reviewer can use to evaluate whether the protocol and
   documentation address common operations and management needs, is provided in <xref target="CHECKLIST"/>.</t>
      </section>
      <section anchor="motivation">
        <name>Motivation</name>
        <t>For years the IETF community has used the IETF Standard Management
   Framework, including the Simple Network Management Protocol
   <xref target="RFC3410"/>, the Structure of Management Information <xref target="RFC2578"/>, and MIB
   data models for managing new protocols. As the Internet has evolved,
   operators have found the reliance on one protocol and one schema
   language for managing all aspects of the Internet inadequate. The
   IESG policy to require working groups to write a MIB module to
   provide manageability for new protocols is being replaced by a policy
   that is more open to using a variety of management protocols and data
   models designed to achieve different goals. In 2014, the IESG wrote a
   statement about "Writable MIB Module" <xref target="IESG-STATEMENT"/>.
   This statement stresses that IETF working groups are encouraged to use the NETCONF/YANG
   standards for configuration, especially in new charters.</t>
        <t>This document provides some initial guidelines for considering
   operations and management in an IETF Management Framework that
   consists of multiple protocols and multiple data modeling languages,
   with an eye toward being flexible while also striving for
   interoperability.</t>
        <t>Fully new protocols may require significant consideration of expected
   operations and management, while extensions to existing, widely
   deployed protocols may have established de facto operations and
   management practices that are already well understood.</t>
        <t>Suitable management approaches may vary for different areas, working
   groups, and protocols in the IETF. This document does not prescribe
   a fixed solution or format in dealing with operational and management
   aspects of IETF protocols. However, these aspects should be
   considered for any IETF protocol because we develop technologies and
   protocols to be deployed and operated in the real-world Internet. A WG
   may decide that its protocol does not need interoperable
   management or a standardized data model, but this should be a
   deliberate decision, not the result of omission. This document
   provides some guidelines for those considerations.</t>
      </section>
      <section anchor="background">
        <name>Background</name>
        <t>There have been a significant number of efforts, meetings, and
   documents that are related to Internet operations and management.
   Some of them are mentioned here to help protocol designers find
   documentation of previous efforts. Hopefully, providing these
   references will help the IETF avoid rehashing old discussions and
   reinventing old solutions.</t>
        <t>In 1988, the IAB published "IAB Recommendations for the Development
   of Internet Network Management Standards" <xref target="RFC1052"/>, which
   recommended a solution that, where possible, deliberately separates
   modeling languages, data models, and the protocols that carry data.
   The goal is to allow standardized information and data models to be
   used by different protocols.</t>
        <t>In 2001, Operations and Management Area design teams were created to
   document requirements related to the configuration of IP-based
   networks. One output was "Requirements for Configuration Management
   of IP-based Networks" <xref target="RFC3139"/>.</t>
        <t>In 2002, the Internet Architecture Board (IAB) held a workshop on
   Network Management <xref target="RFC3535"/> that discussed the strengths and
   weaknesses of some IETF network management protocols and compared
   them to operational needs, especially configuration.</t>
        <t>One issue discussed was the user-unfriendliness of the binary format
   of SNMP <xref target="RFC3410"/> and Common Open Policy Service (COPS) Usage for
   Policy Provisioning (COPS-PR) <xref target="RFC3084"/>, and it was recommended that
   the IETF explore an XML-based Structure of Management Information and
   an XML-based protocol for configuration.</t>
        <t>Another conclusion was that the tools for event/alarm correlation and
   for root cause analysis and logging are not sufficient and that there
   is a need to support a human interface and a programmatic interface.
   The IETF decided to standardize aspects of the de facto standard for
   system-logging security and programmatic support.</t>
        <t>In 2006, the IETF discussed whether the Management Framework should
   be updated to accommodate multiple IETF schema languages for
   describing the structure of management information and multiple IETF
   standard protocols for performing management tasks. The IESG asked
   that a document be written to discuss how protocol designers and
   working groups should address management in this emerging multi-
   protocol environment. This document and some planned companion
   documents attempt to provide some guidelines for navigating the
   rapidly shifting operating and management environments.</t>
        <t>In 2014, the IESG wrote its statement on "Writable MIB Module" <xref target="IESG-STATEMENT"/>, as
   mentioned above.</t>
        <t>In 2024, the IAB hold the "Next Era of Network Management Operations (NEMOPS)"
   workshop <xref target="NEMOPS-WORKSHOP"/>, building on the previous 2002 IAB workshop. Given that much has changed
   in the Internet’s operation and technological foundations since the first
   worshop, the NEMOPS workshop reviewed the past outcomes and discussed any
   operational barriers that prevented these technologies from being widely
   implemented. With the industry, network operators, and protocol engineers
   working in collaboration, the workshop developed a proposed plan of action
   and provided network management recommendations for both the IETF and IRTF.</t>
      </section>
      <section anchor="changes-since-5706">
        <name>Changes Since RFC 5706</name>
        <t>The following changes have been made to the guidelines published in  <xref target="RFC5706"/>:</t>
        <ul spacing="normal">
          <li>
            <t>TBC</t>
          </li>
          <li>
            <t>TBC</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="key-concepts-terminology-and-technological-landscape">
      <name>Key Concepts, Terminology, and Technological Landscape</name>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>This document deliberately does not use the (capitalized) keywords
   described in RFC 2119 <xref target="RFC2119"/>. RFC 2119 states the keywords must
   only be used where it is actually required for interoperation or to
   limit behavior which has potential for causing harm (e.g., limiting
   retransmissions). For example, they must not be used to try to
   impose a particular method on implementers where the method is not
   required for interoperability. This informational document is a set
   of guidelines based on current practices of **some** protocol
   designers and operators. This document is biased toward router
   operations and management and some advice may not be directly
   applicable to protocols with a different purpose, such as application
   server protocols. This document **does not** describe
   interoperability requirements, so the capitalized keywords from RFC
   2119 do not apply here.</t>
        <ul spacing="normal">
          <li>
            <t>CLI: Command Line Interface</t>
          </li>
          <li>
            <t>Data model: a mapping of the contents of an information model into
a form that is specific to a particular type of data store or
repository <xref target="RFC3444"/>.</t>
          </li>
          <li>
            <t>Information model: an abstraction and representation of the
entities in a managed environment, their properties, attributes
and operations, and the way that they relate to each other. It is
independent of any specific repository, software usage, protocol,
or platform <xref target="RFC3444"/>.</t>
          </li>
          <li>
            <t>OAM: Operations, Administration, and Maintenance <xref target="RFC6291"/> <xref target="I-D.ietf-opsawg-oam-characterization"/>.</t>
          </li>
          <li>
            <t>New protocol: includes new protocols, protocol extensions, data
models, or other functionality being designed.</t>
          </li>
          <li>
            <t>Protocol designer: represents individuals and working groups
involved in the development of new protocols or extensions.</t>
          </li>
        </ul>
      </section>
      <section anchor="available-management-technologies">
        <name>Available Management Technologies</name>
        <t>The IETF has a number of standard management protocols available that
   are suitable for different purposes.  These include:</t>
        <ul spacing="normal">
          <li>
            <t>Syslog <xref target="RFC5424"/></t>
          </li>
          <li>
            <t>Simple Network Management Protocol - SNMP <xref target="RFC3410"/></t>
          </li>
          <li>
            <t>Network Configuration Protocol - NETCONF <xref target="RFC6241"/></t>
          </li>
          <li>
            <t>RESTCONF <xref target="RFC8040"/></t>
          </li>
          <li>
            <t>Remote Authentication Dial-In User Service - RADIUS <xref target="RFC2865"/></t>
          </li>
          <li>
            <t>DIAMETER <xref target="RFC6733"/></t>
          </li>
          <li>
            <t>IP Flow Information Export - IPFIX <xref target="RFC7011"/></t>
          </li>
          <li>
            <t>BGP Monitoring Protocol - BMP <xref target="RFC7854"/></t>
          </li>
        </ul>
        <t>A planned supplement to this document will discuss these protocol
   standards, discuss some standard information and data models for
   specific functionality, and provide pointers to the documents that
   define them.</t>
      </section>
    </section>
    <section anchor="operational-considerations-how-will-the-new-protocol-fit-into-the-current-environment">
      <name>Operational Considerations - How Will the New Protocol Fit into the Current Environment?</name>
      <t>Designers of a new protocol should carefully consider the operational
   aspects. To ensure that a protocol will be practical to deploy in
   the real world, it is not enough to merely define it very precisely
   in a well-written document. Operational aspects will have a serious
   impact on the actual success of a protocol. Such aspects include bad
   interactions with existing solutions, a difficult upgrade path,
   difficulty of debugging problems, difficulty configuring from a
   central database, or a complicated state diagram that operations
   staff will find difficult to understand.</t>
      <t>BGP flap damping <xref target="RFC2439"/> is an example. It was designed to block
   high-frequency route flaps; however, the design did not consider the
   existence of BGP path exploration / slow convergence. In real
   operations, path exploration caused false flap damping, resulting in
   loss of reachability. As a result, many networks turned flap damping
   off.</t>
      <section anchor="sec-ops">
        <name>Operations</name>
        <t>Protocol designers can analyze the operational environment and mode
   of work in which the new protocol or extension will work. Such an
   exercise need not be reflected directly by text in their document
   but could help in visualizing how to apply the protocol in the
   Internet environments where it will be deployed.</t>
        <t>A key question is how the protocol can operate "out of the box". If
   implementers are free to select their own defaults, the protocol
   needs to operate well with any choice of values. If there are
   sensible defaults, these need to be stated.</t>
        <t>There may be a need to support a human interface, e.g., for
   troubleshooting, and a programmatic interface, e.g., for automated
   monitoring and root cause analysis. The application programming
   interfaces and the human interfaces might benefit from being similar
   to ensure that the information exposed by these two interfaces is
   consistent when presented to an operator. Identifying consistent
   methods of determining information, such as what gets counted in a
   specific counter, is relevant.</t>
        <t>Protocol designers should consider what management operations are
   expected to be performed as a result of the deployment of the
   protocol -- such as whether write operations will be allowed on
   routers and on hosts, or whether notifications for alarms or other
   events will be expected.</t>
      </section>
      <section anchor="sec-install">
        <name>Installation and Initial Setup</name>
        <t>Anything that can be configured can be misconfigured. "Architectural
   Principles of the Internet" <xref target="RFC1958"/>, Section 3.8, states: "Avoid
   options and parameters whenever possible. Any options and parameters
   should be configured or negotiated dynamically rather than manually."</t>
        <t>To simplify configuration, protocol designers should consider
   specifying reasonable defaults, including default modes and
   parameters. For example, it could be helpful or necessary to specify
   default values for modes, timers, default state of logical control
   variables, default transports, and so on. Even if default values are
   used, it must be possible to retrieve all the actual values or at
   least an indication that known default values are being used.</t>
        <t>Protocol designers should consider how to enable operators to
   concentrate on the configuration of the network as a whole rather
   than on individual devices. Of course, how one accomplishes this is
   the hard part.</t>
        <t>It is desirable to discuss the background of chosen default values,
   or perhaps why a range of values makes sense. In many cases, as
   technology changes, the values in an RFC might make less and less
   sense. It is very useful to understand whether defaults are based on
   best current practice and are expected to change as technologies
   advance or whether they have a more universal value that should not
   be changed lightly. For example, the default interface speed might
   be expected to change over time due to increased speeds in the
   network, and cryptographical algorithms might be expected to change
   over time as older algorithms are "broken".</t>
        <t>It is extremely important to set a sensible default value for all
   parameters.</t>
        <t>The default value should stay on the conservative side rather than on
   the "optimizing performance" side (example: the initial RTT and
   RTTvar values of a TCP connection).</t>
        <t>For those parameters that are speed-dependent, instead of using a
   constant, try to set the default value as a function of the link
   speed or some other relevant factors. This would help reduce the
   chance of problems caused by technology advancement.</t>
      </section>
      <section anchor="sec-migration">
        <name>Migration Path</name>
        <t>If the new protocol is a new version of an existing one, or if it is
   replacing another technology, the protocol designer should consider
   how deployments should transition to the new protocol. This should
   include coexistence with previously deployed protocols and/or
   previous versions of the same protocol, incompatibilities between
   versions, translation between versions, and side effects that might
   occur. Are older protocols or versions disabled, or do they coexist
   in the network with the new protocol?</t>
        <t>Many protocols benefit from being incrementally deployable --
   operators may deploy aspects of a protocol before deploying the
   protocol fully.</t>
      </section>
      <section anchor="sec-other">
        <name>Requirements on Other Protocols and Functional Components</name>
        <t>Protocol designers should consider the requirements that the new
   protocol might put on other protocols and functional components and
   should also document the requirements from other protocols and
   functional elements that have been considered in designing the new
   protocol.</t>
        <t>These considerations should generally remain illustrative to avoid
   creating restrictions or dependencies, or potentially impacting the
   behavior of existing protocols, or restricting the extensibility of
   other protocols, or assuming other protocols will not be extended in
   certain ways. If restrictions or dependencies exist, they should be
   stated.</t>
        <t>For example, the design of the Resource ReSerVation Protocol (RSVP)
   <xref target="RFC2205"/> required each router to look at the RSVP PATH message and,
   if the router understood RSVP, add its own address to the message to
   enable automatic tunneling through non-RSVP routers. But in reality,
   routers cannot look at an otherwise normal IP packet and potentially
   take it off the fast path! The initial designers overlooked that a
   new "deep packet inspection" requirement was being put on the
   functional components of a router. The "router alert" option
   (<xref target="RFC2113"/>, <xref target="RFC2711"/>) was finally developed to solve this problem
   for RSVP and other protocols that require the router to take some
   packets off the fast-forwarding path. Yet, router alert has its own
   problems in impacting router performance.</t>
      </section>
      <section anchor="sec-impact">
        <name>Impact on Network Operation</name>
        <t>The introduction of a new protocol or extensions to an existing
   protocol may have an impact on the operation of existing networks.
   Protocol designers should outline such impacts (which may be
   positive), including scaling concerns and interactions with other
   protocols. For example, a new protocol that doubles the number of
   active, reachable addresses in use within a network might need to be
   considered in the light of the impact on the scalability of the
   interior gateway protocols operating within the network.</t>
        <t>A protocol could send active monitoring packets on the wire. If we
   don't pay attention, we might get very good accuracy but could send
   too many active monitoring packets.</t>
        <t>The protocol designer should consider the potential impact on the
   behavior of other protocols in the network and on the traffic levels
   and traffic patterns that might change, including specific types of
   traffic, such as multicast. Also, consider the need to install new
   components that are added to the network as a result of changes in
   the configuration, such as servers performing auto-configuration
   operations.</t>
        <t>The protocol designer should consider also the impact on
   infrastructure applications like DNS <xref target="RFC1034"/>, the registries, or
   the size of routing tables. For example, Simple Mail Transfer
   Protocol (SMTP) <xref target="RFC5321"/> servers use a reverse DNS lookup to filter
   out incoming connection requests. When Berkeley installed a new spam
   filter, their mail server stopped functioning because of overload of
   the DNS cache resolver.</t>
        <t>The impact on performance may also be noted -- increased delay or
   jitter in real-time traffic applications, or increased response time
   in client-server applications when encryption or filtering are
   applied.</t>
        <t>It is important to minimize the impact caused by configuration
   changes. Given configuration A and configuration B, it should be
   possible to generate the operations necessary to get from A to B with
   minimal state changes and effects on network and systems.</t>
      </section>
      <section anchor="sec-verify">
        <name>Verifying Correct Operation</name>
        <t>The protocol designer should consider techniques for testing the
   effect that the protocol has had on the network by sending data
   through the network and observing its behavior (aka active
   monitoring). Protocol designers should consider how the correct end-
   to-end operation of the new protocol in the network can be tested
   actively and passively, and how the correct data or forwarding plane
   function of each network element can be verified to be working
   properly with the new protocol. Which metrics are of interest?</t>
        <t>Having simple protocol status and health indicators on network
   devices is a recommended means to check correct operation.</t>
      </section>
    </section>
    <section anchor="sec-proto">
      <name>Management Considerations - How Will the Protocol Be Managed?</name>
      <t>The considerations of manageability should start from identifying the
   entities to be managed, as well as how the managed protocol is
   supposed to be installed, configured, and monitored.</t>
      <t>Considerations for management should include a discussion of what
   needs to be managed, and how to achieve various management tasks.
   Where are the managers and what type of management interfaces and
   protocols will they need? The "write a MIB module" approach to
   considering management often focuses on monitoring a protocol
   endpoint on a single device. A MIB module document typically only
   considers monitoring properties observable at one end, while the
   document does not really cover managing the *protocol* (the
   coordination of multiple ends) and does not even come near managing
   the *service* (which includes a lot of stuff that is very far away
   from the box). This is exactly what operators hate -- you need to be
   able to manage both ends. As <xref target="RFC3535"/> says, "MIB modules can often
   be characterized as a list of ingredients without a recipe".</t>
      <t>The management model should take into account factors such as:</t>
      <ul spacing="normal">
        <li>
          <t>What type of management entities will be involved (agents, network
management systems)?</t>
        </li>
        <li>
          <t>What is the possible architecture (client-server, manager-agent,
poll-driven or event-driven, auto-configuration, two levels or
hierarchical)?</t>
        </li>
        <li>
          <t>What are the management operations (initial configuration, dynamic
configuration, alarm and exception reporting, logging, performance
monitoring, performance reporting, debugging)?</t>
        </li>
        <li>
          <t>How are these operations performed (locally, remotely, atomic
operation, scripts)? Are they performed immediately or are they
time scheduled, or event triggered?</t>
        </li>
      </ul>
      <t>Protocol designers should consider how the new protocol will be
   managed in different deployment scales. It might be sensible to use
   a local management interface to manage the new protocol on a single
   device, but in a large network, remote management using a centralized
   server and/or using distributed management functionality might make
   more sense. Auto-configuration and default parameters might be
   possible for some new protocols.</t>
      <t>Management needs to be considered not only from the perspective of a
   device, but also from the perspective of network and service
   management. A service might be network and operational functionality
   derived from the implementation and deployment of a new protocol.
   Often an individual network element is not aware of the service being
   delivered.</t>
      <t>WGs should consider how to configure multiple related/co-operating
   devices and how to back off if one of those configurations fails or
   causes trouble. NETCONF <xref target="RFC6241"/> addresses this in a generic manner
   by allowing an operator to lock the configuration on multiple
   devices, perform the configuration settings/changes, check that they
   are OK (undo if not), and then unlock the devices.</t>
      <t>Techniques for debugging protocol interactions in a network must be
   part of the network-management discussion. Implementation source
   code should be debugged before ever being added to a network, so
   asserts and memory dumps do not normally belong in management data
   models. However, debugging on-the-wire interactions is a protocol
   issue: while the messages can be seen by sniffing, it is enormously
   helpful if a protocol specification supports features that make
   debugging of network interactions and behaviors easier. There could
   be alerts issued when messages are received or when there are state
   transitions in the protocol state machine. However, the state
   machine is often not part of the on-the-wire protocol; the state
   machine explains how the protocol works so that an implementer can
   decide, in an implementation-specific manner, how to react to a
   received event.</t>
      <t>In a client/server protocol, it may be more important to instrument
   the server end of a protocol than the client end, since the
   performance of the server might impact more nodes than the
   performance of a specific client.</t>
      <section anchor="sec-interop">
        <name>Interoperability</name>
        <t>Just as when deploying protocols that will inter-connect devices,
   management interoperability should be considered -- whether across
   devices from different vendors, across models from the same vendor,
   or across different releases of the same product. Management
   interoperability refers to allowing information sharing and
   operations between multiple devices and multiple management
   applications, often from different vendors. Interoperability allows
   for the use of third-party applications and the outsourcing of
   management services.</t>
        <t>Some product designers and protocol designers assume that if a device
   can be managed individually using a command line interface or a web
   page interface, that such a solution is enough. But when equipment
   from multiple vendors is combined into a large network, scalability
   of management may become a problem. It may be important to have
   consistency in the management interfaces so network-wide operational
   processes can be automated. For example, a single switch might be
   easily managed using an interactive web interface when installed in a
   single-office small business, but when, say, a fast-food company
   installs similar switches from multiple vendors in hundreds or
   thousands of individual branches and wants to automate monitoring
   them from a central location, monitoring vendor- and model-specific
   web pages would be difficult to automate.</t>
        <t>The primary goal is the ability to roll out new useful functions and
   services in a way in which they can be managed in a scalable manner,
   where one understands the network impact (as part of the total cost
   of operations) of that service.</t>
        <t>Getting everybody to agree on a single syntax and an associated
   protocol to do all management has proven to be difficult. So,
   management systems tend to speak whatever the boxes support, whether
   or not the IETF likes this. The IETF is moving from support for one
   schema language for modeling the structure of management information
   (Structure of Management Information Version 2 (SMIv2) <xref target="RFC2578"/>) and
   one simple network management protocol (Simple Network Management
   Protocol (SNMP) <xref target="RFC3410"/>) towards support for additional schema
   languages and additional management protocols suited to different
   purposes. Other Standard Development Organizations (e.g., the
   Distributed Management Task Force - DMTF, the Tele-Management Forum -
   TMF) also define schemas and protocols for management and these may
   be more suitable than IETF schemas and protocols in some cases. Some
   of the alternatives being considered include:</t>
        <ul spacing="normal">
          <li>
            <t>XML Schema Definition <xref target="W3C.REC-xmlschema-0-20041028"/></t>
          </li>
        </ul>
        <t>and</t>
        <ul spacing="normal">
          <li>
            <t>NETCONF Configuration Protocol <xref target="RFC6241"/></t>
          </li>
          <li>
            <t>the IP Flow Information Export (IPFIX) Protocol <xref target="RFC7011"/>) for
usage accounting</t>
          </li>
          <li>
            <t>the syslog protocol <xref target="RFC5424"/> for logging</t>
          </li>
        </ul>
        <t>Interoperability needs to be considered on the syntactic level and
   the semantic level. While it can be irritating and time-consuming,
   application designers, including operators who write their own
   scripts, can make their processing conditional to accommodate
   syntactic differences across vendors, models, or releases of product.</t>
        <t>Semantic differences are much harder to deal with on the manager side
   -- once you have the data, its meaning is a function of the managed
   entity.</t>
        <t>Information models are helpful to try to focus interoperability on
   the semantic level -- they establish standards for what information
   should be gathered and how gathered information might be used,
   regardless of which management interface carries the data or which
   vendor produces the product. The use of an information model might
   help improve the ability of operators to correlate messages in
   different protocols where the data overlaps, such as a syslog message
   and an SNMP notification about the same event. An information model
   might identify which error conditions should be counted separately,
   and which error conditions can be counted together in a single
   counter. Then, whether the counter is gathered via SNMP, a CLI
   command, or a syslog message, the counter will have the same meaning.</t>
        <t>Protocol designers should consider which information might be useful
   for managing the new protocol or protocol extensions.</t>
        <figure anchor="fig-im-dm">
          <name>IMs and DMs</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="160" width="504" viewBox="0 0 504 160" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 32,64 L 32,80" fill="none" stroke="black"/>
                <path d="M 120,48 L 120,80" fill="none" stroke="black"/>
                <path d="M 200,64 L 200,80" fill="none" stroke="black"/>
                <path d="M 256,32 L 272,32" fill="none" stroke="black"/>
                <path d="M 32,64 L 200,64" fill="none" stroke="black"/>
                <path d="M 256,96 L 272,96" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="280,96 268,90.4 268,101.6" fill="black" transform="rotate(0,272,96)"/>
                <polygon class="arrowhead" points="280,32 268,26.4 268,37.6" fill="black" transform="rotate(0,272,32)"/>
                <g class="text">
                  <text x="116" y="36">IM</text>
                  <text x="360" y="36">conceptual/abstract</text>
                  <text x="464" y="36">model</text>
                  <text x="296" y="52">for</text>
                  <text x="352" y="52">designers</text>
                  <text x="408" y="52">and</text>
                  <text x="464" y="52">operators</text>
                  <text x="36" y="100">DM</text>
                  <text x="116" y="100">DM</text>
                  <text x="204" y="100">DM</text>
                  <text x="352" y="100">concrete/detailed</text>
                  <text x="448" y="100">model</text>
                  <text x="320" y="116">for</text>
                  <text x="388" y="116">implementers</text>
                  <text x="48" y="148">Information</text>
                  <text x="124" y="148">Models</text>
                  <text x="168" y="148">and</text>
                  <text x="204" y="148">Data</text>
                  <text x="252" y="148">Models</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
             IM                --> conceptual/abstract model
              |                    for designers and operators
   +----------+---------+
   |          |         |
   DM        DM         DM     --> concrete/detailed model
                                      for implementers

Information Models and Data Models
]]></artwork>
          </artset>
        </figure>
        <t>Protocol designers may decide an information model or data model
   would be appropriate for managing the new protocol or protocol
   extensions.</t>
        <t>"On the Difference between Information Models and Data Models"
   <xref target="RFC3444"/> can be helpful in determining what information to consider
   regarding information models (IMs), as compared to data models (DMs).</t>
        <t>Information models should come from the protocol WGs and include
   lists of events, counters, and configuration parameters that are
   relevant. There are a number of information models contained in
   protocol WG RFCs. Some examples:</t>
        <ul spacing="normal">
          <li>
            <t><xref target="RFC3060"/> - Policy Core Information Model version 1</t>
          </li>
          <li>
            <t><xref target="RFC3290"/> - An Informal Management Model for Diffserv Routers</t>
          </li>
          <li>
            <t><xref target="RFC3460"/> - Policy Core Information Model Extensions</t>
          </li>
          <li>
            <t><xref target="RFC3585"/> - IPsec Configuration Policy Information Model</t>
          </li>
          <li>
            <t><xref target="RFC3644"/> - Policy Quality of Service Information Model</t>
          </li>
          <li>
            <t><xref target="RFC3670"/> - Information Model for Describing Network Device QoS
Datapath Mechanisms</t>
          </li>
          <li>
            <t><xref target="RFC3805"/> - Printer MIB v2 (contains both an IM and a DM)</t>
          </li>
        </ul>
        <t>Management protocol standards and management data model standards
   often contain compliance clauses to ensure interoperability.
   Manageability considerations should include discussion of which level
   of compliance is expected to be supported for interoperability.</t>
      </section>
      <section anchor="sec-mgt-info">
        <name>Management Information</name>
        <t>Languages used to describe an information model can influence the
   nature of the model. Using a particular data modeling language, such
   as YANG, influences the model to use certain types of structures, for
   example, hierarchical trees, groupings, and reusable types.
   YANG, as described in <xref target="RFC6020"/> and <xref target="RFC7950"/>, provides advantages
   for expressing network information, including clear separation of
   configuration data and operational state, support for constraints and
   dependencies, and extensibility for evolving requirements. Its ability
   to represent relationships and dependencies in a structured and modular
   way makes it an effective choice for defining management information
   models.</t>
        <t>Although this document recommends using English text (the official
   language for IETF specifications) to describe an information model,
   including a complementary YANG module helps translate abstract concepts
   into implementation-specific data models. This ensures consistency between
   the high-level design and practical deployment.</t>
        <t>A management information model should include a discussion of what is
   manageable, which aspects of the protocol need to be configured, what
   types of operations are allowed, what protocol-specific events might
   occur, which events can be counted, and for which events an operator
   should be notified.</t>
        <t>Operators find it important to be able to make a clear distinction
   between configuration data, operational state, and statistics. They
   need to determine which parameters were administratively configured
   and which parameters have changed since configuration as the result
   of mechanisms such as routing protocols or network management
   protocols. It is important to be able to separately fetch current
   configuration information, initial configuration information,
   operational state information, and statistics from devices; to be
   able to compare current state to initial state; and to compare
   information between devices. So, when deciding what information
   should exist, do not conflate multiple information elements into a
   single element.</t>
        <t>What is typically difficult to work through are relationships between
   abstract objects. Ideally, an information model would describe the
   relationships between the objects and concepts in the information
   model.</t>
        <t>Is there always just one instance of this object or can there be
   multiple instances? Does this object relate to exactly one other
   object, or may it relate to multiple? When is it possible to change a
   relationship?</t>
        <t>Do objects (such as instances in lists) share fate? For example, if an
   instance in list A must exist before a related instance in list B can be
   created, what happens to the instance in list B if the related instance in
   list A is deleted? Does the existence of relationships between
   objects have an impact on fate sharing? YANG's relationships and
   constraints can help express and enforce these relationships.</t>
        <section anchor="sec-im-design">
          <name>Information Model Design</name>
          <t>This document recommends keeping the information model as simple as
   possible by applying the following criteria:</t>
          <ol spacing="normal" type="1"><li>
              <t>Start with a small set of essential objects and add only as
further objects are needed.</t>
            </li>
            <li>
              <t>Require that objects be essential for management.</t>
            </li>
            <li>
              <t>Consider evidence of current use and/or utility.</t>
            </li>
            <li>
              <t>Limit the total number of objects.</t>
            </li>
            <li>
              <t>Exclude objects that are simply derivable from others in this or
other information models.</t>
            </li>
            <li>
              <t>Avoid causing critical sections to be heavily instrumented. A
guideline is one counter per critical section per layer.</t>
            </li>
            <li>
              <t>When using YANG to complement or define an information model,
ensure that the model maintains simplicity, modularity, and
clarity.  Specific guidelines to consider when authoring YANG
modules are described in <xref target="I-D.ietf-netmod-rfc8407bis"/>.</t>
            </li>
          </ol>
        </section>
        <section anchor="sec-yang-dm">
          <name>YANG Data Model Considerations</name>
          <t>When considering YANG data models for a new specification, there
  are multiple types of data models that may be applicable. The
  hierarchy and relationship between these types is described in
  <xref section="3.5.1" sectionFormat="of" target="I-D.ietf-netmod-rfc8407bis"/>. A new specification
  may require or benefit from one or more of these YANG data model types.</t>
          <ul spacing="normal">
            <li>
              <t>Device Models - Also called Network Element Models,
represent the configuration, operational state, and notifications of
individual devices. These models are designed to distinguish
between these types of data and support querying and updating
device-specific parameters. Consideration should be given to
how device-level models might fit with broader network and
service data models.</t>
            </li>
            <li>
              <t>Network Models - Also called Network Service Models, define abstractions
for managing the behavior and relationships of multiple devices
and device subsystems within a network. As described in <xref target="RFC8199"/>,
these models are used to manage network-wide. These abstractions are
useful to network operators and applications that interface with network
controllers. Examples of network models include the L3VPN Network Model
(L3NM) <xref target="RFC9182"/> and the L2VPN Network Model (L2VPN) <xref target="RFC9291"/>.</t>
            </li>
            <li>
              <t>Service Models - Also called Customer Service Models,
defined in <xref target="RFC8309"/>, are designed to abstract the customer interface
into a service. They consider customer-centric parameters such as
Service Level Agreement (SLA) and high-level policy (e.g., network intent).
Given that different operators and different customers may have widely-varying
business processes, these models should focus on common aspects of a service
with strong multi-party consensus. Examples of service models include
the L3VPN Service Model (L3SM) <xref target="RFC8299"/> and the L2VPN Service Model (L2SM)
<xref target="RFC8499"/>.</t>
            </li>
          </ul>
          <t>Specific guidelines to consider when authoring any type of YANG
  modules are described in <xref target="I-D.ietf-netmod-rfc8407bis"/>.</t>
        </section>
      </section>
      <section anchor="sec-fm-mgt">
        <name>Fault Management</name>
        <t>The protocol designer should document the basic faults and health
   indicators that need to be instrumented for the new protocol, as well
   as the alarms and events that must be propagated to management
   applications or exposed through a data model.</t>
        <t>The protocol designer should consider how fault information will be
   propagated. Will it be done using asynchronous notifications or
   polling of health indicators?</t>
        <t>If notifications are used to alert operators to certain conditions,
   then the protocol designer should discuss mechanisms to throttle
   notifications to prevent congestion and duplications of event
   notifications. Will there be a hierarchy of faults, and will the
   fault reporting be done by each fault in the hierarchy, or will only
   the lowest fault be reported and the higher levels be suppressed?
   Should there be aggregated status indicators based on concatenation
   of propagated faults from a given domain or device?</t>
        <t>SNMP notifications and syslog messages can alert an operator when an
   aspect of the new protocol fails or encounters an error or failure
   condition, and SNMP is frequently used as a heartbeat monitor.
   Should the event reporting provide guaranteed accurate delivery of
   the event information within a given (high) margin of confidence?
   Can we poll the latest events in the box?</t>
        <section anchor="liveness-detection-and-monitoring">
          <name>Liveness Detection and Monitoring</name>
          <t>Protocol designers should always build in basic testing features
   (e.g., ICMP echo, UDP/TCP echo service, NULL RPCs (remote procedure
   calls)) that can be used to test for liveness, with an option to
   enable and disable them.</t>
          <t>Mechanisms for monitoring the liveness of the protocol and for
   detecting faults in protocol connectivity are usually built into
   protocols. In some cases, mechanisms already exist within other
   protocols responsible for maintaining lower-layer connectivity (e.g.,
   ICMP echo), but often new procedures are required to detect failures
   and to report rapidly, allowing remedial action to be taken.</t>
          <t>These liveness monitoring mechanisms do not typically require
   additional management capabilities. However, when a system detects a
   fault, there is often a requirement to coordinate recovery action
   through management applications or at least to record the fact in an
   event log.</t>
        </section>
        <section anchor="fault-determination">
          <name>Fault Determination</name>
          <t>It can be helpful to describe how faults can be pinpointed using
   management information. For example, counters might record instances
   of error conditions. Some faults might be able to be pinpointed by
   comparing the outputs of one device and the inputs of another device,
   looking for anomalies. Protocol designers should consider what
   counters should count. If a single counter provided by vendor A
   counts three types of error conditions, while the corresponding
   counter provided by vendor B counts seven types of error conditions,
   these counters cannot be compared effectively -- they are not
   interoperable counters.</t>
          <t>How do you distinguish between faulty messages and good messages?</t>
          <t>Would some threshold-based mechanisms, such as Remote Monitoring
   (RMON) events/alarms or the EVENT-MIB, be usable to help determine
   error conditions? Are SNMP notifications for all events needed, or
   are there some "standard" notifications that could be used? Or can
   relevant counters be polled as needed?</t>
        </section>
        <section anchor="root-cause-analysis">
          <name>Root Cause Analysis</name>
          <t>Root cause analysis is about working out where in the network the
   fault is. For example, if end-to-end data delivery is failing
   (reported by a notification), root cause analysis can help find the
   failed link or node in the end-to-end path.</t>
        </section>
        <section anchor="fault-isolation">
          <name>Fault Isolation</name>
          <t>It might be useful to isolate or quarantine faults, such as isolating
   a device that emits malformed messages that are necessary to
   coordinate connections properly. This might be able to be done by
   configuring next-hop devices to drop the faulty messages to prevent
   them from entering the rest of the network.</t>
        </section>
      </section>
      <section anchor="sec-config-mgt">
        <name>Configuration Management</name>
        <t>A protocol designer should document the basic configuration
   parameters that need to be instrumented for a new protocol, as well
   as default values and modes of operation.</t>
        <t>What information should be maintained across reboots of the device,
   or restarts of the management system?</t>
        <t>"Requirements for Configuration Management of IP-based Networks"
   <xref target="RFC3139"/> discusses requirements for configuration management,
   including discussion of different levels of management, high-level
   policies, network-wide configuration data, and device-local
   configuration. Network configuration is not just multi-device push
   or pull. It is knowing that the configurations being pushed are
   semantically compatible. Is the circuit between them configured
   compatibly on both ends? Is the IS-IS metric the same? ... Now
   answer those questions for 1,000 devices.</t>
        <t>A number of efforts have existed in the IETF to develop policy-based
   configuration management. "Terminology for Policy-Based Management"
   <xref target="RFC3198"/> was written to standardize the terminology across these
   efforts.</t>
        <t>Implementations should not arbitrarily modify configuration data. In
   some cases (such as access control lists (ACLs)), the order of data
   items is significant and comprises part of the configured data. If a
   protocol designer defines mechanisms for configuration, it would be
   desirable to standardize the order of elements for consistency of
   configuration and of reporting across vendors and across releases
   from vendors.</t>
        <t>There are two parts to this:</t>
        <ol spacing="normal" type="1"><li>
            <t>A Network Management System (NMS) could optimize ACLs for
performance reasons.</t>
          </li>
          <li>
            <t>Unless the device/NMS systems have correct rules / a lot of
experience, reordering ACLs can lead to a huge security issue.</t>
          </li>
        </ol>
        <t>Network-wide configurations may be stored in central master databases
   and transformed into formats that can be pushed to devices, either by
   generating sequences of CLI commands or complete configuration files
   that are pushed to devices. There is no common database schema for
   network configuration, although the models used by various operators
   are probably very similar. Many operators consider it desirable to
   extract, document, and standardize the common parts of these network-
   wide configuration database schemas. A protocol designer should
   consider how to standardize the common parts of configuring the new
   protocol, while recognizing that vendors may also have proprietary
   aspects of their configurations.</t>
        <t>It is important to enable operators to concentrate on the
   configuration of the network as a whole, rather than individual
   devices. Support for configuration transactions across a number of
   devices could significantly simplify network configuration
   management. The ability to distribute configurations to multiple
   devices, or to modify candidate configurations on multiple devices,
   and then activate them in a near-simultaneous manner might help.
   Protocol designers can consider how it would make sense for their
   protocol to be configured across multiple devices. Configuration
   templates might also be helpful.</t>
        <t>Consensus of the 2002 IAB Workshop <xref target="RFC3535"/> was that textual
   configuration files should be able to contain international
   characters. Human-readable strings should utilize UTF-8, and
   protocol elements should be in case-insensitive ASCII.</t>
        <t>A mechanism to dump and restore configurations is a primitive
   operation needed by operators. Standards for pulling and pushing
   configurations from/to devices are desirable.</t>
        <t>Given configuration A and configuration B, it should be possible to
   generate the operations necessary to get from A to B with minimal
   state changes and effects on network and systems. It is important to
   minimize the impact caused by configuration changes.</t>
        <t>A protocol designer should consider the configurable items that exist
   for the control of function via the protocol elements described in
   the protocol specification. For example, sometimes the protocol
   requires that timers can be configured by the operator to ensure
   specific policy-based behavior by the implementation. These timers
   should have default values suggested in the protocol specification
   and may not need to be otherwise configurable.</t>
        <section anchor="verifying-correct-operation">
          <name>Verifying Correct Operation</name>
          <t>An important function that should be provided is guidance on how to
   verify the correct operation of a protocol. A protocol designer
   could suggest techniques for testing the impact of the protocol on
   the network before it is deployed as well as techniques for testing
   the effect that the protocol has had on the network after being
   deployed.</t>
          <t>Protocol designers should consider how to test the correct end-to-end
   operation of the service or network, how to verify the correct
   functioning of the protocol, and whether that is verified by testing
   the service function and/or by testing the forwarding function of
   each network element. This may be achieved through status and
   statistical information gathered from devices.</t>
        </section>
      </section>
      <section anchor="sec-acc-mgt">
        <name>Accounting Management</name>
        <t>A protocol designer should consider whether it would be appropriate
   to collect usage information related to this protocol and, if so,
   what usage information would be appropriate to collect.</t>
        <t>"Introduction to Accounting Management" <xref target="RFC2975"/> discusses a number
   of factors relevant to monitoring usage of protocols for purposes of
   capacity and trend analysis, cost allocation, auditing, and billing.
   The document also discusses how some existing protocols can be used
   for these purposes. These factors should be considered when
   designing a protocol whose usage might need to be monitored or when
   recommending a protocol to do usage accounting.</t>
      </section>
      <section anchor="sec-perf-mgt">
        <name>Performance Management</name>
        <t>From a manageability point of view, it is important to determine how
   well a network deploying the protocol or technology defined in the
   document is doing. In order to do this, the network operators need
   to consider information that would be useful to determine the
   performance characteristics of a deployed system using the target
   protocol.</t>
        <t>The IETF, via the Benchmarking Methodology WG (BMWG), has defined
   recommendations for the measurement of the performance
   characteristics of various internetworking technologies in a
   laboratory environment, including the systems or services that are
   built from these technologies. Each benchmarking recommendation
   describes the class of equipment, system, or service being addressed;
   discusses the performance characteristics that are pertinent to that
   class; clearly identifies a set of metrics that aid in the
   description of those characteristics; specifies the methodologies
   required to collect said metrics; and lastly, presents the
   requirements for the common, unambiguous reporting of benchmarking
   results. Search for "benchmark" in the RFC search tool.</t>
        <t>Performance metrics may be useful in multiple environments and for
   different protocols. The IETF, via the IP Performance Monitoring
   (IPPM) WG, has developed a set of standard metrics that can be
   applied to the quality, performance, and reliability of Internet data
   delivery services. These metrics are designed such that they can be
   performed by network operators, end users, or independent testing
   groups. The existing metrics might be applicable to the new
   protocol. Search for "metric" in the RFC search tool. In some
   cases, new metrics need to be defined. It would be useful if the
   protocol documentation identified the need for such new metrics. For
   performance monitoring, it is often important to report the time
   spent in a state, rather than reporting the current state. Snapshots
   are of less value for performance monitoring.</t>
        <t>There are several parts to performance management to be considered:
   protocol monitoring, device monitoring (the impact of the new
   protocol / service activation on the device), network monitoring, and
   service monitoring (the impact of service activation on the network).</t>
        <section anchor="monitoring-the-protocol">
          <name>Monitoring the Protocol</name>
          <t>Certain properties of protocols are useful to monitor. The number of
   protocol packets received, the number of packets sent, and the number
   of packets dropped are usually very helpful to operators.</t>
          <t>Packet drops should be reflected in counter variable(s) somewhere
   that can be inspected -- both from the security point of view and
   from the troubleshooting point of view.</t>
          <t>Counter definitions should be unambiguous about what is included in
   the count and what is not included in the count.</t>
          <t>Consider the expected behaviors for counters -- what is a reasonable
   maximum value for expected usage? Should they stop counting at the
   maximum value and retain the maximum value, or should they rollover?
   How can users determine if a rollover has occurred, and how can users
   determine if more than one rollover has occurred?</t>
          <t>Consider whether multiple management applications will share a
   counter; if so, then no one management application should be allowed
   to reset the value to zero since this will impact other applications.</t>
          <t>Could events, such as hot-swapping a blade in a chassis, cause
   discontinuities in counter? Does this make any difference in
   evaluating the performance of a protocol?</t>
          <t>The protocol specification should clearly define any inherent
   limitations and describe expected behavior when those limits
   are exceeded. These considerations should be made independently
   of any specific management protocol or data modeling language.
   In other words, focus on what makes sense for the protocol being
   managed, not the protocol used for management. If a constraint
   is not specific to a management protocol, then it should be left
   to data modelers of that protocol to determine how to handle it.
   For example, VLAN identifiers are defined by standard to range
   from 1 to 4094. Therefore, a YANG vlanid definition representing the
   12-bit VLAN-ID used in the VLAN Tag header uses a range of "1..4094".</t>
        </section>
        <section anchor="monitoring-the-device">
          <name>Monitoring the Device</name>
          <t>Consider whether device performance will be affected by the number of
   protocol entities being instantiated on the device. Designers of an
   information model should include information, accessible at runtime,
   about the maximum number of instances an implementation can support,
   the current number of instances, and the expected behavior when the
   current instances exceed the capacity of the implementation or the
   capacity of the device.</t>
          <t>Designers of an information model should model information,
   accessible at runtime, about the maximum number of protocol entity
   instances an implementation can support on a device, the current
   number of instances, and the expected behavior when the current
   instances exceed the capacity of the device.</t>
        </section>
        <section anchor="monitoring-the-network">
          <name>Monitoring the Network</name>
          <t>Consider whether network performance will be affected by the number
   of protocol entities being deployed.</t>
          <t>Consider the capability of determining the operational activity, such
   as the number of messages in and the messages out, the number of
   received messages rejected due to format problems, and the expected
   behaviors when a malformed message is received.</t>
          <t>What are the principal performance factors that need to be looked at
   when measuring the operational performance of the network built using
   the protocol? Is it important to measure setup times? End-to-end
   connectivity? Hop-to-hop connectivity? Network throughput?</t>
        </section>
        <section anchor="monitoring-the-service">
          <name>Monitoring the Service</name>
          <t>What are the principal performance factors that need to be looked at
   when measuring the performance of a service using the protocol? Is
   it important to measure application-specific throughput? Client-
   server associations? End-to-end application quality? Service
   interruptions? User experience?</t>
        </section>
      </section>
      <section anchor="sec-secuity-mgt">
        <name>Security Management</name>
        <t>Protocol designers should consider how to monitor and manage security
   aspects and vulnerabilities of the new protocol.</t>
        <t>There will be security considerations related to the new protocol.
   To make it possible for operators to be aware of security-related
   events, it is recommended that system logs should record events, such
   as failed logins, but the logs must be secured.</t>
        <t>Should a system automatically notify operators of every event
   occurrence, or should an operator-defined threshold control when a
   notification is sent to an operator?</t>
        <t>Should certain statistics be collected about the operation of the new
   protocol that might be useful for detecting attacks, such as the
   receipt of malformed messages, messages out of order, or messages
   with invalid timestamps? If such statistics are collected, is it
   important to count them separately for each sender to help identify
   the source of attacks?</t>
        <t>Manageability considerations that are security-oriented might include
   discussion of the security implications when no monitoring is in
   place, the regulatory implications of absence of audit-trail or logs
   in enterprises, exceeding the capacity of logs, and security
   exposures present in chosen/recommended management mechanisms.</t>
        <t>Consider security threats that may be introduced by management
   operations. For example, Control and Provisioning of Wireless Access
   Points (CAPWAP) breaks the structure of monolithic Access Points
   (APs) into Access Controllers and Wireless Termination Points (WTPs).
   By using a management interface, internal information that was
   previously not accessible is now exposed over the network and to
   management applications and may become a source of potential security
   threats.</t>
        <t>The granularity of access control needed on management interfaces
   needs to match operational needs. Typical requirements are a role-
   based access control model and the principle of least privilege,
   where a user can be given only the minimum access necessary to
   perform a required task.</t>
        <t>Some operators wish to do consistency checks of access control lists
   across devices. Protocol designers should consider information
   models to promote comparisons across devices and across vendors to
   permit checking the consistency of security configurations.</t>
        <t>Protocol designers should consider how to provide a secure transport,
   authentication, identity, and access control that integrates well
   with existing key and credential management infrastructure. It is a
   good idea to start with defining the threat model for the protocol,
   and from that deducing what is required.</t>
        <t>Protocol designers should consider how access control lists are
   maintained and updated.</t>
        <t>Standard SNMP notifications or syslog messages <xref target="RFC5424"/> might
   already exist, or can be defined, to alert operators to the
   conditions identified in the security considerations for the new
   protocol. For example, you can log all the commands entered by the
   operator using syslog (giving you some degree of audit trail), or you
   can see who has logged on/off using the Secure SHell Protocol (SSH)
   and from where; failed SSH logins can be logged using syslog, etc.</t>
        <t>An analysis of existing counters might help operators recognize the
   conditions identified in the security considerations for the new
   protocol before they can impact the network.</t>
        <t>Different management protocols use different assumptions about
   message security and data-access controls. A protocol designer that
   recommends using different protocols should consider how security
   will be applied in a balanced manner across multiple management
   interfaces. SNMP authority levels and policy are data-oriented,
   while CLI authority levels and policy are usually command-oriented
   (i.e., task-oriented). Depending on the management function,
   sometimes data-oriented or task-oriented approaches make more sense.
   Protocol designers should consider both data-oriented and task-
   oriented authority levels and policy.</t>
      </section>
    </section>
    <section anchor="sec-oandm-tooling">
      <name>Operational and Management Tooling Considerations</name>
      <t>The operational community's ability to effectively adopt and
   use new specifications is significantly influenced by the availability
   and adaptability of appropriate tooling. In this context, "tools" refers
   to software systems or utilities used by network operators to deploy,
   configure, monitor, troubleshoot, and manage networks or network protocols
   in real-world operational environments. While the introduction of a new
   specification does not automatically mandate the development of entirely
   new tools, careful consideration must be given to how existing tools can be
   leveraged or extended to support the management and operation of these new
   specifications.</t>
      <t>The <xref target="NEMOPS"/> workshop highlighted a
   consistent theme applicable beyond network management protocols: the
   "ease of use" and adaptability of existing tools are critical factors
   for successful adoption. Therefore, a new specification should provide
   examples using existing, common tooling, or running code that demonstrate
   how to perform key operational tasks.</t>
      <t>Specifically, the following tooling-related aspects should be considered,
   prioritizing the adaptation of existing tools:</t>
      <ul spacing="normal">
        <li>
          <t>Leveraging Existing Tooling: Before considering new tools, assess whether
existing tooling, such as monitoring systems, logging platforms,
configuration management systems, and/or orchestration frameworks, can be
adapted to support the new specification. This may involve developing
plugins, modules, or drivers that enable these tools to interact with
the new specification.</t>
        </li>
        <li>
          <t>Extending Existing Tools: Identify areas where existing tools can be
extended to provide the necessary visibility and control over the new
specification. For example, if a new transport protocol is introduced,
consider whether existing network monitoring tools can be extended to
track its performance metrics or whether existing security tools can be
adapted to analyze its traffic patterns.</t>
        </li>
        <li>
          <t>New Tools: Only when existing tools are demonstrably
inadequate for managing and operating the elements of the new specification
should the development of new tools be considered. In such cases,
carefully define the specific requirements for these new tools, focusing
on the functionalities that cannot be achieved through adaptation or
extension of existing solutions.</t>
        </li>
        <li>
          <t>IETF Hackathons for Manageability Testing:
IETF Hackathons <xref target="IETF-HACKATHONS"/>
provide an opportunity to test the functionality, interoperability,
and manageability of new protocols. These events can be specifically
leveraged to assess the operational (including manageability) implications
of a new protocol by focusing tasks on:  </t>
          <ul spacing="normal">
            <li>
              <t>Adapting existing tools to interact with the new specification.</t>
            </li>
            <li>
              <t>Developing example management scripts or modules for existing management
platforms.</t>
            </li>
            <li>
              <t>Testing the specification's behavior under various operational conditions.</t>
            </li>
            <li>
              <t>Identifying potential tooling gaps and areas for improvement.</t>
            </li>
            <li>
              <t>Creating example flows and use cases for manageability.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Open-Source for Tooling: If new tools are deemed necessary, or if significant
adaptations to existing tools are required, prioritize open-source development
with community involvement. Open-source tools lower the barrier to entry,
encourage collaboration, and provide operators with the flexibility to customize
and extend the tools to meet their specific needs.</t>
        </li>
      </ul>
    </section>
    <section anchor="documentation-guidelines">
      <name>Documentation Guidelines</name>
      <t>This document is focused on what a protocol designer should think
   about and how those considerations might be documented.</t>
      <t>This document does not describe interoperability requirements but
   rather describes practices that are useful to follow when dealing
   with manageability aspects in IETF documents, so the capitalized
   keywords from <xref target="RFC2119"/> do not apply here. Any occurrence of words
   like 'must' or 'should' needs to be interpreted only in the context
   of their natural, English-language meaning.</t>
      <section anchor="recommended-discussions">
        <name>Recommended Discussions</name>
        <t>A Manageability Considerations section should include discussion of
   the management and operations topics raised in this document, and
   when one or more of these topics is not relevant, it would be useful
   to contain a simple statement explaining why the topic is not
   relevant for the new protocol. Of course, additional relevant topics
   should be included as well.</t>
        <t>Existing protocols and data models can provide the management
   functions identified in the previous section. Protocol designers
   should consider how using existing protocols and data models might
   impact network operations.</t>
      </section>
      <section anchor="null-manageability-considerations-sections">
        <name>Null Manageability Considerations Sections</name>
        <t>A protocol designer may seriously consider the manageability
   requirements of a new protocol and determine that no management
   functionality is needed by the new protocol. It would be helpful to
   those who may update or write extensions to the protocol in the
   future or to those deploying the new protocol to know the thinking of
   the working group regarding the manageability of the protocol at the
   time of its design.</t>
        <t>If there are no new manageability or deployment considerations, it is
   recommended that a Manageability Considerations section contain a
   simple statement such as, "There are no new manageability
   requirements introduced by this document," and a brief explanation of
   why that is the case. The presence of such a Manageability
   Considerations section would indicate to the reader that due
   consideration has been given to manageability and operations.</t>
        <t>In the case where the new protocol is an extension and the base
   protocol discusses all the relevant operational and manageability
   considerations, it would be helpful to point out the considerations
   section in the base document.</t>
      </section>
      <section anchor="placement-of-operations-and-manageability-considerations-sections">
        <name>Placement of Operations and Manageability Considerations Sections</name>
        <t>If a protocol designer develops a Manageability Considerations
   section for a new protocol, it is recommended that the section be
   placed immediately before the Security Considerations section.
   Reviewers interested in such sections could find it easily, and this
   placement could simplify the development of tools to detect the
   presence of such a section.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document does not have any IANA actions required.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document is informational and provides guidelines for
   considering manageability and operations. It introduces no new
   security concerns.</t>
      <t>The provision of a management portal to a network device provides a
   doorway through which an attack on the device may be launched.
   Making the protocol under development be manageable through a
   management protocol creates a vulnerability to a new source of
   attacks. Only management protocols with adequate security apparatus,
   such as authentication, message integrity checking, and
   authorization, should be used.</t>
      <t>A standard description of the manageable knobs and whistles on a
   protocol makes it easier for an attacker to understand what they may
   try to control and how to tweak it.</t>
      <t>A well-designed protocol is usually more stable and secure. A
   protocol that can be managed and inspected offers the operator a
   better chance of spotting and quarantining any attacks. Conversely,
   making a protocol easy to inspect is a risk if the wrong person
   inspects it.</t>
      <t>If security events cause logs and/or notifications/alerts, a
   concerted attack might be able to be mounted by causing an excess of
   these events. In other words, the security-management mechanisms
   could constitute a security vulnerability. The management of
   security aspects is important (see <xref target="sec-secuity-mgt"/>).</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="CHECKLIST" target="https://github.com/IETF-OPS-DIR/Review-Template/tree/main">
        <front>
          <title>Operations and Management Review Checklist</title>
          <author>
            <organization/>
          </author>
          <date year="2025"/>
        </front>
      </reference>
      <reference anchor="IETF-HACKATHONS" target="https://www.ietf.org/meeting/hackathons/">
        <front>
          <title>IETF Hackathons</title>
          <author>
            <organization>IETF</organization>
          </author>
          <date year="2025" month="May" day="01"/>
        </front>
      </reference>
      <reference anchor="IESG-STATEMENT" target="https://datatracker.ietf.org/doc/statement-iesg-writable-mib-module-iesg-statement-20140302/">
        <front>
          <title>Writable MIB Module IESG Statement</title>
          <author>
            <organization>IESG</organization>
          </author>
          <date year="2014" month="March" day="02"/>
        </front>
      </reference>
      <reference anchor="NEMOPS-WORKSHOP" target="https://datatracker.ietf.org/group/nemopsws/about/">
        <front>
          <title>IAB workshop on the Next Era of Network Management Operations</title>
          <author>
            <organization>IAB</organization>
          </author>
          <date year="2024" month="December"/>
        </front>
      </reference>
      <reference anchor="RFC7950">
        <front>
          <title>The YANG 1.1 Data Modeling Language</title>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <date month="August" year="2016"/>
          <abstract>
            <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7950"/>
        <seriesInfo name="DOI" value="10.17487/RFC7950"/>
      </reference>
      <reference anchor="RFC3410">
        <front>
          <title>Introduction and Applicability Statements for Internet-Standard Management Framework</title>
          <author fullname="J. Case" initials="J." surname="Case"/>
          <author fullname="R. Mundy" initials="R." surname="Mundy"/>
          <author fullname="D. Partain" initials="D." surname="Partain"/>
          <author fullname="B. Stewart" initials="B." surname="Stewart"/>
          <date month="December" year="2002"/>
          <abstract>
            <t>The purpose of this document is to provide an overview of the third version of the Internet-Standard Management Framework, termed the SNMP version 3 Framework (SNMPv3). This Framework is derived from and builds upon both the original Internet-Standard Management Framework (SNMPv1) and the second Internet-Standard Management Framework (SNMPv2). The architecture is designed to be modular to allow the evolution of the Framework over time. The document explains why using SNMPv3 instead of SNMPv1 or SNMPv2 is strongly recommended. The document also recommends that RFCs 1157, 1441, 1901, 1909 and 1910 be retired by moving them to Historic status. This document obsoletes RFC 2570. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3410"/>
        <seriesInfo name="DOI" value="10.17487/RFC3410"/>
      </reference>
      <reference anchor="RFC2578">
        <front>
          <title>Structure of Management Information Version 2 (SMIv2)</title>
          <author fullname="K. McCloghrie" initials="K." role="editor" surname="McCloghrie"/>
          <author fullname="D. Perkins" initials="D." role="editor" surname="Perkins"/>
          <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
          <date month="April" year="1999"/>
          <abstract>
            <t>It is the purpose of this document, the Structure of Management Information Version 2 (SMIv2), to define that adapted subset, and to assign a set of associated administrative values. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="58"/>
        <seriesInfo name="RFC" value="2578"/>
        <seriesInfo name="DOI" value="10.17487/RFC2578"/>
      </reference>
      <reference anchor="RFC1052">
        <front>
          <title>IAB recommendations for the development of Internet network management standards</title>
          <author fullname="V.G. Cerf" initials="V.G." surname="Cerf"/>
          <date month="April" year="1988"/>
          <abstract>
            <t>This RFC is intended to convey to the Internet community and other interested parties the recommendations of the Internet Activities Board (IAB) for the development of network management protocols for use in the TCP/IP environment. This memo does NOT, in and of itself, define or propose an Official Internet Protocol. It does reflect, however, the policy of the IAB with respect to further network management development in the short and long term.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="1052"/>
        <seriesInfo name="DOI" value="10.17487/RFC1052"/>
      </reference>
      <reference anchor="RFC3139">
        <front>
          <title>Requirements for Configuration Management of IP-based Networks</title>
          <author fullname="L. Sanchez" initials="L." surname="Sanchez"/>
          <author fullname="K. McCloghrie" initials="K." surname="McCloghrie"/>
          <author fullname="J. Saperia" initials="J." surname="Saperia"/>
          <date month="June" year="2001"/>
          <abstract>
            <t>This memo discusses different approaches to configure networks and identifies a set of configuration management requirements for IP-based networks. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3139"/>
        <seriesInfo name="DOI" value="10.17487/RFC3139"/>
      </reference>
      <reference anchor="RFC3535">
        <front>
          <title>Overview of the 2002 IAB Network Management Workshop</title>
          <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
          <date month="May" year="2003"/>
          <abstract>
            <t>This document provides an overview of a workshop held by the Internet Architecture Board (IAB) on Network Management. The workshop was hosted by CNRI in Reston, VA, USA on June 4 thru June 6, 2002. The goal of the workshop was to continue the important dialog started between network operators and protocol developers, and to guide the IETFs focus on future work regarding network management. This report summarizes the discussions and lists the conclusions and recommendations to the Internet Engineering Task Force (IETF) community. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3535"/>
        <seriesInfo name="DOI" value="10.17487/RFC3535"/>
      </reference>
      <reference anchor="RFC3084">
        <front>
          <title>COPS Usage for Policy Provisioning (COPS-PR)</title>
          <author fullname="K. Chan" initials="K." surname="Chan"/>
          <author fullname="J. Seligson" initials="J." surname="Seligson"/>
          <author fullname="D. Durham" initials="D." surname="Durham"/>
          <author fullname="S. Gai" initials="S." surname="Gai"/>
          <author fullname="K. McCloghrie" initials="K." surname="McCloghrie"/>
          <author fullname="S. Herzog" initials="S." surname="Herzog"/>
          <author fullname="F. Reichmeyer" initials="F." surname="Reichmeyer"/>
          <author fullname="R. Yavatkar" initials="R." surname="Yavatkar"/>
          <author fullname="A. Smith" initials="A." surname="Smith"/>
          <date month="March" year="2001"/>
          <abstract>
            <t>This document describes the use of the Common Open Policy Service (COPS) protocol for support of policy provisioning (COPS-PR). [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3084"/>
        <seriesInfo name="DOI" value="10.17487/RFC3084"/>
      </reference>
      <reference anchor="RFC5706">
        <front>
          <title>Guidelines for Considering Operations and Management of New Protocols and Protocol Extensions</title>
          <author fullname="D. Harrington" initials="D." surname="Harrington"/>
          <date month="November" year="2009"/>
          <abstract>
            <t>New protocols or protocol extensions are best designed with due consideration of the functionality needed to operate and manage the protocols. Retrofitting operations and management is sub-optimal. The purpose of this document is to provide guidance to authors and reviewers of documents that define new protocols or protocol extensions regarding aspects of operations and management that should be considered. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5706"/>
        <seriesInfo name="DOI" value="10.17487/RFC5706"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC3444">
        <front>
          <title>On the Difference between Information Models and Data Models</title>
          <author fullname="A. Pras" initials="A." surname="Pras"/>
          <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
          <date month="January" year="2003"/>
          <abstract>
            <t>There has been ongoing confusion about the differences between Information Models and Data Models for defining managed objects in network management. This document explains the differences between these terms by analyzing how existing network management model specifications (from the IETF and other bodies such as the International Telecommunication Union (ITU) or the Distributed Management Task Force (DMTF)) fit into the universe of Information Models and Data Models. This memo documents the main results of the 8th workshop of the Network Management Research Group (NMRG) of the Internet Research Task Force (IRTF) hosted by the University of Texas at Austin. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3444"/>
        <seriesInfo name="DOI" value="10.17487/RFC3444"/>
      </reference>
      <reference anchor="RFC6291">
        <front>
          <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
          <author fullname="L. Andersson" initials="L." surname="Andersson"/>
          <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
          <author fullname="R. Bonica" initials="R." surname="Bonica"/>
          <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
          <author fullname="S. Mansfield" initials="S." surname="Mansfield"/>
          <date month="June" year="2011"/>
          <abstract>
            <t>At first glance, the acronym "OAM" seems to be well-known and well-understood. Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
            <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM. There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term. This memo documents an Internet Best Current Practice.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="161"/>
        <seriesInfo name="RFC" value="6291"/>
        <seriesInfo name="DOI" value="10.17487/RFC6291"/>
      </reference>
      <reference anchor="I-D.ietf-opsawg-oam-characterization">
        <front>
          <title>Guidelines for Characterizing "OAM"</title>
          <author fullname="Carlos Pignataro" initials="C." surname="Pignataro">
            <organization>North Carolina State University</organization>
          </author>
          <author fullname="Adrian Farrel" initials="A." surname="Farrel">
            <organization>Old Dog Consulting</organization>
          </author>
          <date day="11" month="November" year="2024"/>
          <abstract>
            <t>   As the IETF continues to produce and standardize different
   Operations, Administration, and Maintenance (OAM) protocols and
   technologies, various qualifiers and modifiers are prepended to the
   OAM abbreviation.  While, at first glance, the most used appear to be
   well understood, the same qualifier may be interpreted differently in
   different contexts.  A case in point is the qualifiers "in-band" and
   "out-of-band" which have their origins in the radio lexicon, and
   which have been extrapolated into other communication networks.

   This document considers some common qualifiers and modifiers that are
   prepended, within the context of packet networks, to the OAM
   abbreviation and lays out guidelines for their use in future IETF
   work.

   This document updates RFC 6291 by adding to the guidelines for the
   use of the term "OAM".  It does not modify any other part of RFC
   6291.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-oam-characterization-04"/>
      </reference>
      <reference anchor="RFC5424">
        <front>
          <title>The Syslog Protocol</title>
          <author fullname="R. Gerhards" initials="R." surname="Gerhards"/>
          <date month="March" year="2009"/>
          <abstract>
            <t>This document describes the syslog protocol, which is used to convey event notification messages. This protocol utilizes a layered architecture, which allows the use of any number of transport protocols for transmission of syslog messages. It also provides a message format that allows vendor-specific extensions to be provided in a structured way.</t>
            <t>This document has been written with the original design goals for traditional syslog in mind. The need for a new layered specification has arisen because standardization efforts for reliable and secure syslog extensions suffer from the lack of a Standards-Track and transport-independent RFC. Without this document, each other standard needs to define its own syslog packet format and transport mechanism, which over time will introduce subtle compatibility issues. This document tries to provide a foundation that syslog extensions can build on. This layered architecture approach also provides a solid basis that allows code to be written once for each syslog feature rather than once for each transport. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5424"/>
        <seriesInfo name="DOI" value="10.17487/RFC5424"/>
      </reference>
      <reference anchor="RFC6241">
        <front>
          <title>Network Configuration Protocol (NETCONF)</title>
          <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
          <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
          <date month="June" year="2011"/>
          <abstract>
            <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6241"/>
        <seriesInfo name="DOI" value="10.17487/RFC6241"/>
      </reference>
      <reference anchor="RFC8040">
        <front>
          <title>RESTCONF Protocol</title>
          <author fullname="A. Bierman" initials="A." surname="Bierman"/>
          <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
          <author fullname="K. Watsen" initials="K." surname="Watsen"/>
          <date month="January" year="2017"/>
          <abstract>
            <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8040"/>
        <seriesInfo name="DOI" value="10.17487/RFC8040"/>
      </reference>
      <reference anchor="RFC2865">
        <front>
          <title>Remote Authentication Dial In User Service (RADIUS)</title>
          <author fullname="C. Rigney" initials="C." surname="Rigney"/>
          <author fullname="S. Willens" initials="S." surname="Willens"/>
          <author fullname="A. Rubens" initials="A." surname="Rubens"/>
          <author fullname="W. Simpson" initials="W." surname="Simpson"/>
          <date month="June" year="2000"/>
          <abstract>
            <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2865"/>
        <seriesInfo name="DOI" value="10.17487/RFC2865"/>
      </reference>
      <reference anchor="RFC6733">
        <front>
          <title>Diameter Base Protocol</title>
          <author fullname="V. Fajardo" initials="V." role="editor" surname="Fajardo"/>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="J. Loughney" initials="J." surname="Loughney"/>
          <author fullname="G. Zorn" initials="G." role="editor" surname="Zorn"/>
          <date month="October" year="2012"/>
          <abstract>
            <t>The Diameter base protocol is intended to provide an Authentication, Authorization, and Accounting (AAA) framework for applications such as network access or IP mobility in both local and roaming situations. This document specifies the message format, transport, error reporting, accounting, and security services used by all Diameter applications. The Diameter base protocol as defined in this document obsoletes RFC 3588 and RFC 5719, and it must be supported by all new Diameter implementations. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6733"/>
        <seriesInfo name="DOI" value="10.17487/RFC6733"/>
      </reference>
      <reference anchor="RFC7011">
        <front>
          <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
          <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
          <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
          <author fullname="P. Aitken" initials="P." surname="Aitken"/>
          <date month="September" year="2013"/>
          <abstract>
            <t>This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network. In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required. This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process. This document obsoletes RFC 5101.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="77"/>
        <seriesInfo name="RFC" value="7011"/>
        <seriesInfo name="DOI" value="10.17487/RFC7011"/>
      </reference>
      <reference anchor="RFC7854">
        <front>
          <title>BGP Monitoring Protocol (BMP)</title>
          <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
          <author fullname="R. Fernando" initials="R." surname="Fernando"/>
          <author fullname="S. Stuart" initials="S." surname="Stuart"/>
          <date month="June" year="2016"/>
          <abstract>
            <t>This document defines the BGP Monitoring Protocol (BMP), which can be used to monitor BGP sessions. BMP is intended to provide a convenient interface for obtaining route views. Prior to the introduction of BMP, screen scraping was the most commonly used approach to obtaining such views. The design goals are to keep BMP simple, useful, easily implemented, and minimally service affecting. BMP is not suitable for use as a routing protocol.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7854"/>
        <seriesInfo name="DOI" value="10.17487/RFC7854"/>
      </reference>
      <reference anchor="RFC2439">
        <front>
          <title>BGP Route Flap Damping</title>
          <author fullname="C. Villamizar" initials="C." surname="Villamizar"/>
          <author fullname="R. Chandra" initials="R." surname="Chandra"/>
          <author fullname="R. Govindan" initials="R." surname="Govindan"/>
          <date month="November" year="1998"/>
          <abstract>
            <t>A usage of the BGP routing protocol is described which is capable of reducing the routing traffic passed on to routing peers and therefore the load on these peers without adversely affecting route convergence time for relatively stable routes. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2439"/>
        <seriesInfo name="DOI" value="10.17487/RFC2439"/>
      </reference>
      <reference anchor="RFC1958">
        <front>
          <title>Architectural Principles of the Internet</title>
          <author fullname="B. Carpenter" initials="B." role="editor" surname="Carpenter"/>
          <date month="June" year="1996"/>
          <abstract>
            <t>The Internet and its architecture have grown in evolutionary fashion from modest beginnings, rather than from a Grand Plan. While this process of evolution is one of the main reasons for the technology's success, it nevertheless seems useful to record a snapshot of the current principles of the Internet architecture. This is intended for general guidance and general interest, and is in no way intended to be a formal or invariant reference model. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="1958"/>
        <seriesInfo name="DOI" value="10.17487/RFC1958"/>
      </reference>
      <reference anchor="RFC2205">
        <front>
          <title>Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification</title>
          <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
          <author fullname="L. Zhang" initials="L." surname="Zhang"/>
          <author fullname="S. Berson" initials="S." surname="Berson"/>
          <author fullname="S. Herzog" initials="S." surname="Herzog"/>
          <author fullname="S. Jamin" initials="S." surname="Jamin"/>
          <date month="September" year="1997"/>
          <abstract>
            <t>This memo describes version 1 of RSVP, a resource reservation setup protocol designed for an integrated services Internet. RSVP provides receiver-initiated setup of resource reservations for multicast or unicast data flows, with good scaling and robustness properties. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2205"/>
        <seriesInfo name="DOI" value="10.17487/RFC2205"/>
      </reference>
      <reference anchor="RFC2113">
        <front>
          <title>IP Router Alert Option</title>
          <author fullname="D. Katz" initials="D." surname="Katz"/>
          <date month="February" year="1997"/>
          <abstract>
            <t>This memo describes a new IP Option type that alerts transit routers to more closely examine the contents of an IP packet. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2113"/>
        <seriesInfo name="DOI" value="10.17487/RFC2113"/>
      </reference>
      <reference anchor="RFC2711">
        <front>
          <title>IPv6 Router Alert Option</title>
          <author fullname="C. Partridge" initials="C." surname="Partridge"/>
          <author fullname="A. Jackson" initials="A." surname="Jackson"/>
          <date month="October" year="1999"/>
          <abstract>
            <t>This memo describes a new IPv6 Hop-by-Hop Option type that alerts transit routers to more closely examine the contents of an IP datagram. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2711"/>
        <seriesInfo name="DOI" value="10.17487/RFC2711"/>
      </reference>
      <reference anchor="RFC1034">
        <front>
          <title>Domain names - concepts and facilities</title>
          <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
          <date month="November" year="1987"/>
          <abstract>
            <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="13"/>
        <seriesInfo name="RFC" value="1034"/>
        <seriesInfo name="DOI" value="10.17487/RFC1034"/>
      </reference>
      <reference anchor="RFC5321">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin"/>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
      <reference anchor="W3C.REC-xmlschema-0-20041028" target="https://www.w3.org/TR/2004/REC-xmlschema-0-20041028/">
        <front>
          <title>XML Schema Part 0: Primer Second Edition</title>
          <author fullname="David Fallside" role="editor"/>
          <author fullname="Priscilla Walmsley" role="editor"/>
          <date day="28" month="October" year="2004"/>
        </front>
        <seriesInfo name="W3C REC" value="REC-xmlschema-0-20041028"/>
        <seriesInfo name="W3C" value="REC-xmlschema-0-20041028"/>
      </reference>
      <reference anchor="RFC3060">
        <front>
          <title>Policy Core Information Model -- Version 1 Specification</title>
          <author fullname="B. Moore" initials="B." surname="Moore"/>
          <author fullname="E. Ellesson" initials="E." surname="Ellesson"/>
          <author fullname="J. Strassner" initials="J." surname="Strassner"/>
          <author fullname="A. Westerinen" initials="A." surname="Westerinen"/>
          <date month="February" year="2001"/>
          <abstract>
            <t>This document presents the object-oriented information model for representing policy information developed jointly in the IETF Policy Framework WG and as extensions to the Common Information Model (CIM) activity in the Distributed Management Task Force (DMTF). [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3060"/>
        <seriesInfo name="DOI" value="10.17487/RFC3060"/>
      </reference>
      <reference anchor="RFC3290">
        <front>
          <title>An Informal Management Model for Diffserv Routers</title>
          <author fullname="Y. Bernet" initials="Y." surname="Bernet"/>
          <author fullname="S. Blake" initials="S." surname="Blake"/>
          <author fullname="D. Grossman" initials="D." surname="Grossman"/>
          <author fullname="A. Smith" initials="A." surname="Smith"/>
          <date month="May" year="2002"/>
          <abstract>
            <t>This document proposes an informal management model of Differentiated Services (Diffserv) routers for use in their management and configuration. This model defines functional datapath elements (e.g., classifiers, meters, actions, marking, absolute dropping, counting, multiplexing), algorithmic droppers, queues and schedulers. It describes possible configuration parameters for these elements and how they might be interconnected to realize the range of traffic conditioning and per-hop behavior (PHB) functionalities described in the Diffserv Architecture. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3290"/>
        <seriesInfo name="DOI" value="10.17487/RFC3290"/>
      </reference>
      <reference anchor="RFC3460">
        <front>
          <title>Policy Core Information Model (PCIM) Extensions</title>
          <author fullname="B. Moore" initials="B." role="editor" surname="Moore"/>
          <date month="January" year="2003"/>
          <abstract>
            <t>This document specifies a number of changes to the Policy Core Information Model (PCIM, RFC 3060). Two types of changes are included. First, several completely new elements are introduced, for example, classes for header filtering, that extend PCIM into areas that it did not previously cover. Second, there are cases where elements of PCIM (for example, policy rule priorities) are deprecated, and replacement elements are defined (in this case, priorities tied to associations that refer to policy rules). Both types of changes are done in such a way that, to the extent possible, interoperability with implementations of the original PCIM model is preserved. This document updates RFC 3060. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3460"/>
        <seriesInfo name="DOI" value="10.17487/RFC3460"/>
      </reference>
      <reference anchor="RFC3585">
        <front>
          <title>IPsec Configuration Policy Information Model</title>
          <author fullname="J. Jason" initials="J." surname="Jason"/>
          <author fullname="L. Rafalow" initials="L." surname="Rafalow"/>
          <author fullname="E. Vyncke" initials="E." surname="Vyncke"/>
          <date month="August" year="2003"/>
          <abstract>
            <t>This document presents an object-oriented information model of IP Security (IPsec) policy designed to facilitate agreement about the content and semantics of IPsec policy, and enable derivations of task- specific representations of IPsec policy such as storage schema, distribution representations, and policy specification languages used to configure IPsec-enabled endpoints. The information model described in this document models the configuration parameters defined by IPSec. The information model also covers the parameters found by the Internet Key Exchange protocol (IKE). Other key exchange protocols could easily be added to the information model by a simple extension. Further extensions can further be added easily due to the object-oriented nature of the model. This information model is based upon the core policy classes as defined in the Policy Core Information Model (PCIM) and in the Policy Core Information Model Extensions (PCIMe). [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3585"/>
        <seriesInfo name="DOI" value="10.17487/RFC3585"/>
      </reference>
      <reference anchor="RFC3644">
        <front>
          <title>Policy Quality of Service (QoS) Information Model</title>
          <author fullname="Y. Snir" initials="Y." surname="Snir"/>
          <author fullname="Y. Ramberg" initials="Y." surname="Ramberg"/>
          <author fullname="J. Strassner" initials="J." surname="Strassner"/>
          <author fullname="R. Cohen" initials="R." surname="Cohen"/>
          <author fullname="B. Moore" initials="B." surname="Moore"/>
          <date month="November" year="2003"/>
          <abstract>
            <t>This document presents an object-oriented information model for representing Quality of Service (QoS) network management policies. This document is based on the IETF Policy Core Information Model and its extensions. It defines an information model for QoS enforcement for differentiated and integrated services using policy. It is important to note that this document defines an information model, which by definition is independent of any particular data storage mechanism and access protocol.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3644"/>
        <seriesInfo name="DOI" value="10.17487/RFC3644"/>
      </reference>
      <reference anchor="RFC3670">
        <front>
          <title>Information Model for Describing Network Device QoS Datapath Mechanisms</title>
          <author fullname="B. Moore" initials="B." surname="Moore"/>
          <author fullname="D. Durham" initials="D." surname="Durham"/>
          <author fullname="J. Strassner" initials="J." surname="Strassner"/>
          <author fullname="A. Westerinen" initials="A." surname="Westerinen"/>
          <author fullname="W. Weiss" initials="W." surname="Weiss"/>
          <date month="January" year="2004"/>
          <abstract>
            <t>The purpose of this document is to define an information model to describe the quality of service (QoS) mechanisms inherent in different network devices, including hosts. Broadly speaking, these mechanisms describe the properties common to selecting and conditioning traffic through the forwarding path (datapath) of a network device. This selection and conditioning of traffic in the datapath spans both major QoS architectures: Differentiated Services and Integrated Services. This document should be used with the QoS Policy Information Model (QPIM) to model how policies can be defined to manage and configure the QoS mechanisms (i.e., the classification, marking, metering, dropping, queuing, and scheduling functionality) of devices. Together, these two documents describe how to write QoS policy rules to configure and manage the QoS mechanisms present in the datapaths of devices. This document, as well as QPIM, are information models. That is, they represent information independent of a binding to a specific type of repository</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3670"/>
        <seriesInfo name="DOI" value="10.17487/RFC3670"/>
      </reference>
      <reference anchor="RFC3805">
        <front>
          <title>Printer MIB v2</title>
          <author fullname="R. Bergman" initials="R." surname="Bergman"/>
          <author fullname="H. Lewis" initials="H." surname="Lewis"/>
          <author fullname="I. McDonald" initials="I." surname="McDonald"/>
          <date month="June" year="2004"/>
          <abstract>
            <t>This document provides definitions of models and manageable objects for printing environments. The objects included in this MIB apply to physical, as well as logical entities within a printing device. This document obsoletes RFC 1759. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3805"/>
        <seriesInfo name="DOI" value="10.17487/RFC3805"/>
      </reference>
      <reference anchor="RFC6020">
        <front>
          <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <date month="October" year="2010"/>
          <abstract>
            <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6020"/>
        <seriesInfo name="DOI" value="10.17487/RFC6020"/>
      </reference>
      <reference anchor="I-D.ietf-netmod-rfc8407bis">
        <front>
          <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
          <author fullname="Andy Bierman" initials="A." surname="Bierman">
            <organization>YumaWorks</organization>
          </author>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Qin Wu" initials="Q." surname="Wu">
            <organization>Huawei</organization>
          </author>
          <date day="5" month="May" year="2025"/>
          <abstract>
            <t>   This memo provides guidelines for authors and reviewers of
   specifications containing YANG modules, including IANA-maintained
   modules.  Recommendations and procedures are defined, which are
   intended to increase interoperability and usability of Network
   Configuration Protocol (NETCONF) and RESTCONF Protocol
   implementations that utilize YANG modules.  This document obsoletes
   RFC 8407.

   Also, this document updates RFC 8126 by providing additional
   guidelines for writing the IANA considerations for RFCs that specify
   IANA-maintained modules.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-rfc8407bis-25"/>
      </reference>
      <reference anchor="RFC8199">
        <front>
          <title>YANG Module Classification</title>
          <author fullname="D. Bogdanovic" initials="D." surname="Bogdanovic"/>
          <author fullname="B. Claise" initials="B." surname="Claise"/>
          <author fullname="C. Moberg" initials="C." surname="Moberg"/>
          <date month="July" year="2017"/>
          <abstract>
            <t>The YANG data modeling language is currently being considered for a wide variety of applications throughout the networking industry at large. Many standards development organizations (SDOs), open-source software projects, vendors, and users are using YANG to develop and publish YANG modules for a wide variety of applications. At the same time, there is currently no well-known terminology to categorize various types of YANG modules.</t>
            <t>A consistent terminology would help with the categorization of YANG modules, assist in the analysis of the YANG data modeling efforts in the IETF and other organizations, and bring clarity to the YANG- related discussions between the different groups.</t>
            <t>This document describes a set of concepts and associated terms to support consistent classification of YANG modules.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8199"/>
        <seriesInfo name="DOI" value="10.17487/RFC8199"/>
      </reference>
      <reference anchor="RFC9182">
        <front>
          <title>A YANG Network Data Model for Layer 3 VPNs</title>
          <author fullname="S. Barguil" initials="S." surname="Barguil"/>
          <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="L. Munoz" initials="L." surname="Munoz"/>
          <author fullname="A. Aguado" initials="A." surname="Aguado"/>
          <date month="February" year="2022"/>
          <abstract>
            <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
            <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9182"/>
        <seriesInfo name="DOI" value="10.17487/RFC9182"/>
      </reference>
      <reference anchor="RFC9291">
        <front>
          <title>A YANG Network Data Model for Layer 2 VPNs</title>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
          <author fullname="S. Barguil" initials="S." surname="Barguil"/>
          <author fullname="L. Munoz" initials="L." surname="Munoz"/>
          <date month="September" year="2022"/>
          <abstract>
            <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
            <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9291"/>
        <seriesInfo name="DOI" value="10.17487/RFC9291"/>
      </reference>
      <reference anchor="RFC8309">
        <front>
          <title>Service Models Explained</title>
          <author fullname="Q. Wu" initials="Q." surname="Wu"/>
          <author fullname="W. Liu" initials="W." surname="Liu"/>
          <author fullname="A. Farrel" initials="A." surname="Farrel"/>
          <date month="January" year="2018"/>
          <abstract>
            <t>The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
            <t>A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
            <t>This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture. Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8309"/>
        <seriesInfo name="DOI" value="10.17487/RFC8309"/>
      </reference>
      <reference anchor="RFC8299">
        <front>
          <title>YANG Data Model for L3VPN Service Delivery</title>
          <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
          <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
          <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
          <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
          <date month="January" year="2018"/>
          <abstract>
            <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
            <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8299"/>
        <seriesInfo name="DOI" value="10.17487/RFC8299"/>
      </reference>
      <reference anchor="RFC8499">
        <front>
          <title>DNS Terminology</title>
          <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
          <author fullname="A. Sullivan" initials="A." surname="Sullivan"/>
          <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
          <date month="January" year="2019"/>
          <abstract>
            <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
            <t>This document obsoletes RFC 7719 and updates RFC 2308.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8499"/>
        <seriesInfo name="DOI" value="10.17487/RFC8499"/>
      </reference>
      <reference anchor="RFC3198">
        <front>
          <title>Terminology for Policy-Based Management</title>
          <author fullname="A. Westerinen" initials="A." surname="Westerinen"/>
          <author fullname="J. Schnizlein" initials="J." surname="Schnizlein"/>
          <author fullname="J. Strassner" initials="J." surname="Strassner"/>
          <author fullname="M. Scherling" initials="M." surname="Scherling"/>
          <author fullname="B. Quinn" initials="B." surname="Quinn"/>
          <author fullname="S. Herzog" initials="S." surname="Herzog"/>
          <author fullname="A. Huynh" initials="A." surname="Huynh"/>
          <author fullname="M. Carlson" initials="M." surname="Carlson"/>
          <author fullname="J. Perry" initials="J." surname="Perry"/>
          <author fullname="S. Waldbusser" initials="S." surname="Waldbusser"/>
          <date month="November" year="2001"/>
          <abstract>
            <t>This document is a glossary of policy-related terms. It provides abbreviations, explanations, and recommendations for use of these terms. The intent is to improve the comprehensibility and consistency of writing that deals with network policy, particularly Internet Standards documents (ISDs). This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3198"/>
        <seriesInfo name="DOI" value="10.17487/RFC3198"/>
      </reference>
      <reference anchor="RFC2975">
        <front>
          <title>Introduction to Accounting Management</title>
          <author fullname="B. Aboba" initials="B." surname="Aboba"/>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="D. Harrington" initials="D." surname="Harrington"/>
          <date month="October" year="2000"/>
          <abstract>
            <t>This document describes and discusses the issues involved in the design of the modern accounting systems. The field of Accounting Management is concerned with the collection the collection of resource consumption data for the purposes of capacity and trend analysis, cost allocation, auditing, and billing. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2975"/>
        <seriesInfo name="DOI" value="10.17487/RFC2975"/>
      </reference>
      <reference anchor="NEMOPS">
        <front>
          <title>Report from the IAB Workshop on the Next Era of Network Management Operations (NEMOPS)</title>
          <author fullname="Wes Hardaker" initials="W." surname="Hardaker">
         </author>
          <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
         </author>
          <date day="18" month="February" year="2025"/>
          <abstract>
            <t>   The "Next Era of Network Management Operations (NEMOPS)" workshop was
   convened by the Internet Architecture Board (IAB) from December 3-5,
   2024 as a three-day online meeting.  It builds on a previous 2002
   workshop, the outcome of which was documented in RFC 3535 identifying
   14 operator requirements for consideration in future network
   management protocol design and related data models, along with some
   recommendations for the IETF.  Much has changed in the Internet’s
   operation and technological foundations since then.  The NEMOPS
   workshop reviewed the past outcomes and discussed any operational
   barriers that prevented these technologies from being widely
   implemented.  With the industry, network operators and protocol
   engineers working in collaboration, the workshop developed a
   suggested plan of action and network management recommendations for
   the IETF and IRTF.

   Note that this document is a report on the proceedings of the
   workshop.  The views and positions documented in this report were
   expressed during the workshop by participants and do not necessarily
   reflect IAB's views and positions.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-iab-nemops-workshop-report-01"/>
      </reference>
    </references>
    <?line 1428?>

<section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TBC.</t>
      <dl>
        <dt>The author of RFC 5706:</dt>
        <dd>
          <t>David Harrington</t>
        </dd>
        <dt>Acknowledgments from RFC 5706:</dt>
        <dd>
          <t>This document started from an earlier document edited by Adrian
Farrel, which itself was based on work exploring the need for
Manageability Considerations sections in all Internet-Drafts produced
within the Routing Area of the IETF. That earlier work was produced
by Avri Doria, Loa Andersson, and Adrian Farrel, with valuable
feedback provided by Pekka Savola and Bert Wijnen.</t>
        </dd>
        <dt/>
        <dd>
          <t>Some of the discussion about designing for manageability came from
private discussions between Dan Romascanu, Bert Wijnen, Jürgen Schönwälder, Andy Bierman, and David Harrington.</t>
        </dd>
        <dt/>
        <dd>
          <t>Thanks to reviewers who helped fashion this document, including
Harald Alvestrand, Ron Bonica, Brian Carpenter, Benoît Claise, Adrian
Farrel, David Kessens, Dan Romascanu, Pekka Savola, Jürgen Schönwälder, Bert Wijnen, Ralf Wolter, and Lixia Zhang.</t>
        </dd>
      </dl>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
