<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-opsarea-rfc5706bis-06" category="bcp" consensus="true" submissionType="IETF" obsoletes="5706" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Operations &amp; Management Considerations">Guidelines for Considering Operations and Management in IETF Specifications</title>
    <seriesInfo name="Internet-Draft" value="draft-opsarea-rfc5706bis-06"/>
    <author fullname="Benoit Claise">
      <organization>Everything OPS</organization>
      <address>
        <email>benoit@everything-ops.net</email>
      </address>
    </author>
    <author fullname="Joe Clarke">
      <organization>Cisco</organization>
      <address>
        <email>jclarke@cisco.com</email>
      </address>
    </author>
    <author fullname="Adrian Farrel">
      <organization>Old Dog Consulting</organization>
      <address>
        <email>adrian@olddog.co.uk</email>
      </address>
    </author>
    <author fullname="Samier Barguil">
      <organization>Nokia</organization>
      <address>
        <email>samier.barguil_giraldo@nokia.com</email>
      </address>
    </author>
    <author fullname="Carlos Pignataro">
      <organization>Blue Fern Consulting</organization>
      <address>
        <email>carlos@bluefern.consulting</email>
        <email>cpignata@gmail.com</email>
        <uri>https://bluefern.consulting</uri>
      </address>
    </author>
    <author fullname="Ran Chen">
      <organization>ZTE</organization>
      <address>
        <email>chen.ran@zte.com.cn</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>Operations and Management</area>
    <keyword>management</keyword>
    <keyword>operations</keyword>
    <keyword>operations and management</keyword>
    <keyword>ops considerations</keyword>
    <abstract>
      <?line 94?>

<t>New Protocols or Protocol Extensions are best designed with due
   consideration of the functionality needed to operate and manage them.
   Retrofitting operations and management considerations is suboptimal.
   The purpose of this document is to provide guidance to authors and
   reviewers on what operational and management aspects should be
   addressed when defining New Protocols or Protocol Extensions.</t>
      <t>This document obsoletes RFC 5706, replacing it completely and updating
   it with new operational and management techniques and mechanisms. It also
   introduces a requirement to include an "Operational Considerations"
   section in new RFCs in the IETF Stream.</t>
    </abstract>
  </front>
  <middle>
    <?line 108?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Often, when New Protocols or Protocol Extensions are developed, not
   enough consideration is given to how they will be deployed,
   operated, and managed. Retrofitting operations and management
   mechanisms is often hard and architecturally unpleasant, and certain
   protocol design choices may make deployment, operations, and
   management particularly difficult.
   To ensure deployability, the operational environment and manageability
   must be considered during design.</t>
      <t>This document provides guidelines to help Protocol Designers and working
   groups (WGs) consider the operations and management functionality for
   their New Protocol or Protocol Extension at an early phase in the design
   process.</t>
      <t>This document obsoletes <xref target="RFC5706"/> and fully updates its content
   with new operational and management techniques and mechanisms. It also
   introduces a requirement for an "Operational Considerations"
   section in new RFCs in the IETF Stream.
   This document also removes outdated
   references and aligns with current practices, protocols, and
   technologies used in operating and managing devices, networks, and
   services. See <xref target="sec-changes-since-5706"/> for more details.</t>
      <section anchor="sec-this-doc">
        <name>This Document</name>
        <t>This document provides a set of guidelines for considering
   operations and management in an IETF technical specification
   with an eye toward being flexible while also striving for
   interoperability.</t>
        <t>Entirely New Protocols may require significant consideration of expected
   operations and management, while Protocol Extensions to existing, widely
   deployed protocols may have established de facto operations and
   management practices that are already well understood. This document does
   not mandate a comprehensive inventory of all operational considerations.
   Instead, it guides authors to focus on key aspects that are essential for
   the technology's deployability, operation, and maintenance.</t>
        <t>Suitable management approaches may vary for different areas, working
   groups, and protocols in the IETF. This document does not prescribe
   a fixed solution or format in dealing with operational and management
   aspects of IETF protocols. However, these aspects should be
   considered for any IETF protocol, given the IETF's role in developing technologies, New Protocols, and Protocol Extensions
   to be deployed and operated in the real-world Internet.</t>
        <t>A WG may decide that its protocol does not need interoperable
   management or a standardized Data Model, but this should be a
   deliberate and documented decision, not the result of omission. This document
   provides some guidelines for those considerations.</t>
        <t>This document makes a distinction between "Operational
   Considerations" and "Management Considerations", although the two are
   closely related. The operational considerations apply to operating protocols within a network, even
   if there was no management protocol actively being used. The section on manageability is focused on
   management technology, such as how to utilize management protocols
   and how to design management Data Models.</t>
      </section>
      <section anchor="sec-audience">
        <name>Audience</name>
        <t>The guidelines are intended to be useful to authors
   writing protocol specifications.
   They outline what to consider for management and deployment, how to document
   those aspects, and how to present them in a consistent format.
    This document is intended to offer a flexible set of
   guiding principles applicable to various circumstances. It provides a framework for working groups
   to ensure that manageability considerations are an integral part of the protocol design process, and
   its use should not be misinterpreted as imposing new hurdles on work in other areas.</t>
        <t>Protocol Designers should consider which operations and management
   needs are relevant to their protocol, document how those needs could
   be addressed, and suggest (preferably standard) management protocols
   and Data Models that could be used to address those needs. This is
   similar to a WG that considers which security threats are relevant to
   their protocol, documents (in the required Security Considerations section,
   per Guidelines for Writing RFC Text on Security Considerations <xref target="BCP72"/>)
   how threats should be mitigated, and then suggests appropriate standard
   protocols that could mitigate the threats.</t>
        <t>A core principle of this document is to encourage early on discussions rather than mandating any specific solution.
   It does not impose a specific management or operational solution,
   imply that a formal Data Model is needed, or imply that using a specific management
   protocol is mandatory. If Protocol Designers conclude that the technology can be
   managed solely by using Proprietary Interfaces or that it does
   not need any structured or standardized Data Model, this might be fine,
   but it is a decision that should be explicit in a manageability discussion
   -- that this is how the protocol will need to be operated and managed.
   Protocol Designers should avoid deferring manageability to a later
   phase of the development of the specification.</t>
        <t>When a WG considers operation and management functionality for a
   protocol, the document should contain enough information for readers
   to understand how the protocol will be deployed, operated, and managed. The considerations
   do not need to be comprehensive and exhaustive; focus should be on key aspects. The WG
   should expect that considerations for operations and management may
   need to be updated in the future, after further operational
   experience has been gained.</t>
        <t>The Ops Directorate (OpsDir) can use this document to inform their reviews. A list of guidelines and a
   checklist of questions to consider, which a reviewer can use to evaluate whether the protocol and
   documentation address common operations and management needs, is provided in <xref target="CHECKLIST"/>. Ultimately,
   the decision to incorporate this document's advice into their work remains with Protocol Designers and working groups themselves.</t>
        <t>This document is also of interest to the broader community, who wants to understand, contribute to,
   and review Internet-Drafts, taking operational considerations into account.</t>
      </section>
    </section>
    <section anchor="sec-terms">
      <name>Terminology</name>
      <t>This document does not describe interoperability requirements. As such, it does not use the capitalized keywords defined in <xref target="BCP14"/>.</t>
      <t>This section defines key terms used throughout the document to ensure clarity and consistency. Some terms are drawn from existing RFCs and IETF Internet-Drafts, while others are defined here for the purposes of this document. Where appropriate, references are provided for further reading or authoritative definitions.</t>
      <ul spacing="normal">
        <li>
          <t>Anomaly: See <xref target="I-D.ietf-nmop-terminology"/>.</t>
        </li>
        <li>
          <t>Cause: See <xref target="I-D.ietf-nmop-terminology"/>.</t>
        </li>
        <li>
          <t>CLI: Command Line Interface. A human-oriented interface, typically
a Proprietary Interface, to hardware or software devices
(e.g., hosts, routers, or operating systems). The commands, their syntax,
and the precise semantics of the parameters may vary considerably
between different vendors, between products from the same
vendor, and even between different versions or releases of a single
product. No attempt at standardizing CLIs has been made by the IETF.</t>
        </li>
        <li>
          <t>Data Model: A set of mechanisms for representing, organizing, storing,
and handling data within a particular type of data store or repository.
This usually comprises a collection of data structures such as lists, tables,
relations, etc., a collection of operations that can be applied to the
structures such as retrieval, update, summation, etc., and a collection of
integrity rules that define the legal states (set of values) or changes of
state (operations on values). A Data Model may be derived by mapping the
contents of an Information Model or may be developed ab initio. Further
discussion of Data Models can be found in <xref target="RFC3444"/>, <xref target="sec-interop"/>,
and <xref target="sec-mgmt-info"/>.</t>
        </li>
        <li>
          <t>Fault: See <xref target="I-D.ietf-nmop-terminology"/>.</t>
        </li>
        <li>
          <t>Fault Management: The process of interpreting fault notifications and other alerts
and alarms, isolating faults, correlating them, and deducing underlying
Causes. See <xref target="sec-fm-mgmt"/> for more information.</t>
        </li>
        <li>
          <t>Information Model: An abstraction and representation of the
entities in a managed environment, their properties, attributes
and operations, and the way that they relate to each other. The model is
independent of any specific software usage, protocol,
or platform <xref target="RFC3444"/>. See Sections <xref format="counter" target="sec-interop"/> and <xref format="counter" target="sec-im-design"/> for
further discussion of Information Models.</t>
        </li>
        <li>
          <t>New Protocol and Protocol Extension: These terms are used in this document
to identify entirely new protocols, new versions of existing
protocols, and extensions to protocols.</t>
        </li>
        <li>
          <t>OAM: Operations, Administration, and Maintenance <xref target="RFC6291"/>
            <xref target="I-D.ietf-opsawg-oam-characterization"/> is the term given to the
combination of:  </t>
          <ol spacing="normal" type="1"><li>
              <t>Operation activities that are undertaken to keep the
network running as intended. They include monitoring of the network.</t>
            </li>
            <li>
              <t>Administration activities that keep track of resources in the
network and how they are used. They include the bookkeeping necessary
to track networking resources.</t>
            </li>
            <li>
              <t>Maintenance activities focused on facilitating repairs and upgrades.
They also involve corrective and preventive measures to make the
managed network run more effectively.</t>
            </li>
          </ol>
          <t>
The broader concept of "operations and management" that is the subject of
this document encompasses OAM, in addition to other management and provisioning
tools and concepts.</t>
        </li>
        <li>
          <t>Probable Root Cause: See <xref target="I-D.ietf-nmop-network-incident-yang"/></t>
        </li>
        <li>
          <t>Problem: See <xref target="I-D.ietf-nmop-terminology"/>.</t>
        </li>
        <li>
          <t>Proprietary Interface: An interface to manage a network element
that is not standardized. As such, the user interface, syntax, and
semantics typically vary significantly between implementations.
Examples of proprietary interfaces include Command Line
Interface (CLI), management web portal and Browser User Interface (BUI),
Graphical User Interface (GUI), and vendor-specific application
programming interface (API).</t>
        </li>
        <li>
          <t>Protocol Designer: An individual, a group of
people, or an IETF WG involved in the development and specification
of New Protocols or Protocol Extensions.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-doc-req-ietf-spec">
      <name>Documentation Requirements for IETF Specifications</name>
      <section anchor="sec-oper-manag-considerations">
        <name>"Operational Considerations" Section</name>
        <t>All Internet-Drafts that document a technical specification and are advanced for publication
   as IETF RFCs are required to include an "Operational Considerations" section.
   Internet-Drafts that do not document technical specifications such as process, policy, or administrative
   Internet-Drafts are not required to include such a section.</t>
        <t>After evaluating the operational (<xref target="sec-oper-consid"/>) and manageability aspects (<xref target="sec-mgmt-consid"/>) of a New
   Protocol, a Protocol Extension, or an architecture, the resulting practices and
   requirements should be documented
   in an "Operational Considerations" section within a
   specification. Since protocols are intended for operational deployment and
   management within real networks, it is expected that such considerations
   will be present.</t>
        <t>It is also recommended that operational and manageability considerations
   be addressed early in the protocol design process. Consequently, early
   revisions of Internet-Drafts are expected to include an "Operational
   Considerations" section.</t>
        <t>An "Operational Considerations" section should include discussion of
   the management and operations topics raised in this document, and
   when one or more of these topics is not relevant, it would be useful
   to include a simple statement explaining why the topic is not
   relevant or applicable for the New Protocol or Protocol Extension.
   Of course, additional relevant operational and manageability topics
   should be included as well.</t>
        <t>Existing protocols and Data Models can provide the management
   functions identified in the previous section. Protocol Designers
   should consider how using existing protocols and Data Models might
   impact network operations.</t>
      </section>
      <section anchor="sec-null-sec">
        <name>"Operational Considerations" Section Boilerplate When No New Considerations Exist</name>
        <t>After a Protocol Designer has considered the manageability
   requirements of a New Protocol or Protocol Extension, they may determine that no
   management functionality or operational best-practice clarifications are
   needed. It would be helpful to
   reviewers, those who may update or write extensions to the protocol in the
   future, or to those deploying the protocol, to know the rationale
   regarding the decisions on manageability of the protocol at the
   time of its design.</t>
        <t>If there are no new manageability or deployment considerations, the "Operational Considerations" section
   must contain the following simple statement, followed by a brief explanation of
   why that is the case.</t>
        <artwork><![CDATA[
  "There are no new operations or manageability requirements introduced
    by this document.

    Explanation: [brief rationale goes here]"
]]></artwork>
        <t>The presence of such a
   section would indicate to the reader that due
   consideration has been given to manageability and operations.</t>
        <t>In cases where the specification is a Protocol Extension and the base protocol
   already addresses the relevant operational and manageability
   considerations, it is helpful to reference the considerations section
   in the base document.</t>
      </section>
      <section anchor="sec-placement-sec">
        <name>Placement of the "Operational Considerations" Section</name>
        <t>It is recommended that the section be
   placed immediately before the Security Considerations section.
   Reviewers interested in such sections will find it easily, and this
   placement could simplify the development of tools to detect the
   presence of such a section.</t>
      </section>
    </section>
    <section anchor="sec-oper-consid">
      <name>How Will the New Protocol or Protocol Extension Fit into the Current Environment?</name>
      <t>Designers of a New Protocol or Protocol Extension should carefully consider the operational
   aspects. To ensure that a protocol will be practical to deploy in
   the real world, it is not enough to merely define it very precisely
   in a well-written document. Operational aspects will have a serious
   impact on the actual success of a protocol. Such aspects include bad
   interactions with existing solutions, a difficult upgrade path,
   difficulty of debugging problems, difficulty configuring from a
   central database, or a complicated state diagram that operations
   staff will find difficult to understand. <xref target="RFC5218"/> provides
   a more detailed discussion on what makes for a successful protocol.</t>
      <t>BGP flap damping <xref target="RFC2439"/> is an example. It was designed to block
   high-frequency route flaps; however, the design did not consider the
   existence of BGP path exploration / slow convergence. In real
   operations, path exploration caused false flap damping, resulting in
   loss of reachability. As a result, many networks turned flap damping
   off.</t>
      <section anchor="sec-ops">
        <name>Operations</name>
        <t>Protocol Designers can analyze the operational environment and mode
   of work in which the New Protocol and Protocol Extension will work. Such an
   exercise need not be reflected directly by text in their document
   but could help in visualizing how to apply the protocol in the
   Internet environments where it will be deployed.</t>
        <t>A key question is how the protocol can operate "out of the box". If
   implementers are free to select their own defaults, the protocol
   needs to operate well with any choice of values. If there are
   sensible defaults, these need to be stated.</t>
        <t>There may be a need to support both a human interface (e.g., for
   troubleshooting) and a programmatic interface (e.g., for automated
   monitoring and Cause analysis). The application programming
   interfaces (APIs) and the human interfaces might benefit from being similar
   to ensure that the information exposed by both is
   consistent when presented to an operator. It is also relevant to
   identify consistent methods for determining information, such as
   what is counted in specific counters.</t>
        <t>Protocol Designers should consider what management operations are
   expected to be performed as a result of the deployment of the
   protocol -- for example whether write operations are permitted on
   routers and on hosts, or whether notifications for alarms or other
   events will be expected.</t>
      </section>
      <section anchor="sec-install">
        <name>Installation and Initial Setup</name>
        <t>Anything that can be configured can be misconfigured. "Architectural
   Principles of the Internet" <xref target="RFC1958"/>, Section 3.8, states: "Avoid
   options and parameters whenever possible. Any options and parameters
   should be configured or negotiated dynamically rather than manually".</t>
        <t>To simplify configuration, Protocol Designers should consider
   specifying reasonable defaults, including default modes and
   parameters. For example, it could be helpful or necessary to specify
   default values for modes, timers, default state of logical control
   variables, default transports, and so on. Even if default values are
   used, it must be possible to retrieve all the actual values or at
   least an indication that known default values are being used.</t>
        <t>Protocol Designers should consider how to enable operators to
   concentrate on the configuration of the network or service infrastructure as a whole rather
   than on individual devices. Of course, how one accomplishes this is
   the hard part.</t>
        <t>Protocol Designers should explain the background of chosen default
   values and provide the rationale, especially when those choices may
   affect operations. In many cases, as
   technology changes, the values in an RFC might make less and less
   sense. It is very useful to understand whether defaults are based on
   best current practice and are expected to change as technologies
   advance or whether they have a more universal value that should not
   be changed lightly. For example, the default interface speed might
   be expected to change over time due to increased speeds in the
   network, and cryptographic algorithms might be expected to change
   over time as older algorithms are "broken".</t>
        <t>It is extremely important to set a sensible default value for all
   parameters.</t>
        <t>Default values should generally favor the conservative side over the
   "optimizing performance" side (e.g., the initial Round-Trip Time (RTT) and
   Round-Trip Time Variance (RTTVAR) values of a TCP connection <xref target="RFC6298"/>).</t>
        <t>For those parameters that are speed-dependent, instead of using a
   constant, try to set the default value as a function of the link
   speed or some other relevant factors. This would help reduce the
   chance of problems caused by technology advancement.</t>
        <t>For example, where protocols involve cryptographic keys, Protocol Designers should
   consider not only key generation and validation mechanisms but also the
   format in which private keys are stored, transmitted, and restored.
   Designers should specify any expected consistency checks
   (e.g., recomputing an expanded key from the seed) that help verify
   correctness and integrity. Additionally, guidance should be given on
   data retention, restoration limits, and cryptographic module
   interoperability when importing/exporting private key material. See <xref target="I-D.ietf-lamps-dilithium-certificates"/> for an example of how such considerations are incorporated.</t>
      </section>
      <section anchor="sec-migration">
        <name>Migration Path</name>
        <t>If the New Protocol or Protocol Extension is a new version of an existing one, or if it is
   replacing another technology, the Protocol Designer should consider
   how deployments should transition to the New Protocol or Protocol
   Extensions. This should include coexistence with previously deployed
   protocols and/or previous versions of the same protocol, management of
   incompatibilities between versions, translation between versions,
   and consideration of potential side effects. A key question becomes:
   Are older protocols or versions disabled, or do they coexist in the
   network with the New Protocol or Protocol Extension?</t>
        <t>Many protocols benefit from being incrementally deployable --
   operators may deploy aspects of a protocol before deploying the
   protocol fully. In those cases, the design considerations should
   also specify whether the New Protocol or Protocol Extension requires any changes to
   the existing infrastructure, particularly the network.
   If so, the protocol specification should describe the nature of those
   changes, where they are required, and how they can be introduced in
   a manner that facilitates deployment.</t>
        <t>Incentivizing good security operation practices when migrating to the New Protocol or Protocol Extension should be encouraged. For example, patching is fundamental for security operations and can be incentivized if Protocol Designers consider supporting cheap and fast connection hand-offs and reconnections.</t>
        <t>When Protocol Designers are considering how deployments should transition to the New Protocol or Protocol Extension, impacts to current techniques employed by operators should be documented and mitigations included, where possible, so that consistent security operations and management can be achieved.
   Refer to <xref target="RFC8170"/> for a detailed discussed on transition versus coexistence.</t>
      </section>
      <section anchor="sec-other">
        <name>Requirements on Other Protocols and Functional Components</name>
        <t>Protocol Designers should consider the requirements that the New
   Protocol might put on other protocols and functional components and
   should also document the requirements from other protocols and
   functional components that have been considered in designing the New
   Protocol.</t>
        <t>These considerations should generally remain illustrative to avoid
   creating restrictions or dependencies, or potentially impacting the
   behavior of existing protocols, or restricting the extensibility of
   other protocols, or assuming other protocols will not be extended in
   certain ways. If restrictions or dependencies exist, they should be
   stated.</t>
        <t>For example, the design of the Resource ReSerVation Protocol (RSVP)
   <xref target="RFC2205"/> required each router to look at the RSVP PATH message and,
   if the router understood RSVP, add its own address to the message to
   enable automatic tunneling through non-RSVP routers. But in reality,
   routers cannot look at an otherwise normal IP packet and potentially
   take it off the fast path! The initial designers overlooked that a
   new "deep packet inspection" requirement was being put on the
   functional components of a router. The "router alert" option
   (<xref target="RFC2113"/>, <xref target="RFC2711"/>) was finally developed to solve this problem,
   for RSVP and other protocols that require the router to take some
   packets off the fast-forwarding path. Yet, Router Alert has its own
   problems in impacting router performance.</t>
      </section>
      <section anchor="sec-impact">
        <name>Impact on Network Operation</name>
        <t>The introduction of a New Protocol or Protocol Extensions may
   have an impact on the operation of existing networks. As discussed in <xref section="2.1" sectionFormat="of" target="RFC6709"/>
   major extensions may have characteristics leading to a risk of
   operational
   problems. Protocol
   Designers should outline such operational impacts (which may be positive),
   including scaling benefits or concerns, and interactions with other protocols.
   Protocol Designers should describe the scenarios in which the New
   Protocol or its extensions are expected to be applicable or
   beneficial. This includes any relevant deployment environments,
   network topologies, usage constraints such as limited domains
   <xref target="RFC8799"/>, or use cases that justify or constrain adoption.
   For example, a New Protocol or Protocol Extension that doubles the number of active,
   reachable addresses in a network might have implications for the
   scalability of interior gateway protocols, and such impacts should
   be evaluated accordingly.</t>
        <t>If the protocol specification requires changes to end hosts, it should
   also indicate whether safeguards exist to protect networks from
   potential overload. For instance, a congestion control algorithm must
   comply with <xref target="BCP133"/> to prevent congestion collapse and ensure
   network stability.</t>
        <t>A protocol could send active monitoring packets on the wire. Without careful
   consideration, active monitoring might achieve high accuracy at the cost of
   generating an excessive number of monitoring packets.</t>
        <t>Protocol Designers should consider the potential impact on the
   behavior of other protocols in the network and on the traffic levels
   and traffic patterns that might change, including specific types of
   traffic, such as multicast. Also, consider the need to install new
   components that are added to the network as a result of changes in
   the configuration, such as servers performing auto-configuration
   operations.</t>
        <t>Protocol Designers should consider also the impact on
   infrastructure applications like DNS <xref target="RFC1034"/>, the registries, or
   the size of routing tables. For example, Simple Mail Transfer
   Protocol (SMTP) <xref target="RFC5321"/> servers use a reverse DNS lookup to filter
   out incoming connection requests: when Berkeley installed a new spam filter,
   their mail server stopped functioning because of overload of the DNS
   cache resolver.</t>
        <t>The impact of New Protocols or Protocol Extensions, and the results
of new OAM tools developed for the New Protocols or Protocol
Extensions, must be considered with respect to the performance of
traffic delivery and the availability of ongoing manageability. For
example, it must be noted if the New Protocols or Protocol Extensions
or the OAM tools cause increased delay or jitter in real-time traffic
applications, or increased response time in client-server
applications. Further, if the additional traffic caused by OAM tools
and data collection could result in the management plane becoming
overwhelmed, then this must be called out, and suitable mechanisms to
rate limit the OAM must be considered. Potential options include: document the limitations, propose solution track(s), include an optional rate limiting feature in the specifications, or impose a rate limiting feature in the specifications.  Consider three examples: in
Bidirectional Forwarding Detection for MPLS <xref target="RFC5884"/> it is
possible to configure very rapid BFD transmissions (of the order of
3ms) on a very large number of parallel Label Switched Paths (LSPs)
with the result that the management systems and end nodes may become
overwhelmed -- this can be protected by applying limits to
the number of LSPs that may be tested at once; notifications or logs
from systems (through YANG or other means) should be rate-limited so
that they do not flood the receiving management station; the
application of sophisticated encryption or filtering rules need to
be considered in the light of the additional processing they may
impose on the hardware forwarding path for traffic.</t>
        <t>New metrics may be required to assess traffic performance. Protocol Designers may refer to <xref target="RFC6390"/> for guidelines for considering new performance metrics.</t>
        <t>It is important to minimize the impact caused by configuration
   changes. Given configuration A and configuration B, it should be
   possible to generate the operations necessary to get from A to B with
   minimal state changes and effects on network and systems.</t>
      </section>
      <section anchor="sec-impact-secops">
        <name>Impact on Security Operations</name>
        <t>Security Operations (SecOps) is a collaborative approach that combines security and operational teams to improve the ability of operators to protect and manage the network effectively and efficiently<xref target="SECOPS"/>. Security operators detect malicious activity and respond to threats and are a crucial part of defending against attacks alongside the management and operation of the network.</t>
        <t>Protocol Designers should consider the impacts of a New Protocol or Protocol Extension on Security Operations in networks that the protocol will be deployed in.</t>
        <t>Security operators extensively rely upon Indicators of Compromise (IoCs) <xref target="RFC9424"/>. The deployment of New Protocol or Protocol Extension may change the type, locations, or availability of IoCs. Protocol Designers should outline such changes to ensure operators can manage and defend their network consistently.
Consider the operators' requirement for digital forensics from the network or endpoints with critical information found in logs. Logging events schema and guidance for operators should be considered when designing a New Protocol or Protocol Extension to ensure that operators have the information they need. <xref target="I-D.ietf-quic-qlog-main-schema"/> is an example of extensible structured logging.</t>
        <t>Tooling required by security operators should be documented in the design and deployment of a New Protocol or Protocol Extension. Operators may require new tooling or methods for managing network traffic in response to protocol changes to ensure consistent availability and performance of networks. Similarly, updating and augmenting existing forensic tools such as protocol dissectors is expected when a New Protocol is deployed, but having to completely rebuild such tooling would greatly reduce the effectiveness of security operators, so protocol extensibility should be considered.</t>
      </section>
      <section anchor="sec-oper-verify">
        <name>Verifying Correct Operation</name>
        <t>Protocol Designers should consider techniques for testing the
   effect that the protocol has had on the network by sending data
   through the network and observing its behavior (a.k.a., active
   monitoring). Protocol Designers should consider how the correct end-
   to-end operation of the New Protocol or Protocol Extension in the network can be tested
   actively and passively, and how the correct data or forwarding plane
   function of each network element can be verified to be working
   properly with the New Protocol or Protocol Extension. Which metrics are of interest?</t>
        <t>Having simple protocol status and health indicators on network
   devices is a recommended means to check correct operation.</t>
      </section>
      <section anchor="sec-messages">
        <name>Message Formats</name>
        <t>Where protocol specifications result in messages (such as errors or warnings) being carried as text strings or output for consumption by human operators, consideration should be given to making it possible for implementations to be configured so that the messages can be viewed in the local language. In such cases, it may be helpful to transmit a specific message code (i.e., a number) along with the default English language message, so that implementations may easily map the code to a local text string.</t>
        <t>Further discussion of Internationalization issues may be found in <xref target="BCP166"/>.</t>
      </section>
    </section>
    <section anchor="sec-mgmt-consid">
      <name>How Will the Protocol Be Managed?</name>
      <t>The considerations of manageability should start from identifying the
   entities to be managed, as well as how the managed protocol is
   supposed to be installed, configured, and monitored.</t>
      <t>Considerations for management should include a discussion of what
   needs to be managed, and how to achieve various management tasks.
   Where are the managers and what type of interfaces and
   protocols will they need? The "write a MIB module" approach to
   considering management often focuses on monitoring a protocol
   endpoint on a single device. A MIB module document typically only
   considers monitoring properties observable at one end, while the
   document does not really cover managing the *protocol* (the
   coordination of multiple ends) and does not even come near managing
   the *service* (which includes a lot of stuff that is very far away
   from the box). This scenario reflects a common operational
   concern: the inability to manage both ends of a connection
   effectively. As noted in <xref target="RFC3535"/>, "MIB modules can often be
   characterized as a list of ingredients without a recipe".</t>
      <t>The management model should take into account factors such as:</t>
      <ul spacing="normal">
        <li>
          <t>What type of management entities will be involved (agents, network
management systems)?</t>
        </li>
        <li>
          <t>What is the possible architecture (client-server, manager-agent,
poll-driven or event-driven, auto-configuration, two levels or
hierarchical)?</t>
        </li>
        <li>
          <t>What are the management operations (initial configuration, dynamic
configuration, alarm and exception reporting, logging, performance
monitoring, performance reporting, debugging)?</t>
        </li>
        <li>
          <t>How are these operations performed (locally, remotely, atomic
operation, scripts)? Are they performed immediately or are they
time scheduled, or event triggered?</t>
        </li>
      </ul>
      <t>Protocol Designers should consider how the New Protocol or Protocol Extension will be
   managed in different deployment scales. It might be sensible to use
   a local management interface to manage the New Protocol or Protocol Extension on a single
   device, but in a large network, remote management using a centralized
   server and/or using distributed management functionality might make
   more sense. Auto-configuration and default parameters might be
   possible for some New Protocols or Protocol Extensions.</t>
      <t>Management needs to be considered not only from the perspective of a
   device, but also from the perspective of network and service
   management. A service might be network and operational functionality
   derived from the implementation and deployment of a New Protocol or Protocol Exension.
   Often an individual network element is not aware of the service being
   delivered.</t>
      <t>WGs should consider how to configure multiple related/co-operating
   devices and how to back off if one of those configurations fails or
   causes trouble. NETCONF addresses this in a generic manner
   by allowing an operator to lock the configuration on multiple
   devices, perform the configuration settings/changes, check that they
   are OK (undo if not), and then unlock the devices.</t>
      <t>Techniques for debugging protocol interactions in a network must be
   part of the network-management discussion. Implementation source
   code should be debugged before ever being added to a network, so
   asserts and memory dumps do not normally belong in management data
   models. However, debugging on-the-wire interactions is a protocol
   issue: while the messages can be seen by sniffing, it is enormously
   helpful if a protocol specification supports features that make
   debugging of network interactions and behaviors easier. There could
   be alerts issued when messages are received or when there are state
   transitions in the protocol state machine. However, the state
   machine is often not part of the on-the-wire protocol; the state
   machine explains how the protocol works so that an implementer can
   decide, in an implementation-specific manner, how to react to a
   received event.</t>
      <t>In a client/server protocol, it may be more important to instrument
   the server end of a protocol than the client end, since the
   performance of the server might impact more nodes than the
   performance of a specific client.</t>
      <section anchor="sec-mgmt-tech">
        <name>Available Management Technologies</name>
        <t>The IETF provides several standardized management protocols suitable for
   various operational purposes, for example as outlined in <xref target="RFC6632"/>.</t>
        <t>Readers seeking more in-depth definitions or explanations should consult
   the referenced materials.</t>
      </section>
      <section anchor="sec-interop">
        <name>Interoperability</name>
        <t>Management interoperability is critical for enabling information exchange
   and operations across diverse network devices and management applications,
   regardless of vendor, model, or software release. It facilitates the use
   of third-party applications and outsourced management services.</t>
        <t>While individual device management via Proprietary Interfaces may
   suffice for small deployments, large-scale networks comprising equipment
   from multiple vendors necessitate consistent, automated management.
   Relying on vendor- and model-specific interfaces for extensive deployments,
   such as hundreds of branch offices, severely impedes scalability and automation
   of operational processes. The primary goal of management interoperability is to
   enable the scalable deployment and lifecycle management of new network functions
   and services, while ensuring a clear understanding of their operational impact
   and total cost of ownership.</t>
        <t>Achieving universal agreement on a single management syntax and protocol is challenging.
   However, the IETF has significantly evolved its approach to network management, moving
   beyond SMIv2 and SNMP. Modern IETF management solutions primarily leverage YANG <xref target="RFC7950"/>
   for Data Modeling and NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/> for protocol interactions.
   This shift, as further elaborated in <xref target="RFC6632"/>, emphasizes structured Data Models and
   programmatic interfaces to enhance automation and interoperability. Other protocols, such as
   IPFIX <xref target="RFC7011"/> for flow accounting and syslog <xref target="RFC5424"/> for logging, continue to play
   specific roles in comprehensive network management.</t>
        <t>Interoperability must address both syntactic and semantic aspects. While syntactic variations
   across implementations can often be handled through adaptive processing, semantic differences pose a
   greater challenge, as the meaning of data is intrinsically tied to the managed entity.</t>
        <t>Information Models (IMs) enable and provide the foundation for semantic interoperability. An IM defines the
   conceptual understanding of managed information, independent of specific protocols or vendor
   implementations. This allows for consistent interpretation and correlation of data across different
   data models (and hence management protocols), such as a YANG Data Model and IPFIX Information Elements concerning the same
   event. For instance, an IM can standardize how error conditions are counted, ensuring that a counter
   has the same meaning whether collected via NETCONF or exported via IPFIX.</t>
        <t>Protocol Designers should consider developing an IM, when multiple Data Model (DM)
   representations (e.g., YANG and/or IPFIX) are required, to ensure lossless
   semantic mapping. IMs are also beneficial for complex or numerous DMs. As illustrated in Figure 1, an
   IM serves as a conceptual blueprint for designers and operators, from which concrete DMs are derived
   for implementers. <xref target="RFC3444"/> provides further guidance on distinguishing IMs from DMs.</t>
        <figure anchor="fig-im-dm">
          <name>Information Models (IMs) and Data Models (DMs)</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="144" width="464" viewBox="0 0 464 144" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,64 L 8,80" fill="none" stroke="black"/>
                <path d="M 96,48 L 96,80" fill="none" stroke="black"/>
                <path d="M 176,64 L 176,80" fill="none" stroke="black"/>
                <path d="M 232,32 L 248,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 176,64" fill="none" stroke="black"/>
                <path d="M 232,96 L 248,96" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="256,96 244,90.4 244,101.6" fill="black" transform="rotate(0,248,96)"/>
                <polygon class="arrowhead" points="256,32 244,26.4 244,37.6" fill="black" transform="rotate(0,248,32)"/>
                <g class="text">
                  <text x="100" y="36">IM</text>
                  <text x="336" y="36">conceptual/abstract</text>
                  <text x="440" y="36">model</text>
                  <text x="272" y="52">for</text>
                  <text x="328" y="52">designers</text>
                  <text x="376" y="52">&amp;</text>
                  <text x="424" y="52">operators</text>
                  <text x="12" y="100">DM</text>
                  <text x="100" y="100">DM</text>
                  <text x="180" y="100">DM</text>
                  <text x="328" y="100">concrete/detailed</text>
                  <text x="424" y="100">model</text>
                  <text x="296" y="116">for</text>
                  <text x="364" y="116">implementers</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
           IM               --> conceptual/abstract model
           |                    for designers & operators
+----------+---------+
|          |         |
DM         DM        DM     --> concrete/detailed model
                                   for implementers

]]></artwork>
          </artset>
        </figure>
        <t>Protocol Designers must identify the essential operational, configuration, state, and statistical
   information required for effective monitoring, control, and troubleshooting of New Protocols or Protocol Extensions and
   their extensions. This includes defining relevant parameters, performance metrics, error indicators,
   and contextual data crucial for diagnostics and lifecycle management.</t>
        <t>To ensure interoperability, management protocol and Data Model standards should incorporate clear
   compliance clauses, specifying the expected level of support.</t>
      </section>
      <section anchor="sec-mgmt-info">
        <name>Management Information</name>
        <t>Languages used to describe an Information Model can influence the
   nature of the model. Using a particular data modeling language, such
   as YANG, influences the model to use certain types of structures, for
   example, hierarchical trees, groupings, and reusable types.
   YANG, as described in <xref target="RFC6020"/> and <xref target="RFC7950"/>, provides advantages
   for expressing network information, including clear separation of
   configuration data and operational state, support for constraints and
   dependencies, and extensibility for evolving requirements. Its ability
   to represent relationships and dependencies in a structured and modular
   way makes it an effective choice for defining management information
   models.</t>
        <t>Although this document recommends using English text (the official
   language for IETF specifications) to describe an Information Model,
   including a complementary YANG module helps translate abstract concepts
   into implementation-specific Data Models. This ensures consistency between
   the high-level design and practical deployment.</t>
        <t>A management Information Model should include a discussion of what is
   manageable, which aspects of the protocol need to be configured, what
   types of operations are allowed, what protocol-specific events might
   occur, which events can be counted, and for which events an operator
   should be notified.</t>
        <t>Operators find it important to be able to make a clear distinction
   between configuration data, operational state, and statistics. They
   need to determine which parameters were administratively configured
   and which parameters have changed since configuration as the result
   of mechanisms such as routing protocols or network management
   protocols. It is important to be able to separately fetch current
   configuration information, initial configuration information,
   operational state information, and statistics from devices; to be
   able to compare current state to initial state; and to compare
   information between devices. So, when deciding what information
   should exist, do not conflate multiple information elements into a
   single element.</t>
        <t>What is typically difficult to work through are relationships between
   abstract objects. Ideally, an Information Model would describe the
   relationships between the objects and concepts in the information
   model.</t>
        <t>Is there always just one instance of this object or can there be
   multiple instances? Does this object relate to exactly one other
   object, or may it relate to multiple? When is it possible to change a
   relationship?</t>
        <t>Do objects (such as instances in lists) share fate? For example, if an
   instance in list A must exist before a related instance in list B can be
   created, what happens to the instance in list B if the related instance in
   list A is deleted? Does the existence of relationships between
   objects have an impact on fate sharing? YANG's relationships and
   constraints can help express and enforce these relationships.</t>
        <section anchor="sec-im-design">
          <name>Information Model Design</name>
          <t>This document recommends keeping the Information Model as simple as
   possible by applying the following criteria:</t>
          <ol spacing="normal" type="1"><li>
              <t>Start with a small set of essential objects and make additions only as
further objects are needed with the objective of keeping the absolute number of objects as small as possible while still delivering the required function such that there is
no duplication between objects and where one piece of information can be derived from the other pieces of information, it is not itself represented as an object.</t>
            </li>
            <li>
              <t>Require that all objects be essential for management.</t>
            </li>
            <li>
              <t>Consider evidence of current use of the managed protocol, and the perceived utility of objects added to the Information Model.</t>
            </li>
            <li>
              <t>Exclude objects that can be derived from others in this or
other information models.</t>
            </li>
            <li>
              <t>Avoid causing critical sections to be heavily instrumented. A
guideline is one counter per critical section per layer.</t>
            </li>
            <li>
              <t>When defining an Information Model using  YANG Data Structure Extensions <xref target="RFC8791"/> (thereby keeping it abstract and implementation-agnostic per <xref target="RFC3444"/>) ensure that the Information Model remains simple, modular, and clear by following the authoring guidelines in <xref target="I-D.ietf-netmod-rfc8407bis"/>.</t>
            </li>
            <li>
              <t>When illustrating the abstract Information Model, use YANG Tree Diagrams <xref target="RFC8340"/> to provide a simple, standardized, and implementation-neutral model structure.</t>
            </li>
          </ol>
        </section>
        <section anchor="sec-yang-dm">
          <name>YANG Data Model Considerations</name>
          <t>When considering YANG Data Models for a new specification, there
  are multiple types of Data Models that may be applicable. The
  hierarchy and relationship between these types is described in
  <xref section="3.5.1" sectionFormat="of" target="I-D.ietf-netmod-rfc8407bis"/>. A new specification
  may require or benefit from one or more of these YANG Data Model types.</t>
          <ul spacing="normal">
            <li>
              <t>Device Models - Also called Network Element Models,
represent the configuration, operational state, and notifications of
individual devices. These models are designed to distinguish
between these types of data and support querying and updating
device-specific parameters. Consideration should be given to
how device-level models might fit with broader network and
service Data Models.</t>
            </li>
            <li>
              <t>Network Models - Also called Network Service Models, define abstractions
for managing the behavior and relationships of multiple devices
and device subsystems within a network. As described in <xref target="RFC8199"/>,
these models are used to manage network-wide. These abstractions are
useful to network operators and applications that interface with network
controllers. Examples of network models include the L3VPN Network Model
(L3NM) <xref target="RFC9182"/> and the L2VPN Network Model (L2VPN) <xref target="RFC9291"/>.</t>
            </li>
            <li>
              <t>Service Models - Also called Customer Service Models,
defined in <xref target="RFC8309"/>, are designed to abstract the customer interface
into a service. They consider customer-centric parameters such as
Service Level Agreement (SLA) and high-level policy (e.g., network intent).
Given that different operators and different customers may have widely-varying
business processes, these models should focus on common aspects of a service
with strong multi-party consensus. Examples of service models include
the L3VPN Service Model (L3SM) <xref target="RFC8299"/> and the L2VPN Service Model (L2SM)
<xref target="RFC8466"/>.</t>
            </li>
          </ul>
          <t>A common challenge in YANG Data Model development lies in defining the
  relationships between abstract service or network constructs and the
  underlying device models. Therefore, when designing YANG modules, it
  is important to go beyond simply modeling configuration and
  operational data (i.e., leaf nodes), and also consider how the
  status and relationships of abstract or distributed constructs can
  be reflected based on parameters available in the network.</t>
          <t>For example, the status of a service may depend on the operational state
  of multiple network elements to which the service is attached. In such
  cases, the YANG Data Model (and its accompanying documentation) should
  clearly describe how service-level status is derived from underlying
  device-level information. Similarly, it is beneficial to define
  events (and relevant triggered notifications) that indicate changes in an underlying state,
  enabling reliable detection and correlation of service-affecting
  conditions. Including such mechanisms improves the robustness of
  integrations and helps ensure consistent behavior across
  implementations.</t>
          <t>Specific guidelines to consider when authoring any type of YANG
  modules are described in <xref target="I-D.ietf-netmod-rfc8407bis"/>.</t>
        </section>
      </section>
      <section anchor="sec-fm-mgmt">
        <name>Fault Management</name>
        <t>Protocol Designers should identify and document
   essential Faults, health indicators, alarms, and events that must be
   propagated to management applications or exposed through a Data
   Model. It is also recommended to describe how the Protocol Extension
   will affect the existing alarms and notification structure of the
   base Protocol, and to outline the potential impact of misconfigurations
   of the Protocol Extensions.</t>
        <t>Protocol Designers should consider how fault information will be
   propagated. Will it be done using asynchronous notifications or
   polling of health indicators?</t>
        <t>If notifications are used to alert operators to certain conditions,
   then Protocol Designers should discuss mechanisms to throttle
   notifications to prevent congestion and duplications of event
   notifications. Will there be a hierarchy of Faults, and will the
   Fault reporting be done by each Fault in the hierarchy, or will only
   the lowest Fault be reported and the higher levels be suppressed?
   Should there be aggregated status indicators based on concatenation
   of propagated Faults from a given domain or device?</t>
        <t>SNMP notifications and syslog messages can alert an operator when an
   aspect of the New Protocol or Protocol Extension fails or encounters an error or failure
   condition, and SNMP is frequently used as a heartbeat monitor.
   Should the event reporting provide guaranteed accurate delivery of
   the event information within a given (high) margin of confidence?
   Can we poll the latest events in the box?</t>
        <section anchor="sec-monitor">
          <name>Liveness Detection and Monitoring</name>
          <t>Protocol Designers should always build in basic testing features
   (e.g., ICMP echo, UDP/TCP echo service, NULL RPCs (remote procedure
   calls)) that can be used to test for liveness, with an option to
   enable and disable them.</t>
          <t>Mechanisms for monitoring the liveness of the protocol and for
   detecting Faults in protocol connectivity are usually built into
   protocols. In some cases, mechanisms already exist within other
   protocols responsible for maintaining lower-layer connectivity (e.g.,
   ICMP echo), but often new procedures are required to detect failures
   and to report rapidly, allowing remedial action to be taken.</t>
          <t>These liveness monitoring mechanisms do not typically require
   additional management capabilities. However, when a system detects a
   Fault, there is often a requirement to coordinate recovery action
   through management applications or at least to record the fact in an
   event log.</t>
        </section>
        <section anchor="sec-fault-determ">
          <name>Fault Determination</name>
          <t>It can be helpful to describe how Faults can be pinpointed using
   management information. For example, counters might record instances
   of error conditions. Some Faults might be able to be pinpointed by
   comparing the outputs of one device and the inputs of another device,
   looking for anomalies. Protocol Designers should consider what
   counters should count. If a single counter provided by vendor A
   counts three types of error conditions, while the corresponding
   counter provided by vendor B counts seven types of error conditions,
   these counters cannot be compared effectively -- they are not
   interoperable counters.</t>
          <t>How do you distinguish between faulty messages and good messages?</t>
          <t>Would some threshold-based mechanisms, such as Remote Monitoring
   (RMON) events/alarms or the EVENT-MIB, be usable to help determine
   error conditions? Are SNMP notifications for all events needed, or
   are there some "standard" notifications that could be used? Or can
   relevant counters be polled as needed?</t>
        </section>
        <section anchor="sec-cause-analysis">
          <name>Probable Root Cause Analysis</name>
          <t>Probable Root Cause analysis is about working out where the foundational
   Fault or Problem might be. Since one Fault may give rise to another Fault or
   Problem, a probable root cause is commonly meant to describe the original,
   source event or combination of circumstances that is the foundation of all
   related Faults.</t>
          <t>For example, if end-to-end data delivery is failing (e.g., reported by a
   notification), Probable Root Cause analysis can help find the failed link
   or node, or mis-configuration, within the end-to-end path.</t>
        </section>
        <section anchor="sec-fault-isol">
          <name>Fault Isolation</name>
          <t>It might be useful to isolate or quarantine Faults, such as isolating
   a device that emits malformed messages that are necessary to
   coordinate connections properly. This might be able to be done by
   configuring next-hop devices to drop the faulty messages to prevent
   them from entering the rest of the network.</t>
        </section>
      </section>
      <section anchor="sec-config-mgmt">
        <name>Configuration Management</name>
        <t>A Protocol Designer should document the basic configuration
   parameters that need to be instrumented for a New Protocol or Protocol Extensions, as well
   as default values and modes of operation.</t>
        <t>What information should be maintained across reboots of the device,
   or restarts of the management system?</t>
        <t>"Requirements for Configuration Management of IP-based Networks"
   <xref target="RFC3139"/> discusses requirements for configuration management,
   including discussion of different levels of management, high-level
   policies, network-wide configuration data, and device-local
   configuration. Network configuration extends beyond simple multi-device
   push or pull operations. It also involves ensuring that the configurations
   being pushed are semantically compatible across devices and that the resulting
   behavior of all involved devices corresponds to the intended behavior.
   Is the attachment between them configured
   compatibly on both ends? Is the IS-IS metric the same? ... Now
   answer those questions for 1,000 devices.</t>
        <t>Several efforts have existed in the IETF to develop policy-based
   configuration management. "Terminology for Policy-Based Management"
   <xref target="RFC3198"/> was written to standardize the terminology across these
   efforts.</t>
        <t>Implementations should not arbitrarily modify configuration data. In
   some cases (such as access control lists (ACLs)), the order of data
   items is significant and comprises part of the configured data. If a
   Protocol Designer defines mechanisms for configuration, it would be
   preferable to standardize the order of elements for consistency of
   configuration and of reporting across vendors and across releases
   from vendors.</t>
        <t>There are two parts to this:</t>
        <ol spacing="normal" type="1"><li>
            <t>A Network Management System (NMS) could optimize ACLs for
performance reasons.</t>
          </li>
          <li>
            <t>Unless the device or NMS is configured with adequate rules and guided by administrators with extensive experience, reordering ACLs can introduce significant security risks.</t>
          </li>
        </ol>
        <t>Network-wide configurations may be stored in central master databases
   and transformed into readable formats that can be pushed to devices, either by
   generating sequences of CLI commands or complete textual configuration files
   that are pushed to devices. There is no common database schema for
   network configuration, although the models used by various operators
   are probably very similar. It is operationally beneficial to
   extract, document, and standardize the common parts of these network-
   wide configuration database schemas. A Protocol Designer should
   consider how to standardize the common parts of configuring the New
   Protocol, while recognizing that vendors may also have proprietary
   aspects of their configurations.</t>
        <t>It is important to enable operators to concentrate on the
   configuration of the network or service as a whole, rather than individual
   devices. Support for configuration transactions across several
   devices could significantly simplify network configuration
   management. The ability to distribute configurations to multiple
   devices, or to modify candidate configurations on multiple devices,
   and then activate them in a near-simultaneous manner might help.
   Protocol Designers can consider how it would make sense for their
   protocol to be configured across multiple devices. Configuration
   templates might also be helpful.</t>
        <t>Consensus of the 2002 IAB Workshop <xref target="RFC3535"/> was that textual
   configuration files should be able to contain international
   characters. Human-readable strings should utilize UTF-8, and
   protocol elements should be in case-insensitive ASCII.</t>
        <t>A mechanism to dump-and-restore configurations is a primitive
   operation needed by operators. Standards for pulling and pushing
   configurations from/to devices are highly beneficial.</t>
        <t>Given configuration A and configuration B, it should be possible to
   generate the operations necessary to get from A to B with minimal
   state changes and effects on network and systems. It is important to
   minimize the impact caused by configuration changes.</t>
        <t>A Protocol Designer should consider the configurable items that exist
   for the control of function via the protocol elements described in
   the protocol specification. For example, sometimes the protocol
   requires that timers can be configured by the operator to ensure
   specific policy-based behavior by the implementation. These timers
   should have default values suggested in the protocol specification
   and may not need to be otherwise configurable.</t>
        <section anchor="sec-mgmt-verify">
          <name>Verifying Correct Operation</name>
          <t>An important function that should be provided is guidance on how to
   verify the correct operation of a protocol. A Protocol Designer
   could suggest techniques for testing the impact of the protocol on
   the network before it is deployed as well as techniques for testing
   the effect that the protocol has had on the network after being
   deployed.</t>
          <t>Protocol Designers should consider how to test the correct end-to-end
   operation of the service or network, how to verify the correct
   functioning of the protocol, and whether that is verified by testing
   the service function and/or by testing the forwarding function of
   each network element. This may be achieved through status and
   statistical information gathered from devices.</t>
        </section>
      </section>
      <section anchor="sec-acc-mgmt">
        <name>Accounting Management</name>
        <t>A Protocol Designer should consider whether it would be appropriate
   to collect usage information related to this protocol and, if so,
   what usage information would be appropriate to collect.</t>
        <t>"Introduction to Accounting Management" <xref target="RFC2975"/> discusses a number
   of factors relevant to monitoring usage of protocols for purposes of
   capacity and trend analysis, cost allocation, auditing, and billing.
   The document also discusses how some existing protocols can be used
   for these purposes. These factors should be considered when
   designing a protocol whose usage might need to be monitored or when
   recommending a protocol to do usage accounting.</t>
      </section>
      <section anchor="sec-perf-mgmt">
        <name>Performance Management</name>
        <t>From a manageability point of view, it is important to determine how
   well a network deploying the protocol or technology defined in the
   document is doing. In order to do this, the network operators need
   to consider information that would be useful to determine the
   performance characteristics of a deployed system using the target
   protocol.</t>
        <t>The IETF, via the Benchmarking Methodology WG (BMWG), has defined
   recommendations for the measurement of the performance
   characteristics of various internetworking technologies in a
   laboratory environment, including the systems or services that are
   built from these technologies. Each benchmarking recommendation
   describes the class of equipment, system, or service being addressed;
   discusses the performance characteristics that are pertinent to that
   class; clearly identifies a set of metrics that aid in the
   description of those characteristics; specifies the methodologies
   required to collect said metrics; and lastly, presents the
   requirements for the common, unambiguous reporting of benchmarking
   results. Search for "benchmark" in the RFC search tool.</t>
        <t>Performance metrics may be useful in multiple environments and for
   different protocols. The IETF, via the IP Performance Monitoring
   (IPPM) WG, has developed a set of standard metrics that can be
   applied to the quality, performance, and reliability of Internet data
   delivery services. These metrics are designed such that they can be
   performed by network operators, end users, or independent testing
   groups. The existing metrics might be applicable to the new
   protocol. Search for "metric" in the RFC search tool. In some
   cases, new metrics need to be defined. It would be useful if the
   protocol documentation identified the need for such new metrics. For
   performance monitoring, it is often more important to report the time
   spent in a state rather than just the current state. Snapshots alone
   are typically of less value.</t>
        <t>There are several parts to performance management to be considered:
   protocol monitoring, device monitoring (the impact of the new
   protocol / service activation on the device), network monitoring,
   and service monitoring (the impact of service activation on the
   network). Hence, it is recommended that, if the implementation of the
   New Protocol or Protocol Extension has any hardware/software performance implications
   (e.g., increased CPU utilization, memory consumption, or forwarding
   performance degradation), the Protocol Designers should clearly
   describe these impacts in the specification, along with any
   conditions under which they may occur and possible mitigation
   strategies.</t>
        <section anchor="sec-monitor-proto">
          <name>Monitoring the Protocol</name>
          <t>Certain properties of protocols are useful to monitor. The number of
   protocol packets received, the number of packets sent, and the number
   of packets dropped are usually very helpful to operators.</t>
          <t>Packet drops should be reflected in counter variable(s) somewhere
   that can be inspected -- both from the security point of view and
   from the troubleshooting point of view.</t>
          <t>Counter definitions should be unambiguous about what is included in
   the count and what is not included in the count.</t>
          <t>Consider the expected behaviors for counters -- what is a reasonable
   maximum value for expected usage? Should they stop counting at the
   maximum value and retain it, or should they rollover?
   Guidance should explain how rollovers are detected, including multiple
   occurrences.</t>
          <t>Consider whether multiple management applications will share a
   counter; if so, then no one management application should be allowed
   to reset the value to zero since this will impact other applications.</t>
          <t>Could events, such as hot-swapping a blade in a chassis, cause
   discontinuities in counter? Does this make any difference in
   evaluating the performance of a protocol?</t>
          <t>The protocol specification should clearly define any inherent
   limitations and describe expected behavior when those limits
   are exceeded. These considerations should be made independently
   of any specific management protocol or data modeling language.
   In other words, focus on what makes sense for the protocol being
   managed, not the protocol used for management. If a constraint
   is not specific to a management protocol, then it should be left
   to Data Model designers of that protocol to determine how to handle it.
   For example, VLAN identifiers are defined by standard to range
   from 1 to 4094. Therefore, a YANG "vlan-id" definition representing the
   12-bit VLAN ID used in the VLAN Tag header uses a range of "1..4094".</t>
        </section>
        <section anchor="sec-monitor-dev">
          <name>Monitoring the Device</name>
          <t>Consider whether device performance will be affected by the number of
   protocol entities being instantiated on the device. Designers of an
   Information Model should include information, accessible at runtime,
   about the maximum number of instances an implementation can support,
   the current number of instances, and the expected behavior when the
   current instances exceed the capacity of the implementation or the
   capacity of the device.</t>
          <t>Designers of an Information Model should provide runtime information
   about the maximum supported instances, the current number of instances,
   and expected behavior when capacity is exceeded.</t>
        </section>
        <section anchor="sec-monitor-net">
          <name>Monitoring the Network</name>
          <t>Consider whether network performance will be affected by the number
   of protocol entities being deployed.</t>
          <t>Consider the capability of determining the operational activity, such
   as the number of messages in and the messages out, the number of
   received messages rejected due to format Problems, and the expected
   behaviors when a malformed message is received.</t>
          <t>What are the principal performance factors that need to be considered
   when measuring the operational performance of a network built using
   the protocol? Is it important to measure setup times, end-to-end
   connectivity, hop-by-hop connectivity, or network throughput?</t>
        </section>
        <section anchor="sec-monitor-svc">
          <name>Monitoring the Service</name>
          <t>What are the principal performance factors that need to be considered
   when measuring the performance of a service using the protocol? Is
   it important to measure application-specific throughput, client-server
   associations, end-to-end application quality, service interruptions,
   or user experience (UX)?</t>
        </section>
      </section>
      <section anchor="sec-security-mgmt">
        <name>Security Management</name>
        <t>Protocol Designers should consider how to monitor and manage security
   aspects and vulnerabilities of the New Protocol or Protocol Extension.</t>
        <t>There will be security considerations related to the New Protocol or Protocol Extension.
   To make it possible for operators to be aware of security-related
   events, it is recommended that system logs should record events, such
   as failed logins, but the logs must be secured.</t>
        <t>Should a system automatically notify operators of every event
   occurrence, or should an operator-defined threshold control when a
   notification is sent to an operator?</t>
        <t>Should certain statistics be collected about the operation of the New
   Protocol that might be useful for detecting attacks, such as the
   receipt of malformed messages, messages out of order, or messages
   with invalid timestamps? If such statistics are collected, is it
   important to count them separately for each sender to help identify
   the source of attacks?</t>
        <t>Security-oriented manageability topics may include risks of insufficient
   monitoring, regulatory issues with missing audit trails, log capacity
   limits, and security exposures in recommended management mechanisms.</t>
        <t>Consider security threats that may be introduced by management
   operations. For example, Control and Provisioning of Wireless Access
   Points (CAPWAP) breaks the structure of monolithic Access Points
   (APs) into Access Controllers and Wireless Termination Points (WTPs).
   By using a control protocol or management protocol, internal
   information that was previously not accessible is now exposed over
   the network and to management applications and may become a source of
   potential security threats.</t>
        <t>The granularity of access control needed on management interfaces
   needs to match operational needs. Typical requirements are a role-
   based access control model and the principle of least privilege,
   where a user can be given only the minimum access necessary to
   perform a required task.</t>
        <t>Some operators wish to do consistency checks of access control lists
   across devices. Protocol Designers should consider Information
   Models to promote comparisons across devices and across vendors to
   permit checking the consistency of security configurations.</t>
        <t>Protocol Designers should consider how to provide a secure transport,
   authentication, identity, and access control that integrates well
   with existing key and credential management infrastructure. It is a
   good idea to start with defining the threat model for the protocol,
   and from that deducing what is required.</t>
        <t>Protocol Designers should consider how access control lists are
   maintained and updated.</t>
        <t>Standard SNMP notifications or syslog messages might
   already exist, or can be defined, to alert operators to the
   conditions identified in the security considerations for the New
   Protocol. For example, you can log all the commands entered by the
   operator using syslog (giving you some degree of audit trail), or you
   can see who has logged on/off using the Secure Shell (SSH) Protocol <xref target="RFC4251"/>
   and from where; failed SSH logins can be logged using syslog, etc.</t>
        <t>An analysis of existing counters might help operators recognize the
   conditions identified in the security considerations for the new
   protocol before they can impact the network.</t>
        <t>Different management protocols use different assumptions about
   message security and data-access controls. A Protocol Designer that
   recommends using different protocols should consider how security
   will be applied in a balanced manner across multiple management
   interfaces. SNMP authority levels and policy are data-oriented,
   while CLI authority levels and policy are usually command-oriented
   (i.e., task-oriented). Depending on the management function,
   sometimes data-oriented or task-oriented approaches make more sense.
   Protocol Designers should consider both data-oriented and task-
   oriented authority levels and policy.</t>
      </section>
    </section>
    <section anchor="sec-oper-mgmt-tooling">
      <name>Operational and Management Tooling Considerations</name>
      <t>The operational community's ability to effectively adopt and
   use new specifications is significantly influenced by the availability
   and adaptability of appropriate tooling. In this context, "tools" refers
   to software systems or utilities used by network operators to deploy,
   configure, monitor, troubleshoot, and manage networks or network protocols
   in real-world operational environments. While the introduction of a new
   specification does not automatically mandate the development of entirely
   new tools, careful consideration must be given to how existing tools can be
   leveraged or extended to support the management and operation of these new
   specifications.</t>
      <t>The <xref target="NEMOPS"/> workshop highlighted a
   consistent theme applicable beyond network management protocols: the
   "ease of use" and adaptability of existing tools are critical factors
   for successful adoption. Therefore, a new specification should provide
   examples using existing, common tooling, or running code that demonstrate
   how to perform key operational tasks.</t>
      <t>Specifically, the following tooling-related aspects should be considered,
   prioritizing the adaptation of existing tools:</t>
      <ul spacing="normal">
        <li>
          <t>Leveraging Existing Tooling: Before considering new tools, assess whether
existing tooling, such as monitoring systems, logging platforms,
configuration management systems, and/or orchestration frameworks, can be
adapted to support the new specification. This may involve developing
plugins, modules, or drivers that enable these tools to interact with
the new specification.</t>
        </li>
        <li>
          <t>Extending Existing Tools: Identify areas where existing tools can be
extended to provide the necessary visibility and control over the new
specification. For example, if a new transport protocol is introduced,
consider whether existing network monitoring tools can be extended to
track its performance metrics or whether existing security tools can be
adapted to analyze its traffic patterns.</t>
        </li>
        <li>
          <t>New Tools: Only when existing tools are demonstrably
inadequate for managing and operating the elements of the new specification
should the development of new tools be considered. In such cases,
carefully define the specific requirements for these new tools, focusing
on the functionalities that cannot be achieved through adaptation or
extension of existing solutions.</t>
        </li>
        <li>
          <t>IETF Hackathons for Manageability Testing:
IETF Hackathons <xref target="IETF-HACKATHONS"/>
provide an opportunity to test the functionality, interoperability,
and manageability of New Protocols or Protocol Extensions. These events can be specifically
leveraged to assess the operational (including manageability) implications
of a New Protocol or Protocol Extension by focusing tasks on:  </t>
          <ul spacing="normal">
            <li>
              <t>Adapting existing tools to interact with the new specification.</t>
            </li>
            <li>
              <t>Developing example management scripts or modules for existing management
platforms.</t>
            </li>
            <li>
              <t>Testing the specification's behavior under various operational conditions.</t>
            </li>
            <li>
              <t>Identifying potential tooling gaps and areas for improvement.</t>
            </li>
            <li>
              <t>Creating example flows and use cases for manageability.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Open-Source for Tooling: If new tools are deemed necessary, or if significant
adaptations to existing tools are required, prioritize open-source development
with community involvement. Open-source tools lower the barrier to entry,
encourage collaboration, and provide operators with the flexibility to customize
and extend the tools to meet their specific needs.</t>
        </li>
      </ul>
      <section anchor="sec-ai-tooling">
        <name>AI Tooling Considerations</name>
        <t>With the increasing adoption of Artificial Intelligence (AI)
   in network operations, Protocol Designers
   must consider the implication such functions may have on New Protocols
   and Protocol Extensions. AI
   models often require extensive and granular data for training and
   inference, requiring efficient, scalable, and secure mechanisms
   for telemetry, logging, and state information collection. Protocol Designers
   should anticipate that AI-powered management tools may generate
   frequent and potentially aggressive querying patterns on network
   devices and controllers. Therefore, protocols should be designed with Data
   Models and mechanisms intended to prevent overload from automated
   interactions, while also accounting for AI-specific security
   considerations such as data integrity and protection against
   adversarial attacks on management interfaces. These considerations
   are also relevant to Performance Management (Section <xref format="counter" target="sec-perf-mgmt"/>)
   and Security Management (Section <xref format="counter" target="sec-security-mgmt"/>).</t>
      </section>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not have any IANA actions required.</t>
    </section>
    <section anchor="sec-oper-mgmt-consid">
      <name>Operational Considerations</name>
      <t>Although this document focuses on operations and manageability guidance, it does not define a New Protocol, a Protocol Extension, or an architecture. As such, there are no new operations or manageability requirements introduced by this document.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>This document provides guidelines for
   considering manageability and operations. It introduces no new
   security concerns.</t>
      <t>The provision of a management portal to a network device provides a
   doorway through which an attack on the device may be launched.
   Making the protocol under development be manageable through a
   management protocol creates a vulnerability to a new source of
   attacks. Only management protocols with adequate security apparatus,
   such as authentication, message integrity checking, and
   authorization, should be used.</t>
      <t>While a standard description of a protocol's manageable parameters facilitates
   legitimate operation, it may also inadvertently simplify an attacker's efforts
   to understand and manipulate the protocol.</t>
      <t>A well-designed protocol is usually more stable and secure. A
   protocol that can be managed and inspected offers the operator a
   better chance of spotting and quarantining any attacks. Conversely,
   making a protocol easy to inspect is a risk if the wrong person
   inspects it.</t>
      <t>If security events cause logs and/or notifications/alerts, a
   concerted attack might be able to be mounted by causing an excess of
   these events. In other words, the security-management mechanisms
   could constitute a security vulnerability. The management of
   security aspects is important (see <xref target="sec-security-mgmt"/>).</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="CHECKLIST" target="https://github.com/IETF-OPS-DIR/Review-Template/tree/main">
        <front>
          <title>Operations and Management Review Checklist</title>
          <author>
            <organization/>
          </author>
          <date year="2025"/>
        </front>
      </reference>
      <reference anchor="IETF-OPS-Dir" target="https://datatracker.ietf.org/group/opsdir/about/">
        <front>
          <title>Ops Directorate (opsdir)</title>
          <author>
            <organization/>
          </author>
          <date year="2025"/>
        </front>
      </reference>
      <reference anchor="IETF-HACKATHONS" target="https://www.ietf.org/meeting/hackathons/">
        <front>
          <title>IETF Hackathons</title>
          <author>
            <organization>IETF</organization>
          </author>
          <date year="2025" month="May" day="01"/>
        </front>
      </reference>
      <reference anchor="IESG-STATEMENT" target="https://datatracker.ietf.org/doc/statement-iesg-writable-mib-module-iesg-statement-20140302/">
        <front>
          <title>Writable MIB Module IESG Statement</title>
          <author>
            <organization>IESG</organization>
          </author>
          <date year="2014" month="March" day="02"/>
        </front>
      </reference>
      <reference anchor="NEMOPS-WORKSHOP" target="https://datatracker.ietf.org/group/nemopsws/about/">
        <front>
          <title>IAB workshop on the Next Era of Network Management Operations</title>
          <author>
            <organization>IAB</organization>
          </author>
          <date year="2024" month="December"/>
        </front>
      </reference>
      <reference anchor="SECOPS" target="https://niccs.cisa.gov/resources/glossary">
        <front>
          <title>NICCS Glossary</title>
          <author>
            <organization/>
          </author>
          <date year="2025" month="August"/>
        </front>
      </reference>
      <reference anchor="RFC5706">
        <front>
          <title>Guidelines for Considering Operations and Management of New Protocols and Protocol Extensions</title>
          <author fullname="D. Harrington" initials="D." surname="Harrington"/>
          <date month="November" year="2009"/>
          <abstract>
            <t>New protocols or protocol extensions are best designed with due consideration of the functionality needed to operate and manage the protocols. Retrofitting operations and management is sub-optimal. The purpose of this document is to provide guidance to authors and reviewers of documents that define new protocols or protocol extensions regarding aspects of operations and management that should be considered. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5706"/>
        <seriesInfo name="DOI" value="10.17487/RFC5706"/>
      </reference>
      <referencegroup anchor="BCP72" target="https://www.rfc-editor.org/info/bcp72">
        <reference anchor="RFC3552" target="https://www.rfc-editor.org/info/rfc3552">
          <front>
            <title>Guidelines for Writing RFC Text on Security Considerations</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="B. Korver" initials="B." surname="Korver"/>
            <date month="July" year="2003"/>
            <abstract>
              <t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak. This document provides guidelines to RFC authors on how to write a good Security Considerations section. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="72"/>
          <seriesInfo name="RFC" value="3552"/>
          <seriesInfo name="DOI" value="10.17487/RFC3552"/>
        </reference>
        <reference anchor="RFC9416" target="https://www.rfc-editor.org/info/rfc9416">
          <front>
            <title>Security Considerations for Transient Numeric Identifiers Employed in Network Protocols</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="I. Arce" initials="I." surname="Arce"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>Poor selection of transient numerical identifiers in protocols such as the TCP/IP suite has historically led to a number of attacks on implementations, ranging from Denial of Service (DoS) or data injection to information leakages that can be exploited by pervasive monitoring. Due diligence in the specification of transient numeric identifiers is required even when cryptographic techniques are employed, since these techniques might not mitigate all the associated issues. This document formally updates RFC 3552, incorporating requirements for transient numeric identifiers, to prevent flaws in future protocols and implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="72"/>
          <seriesInfo name="RFC" value="9416"/>
          <seriesInfo name="DOI" value="10.17487/RFC9416"/>
        </reference>
      </referencegroup>
      <referencegroup anchor="BCP14" target="https://www.rfc-editor.org/info/bcp14">
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </referencegroup>
      <reference anchor="I-D.ietf-nmop-terminology">
        <front>
          <title>Some Key Terms for Network Fault and Problem Management</title>
          <author fullname="Nigel Davis" initials="N." surname="Davis">
            <organization>Ciena</organization>
          </author>
          <author fullname="Adrian Farrel" initials="A." surname="Farrel">
            <organization>Old Dog Consulting</organization>
          </author>
          <author fullname="Thomas Graf" initials="T." surname="Graf">
            <organization>Swisscom</organization>
          </author>
          <author fullname="Qin Wu" initials="Q." surname="Wu">
            <organization>Huawei</organization>
          </author>
          <author fullname="Chaode Yu" initials="C." surname="Yu">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="18" month="August" year="2025"/>
          <abstract>
            <t>   This document sets out some terms that are fundamental to a common
   understanding of network fault and problem management within the
   IETF.

   The purpose of this document is to bring clarity to discussions and
   other work related to network fault and problem management, in
   particular to YANG data models and management protocols that report,
   make visible, or manage network faults and problems.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-terminology-23"/>
      </reference>
      <reference anchor="RFC3444">
        <front>
          <title>On the Difference between Information Models and Data Models</title>
          <author fullname="A. Pras" initials="A." surname="Pras"/>
          <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
          <date month="January" year="2003"/>
          <abstract>
            <t>There has been ongoing confusion about the differences between Information Models and Data Models for defining managed objects in network management. This document explains the differences between these terms by analyzing how existing network management model specifications (from the IETF and other bodies such as the International Telecommunication Union (ITU) or the Distributed Management Task Force (DMTF)) fit into the universe of Information Models and Data Models. This memo documents the main results of the 8th workshop of the Network Management Research Group (NMRG) of the Internet Research Task Force (IRTF) hosted by the University of Texas at Austin. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3444"/>
        <seriesInfo name="DOI" value="10.17487/RFC3444"/>
      </reference>
      <reference anchor="RFC6291">
        <front>
          <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
          <author fullname="L. Andersson" initials="L." surname="Andersson"/>
          <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
          <author fullname="R. Bonica" initials="R." surname="Bonica"/>
          <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
          <author fullname="S. Mansfield" initials="S." surname="Mansfield"/>
          <date month="June" year="2011"/>
          <abstract>
            <t>At first glance, the acronym "OAM" seems to be well-known and well-understood. Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
            <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM. There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term. This memo documents an Internet Best Current Practice.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="161"/>
        <seriesInfo name="RFC" value="6291"/>
        <seriesInfo name="DOI" value="10.17487/RFC6291"/>
      </reference>
      <reference anchor="I-D.ietf-opsawg-oam-characterization">
        <front>
          <title>Guidelines for Characterizing "OAM"</title>
          <author fullname="Carlos Pignataro" initials="C." surname="Pignataro">
            <organization>Blue Fern
      Consulting</organization>
          </author>
          <author fullname="Adrian Farrel" initials="A." surname="Farrel">
            <organization>Old Dog Consulting</organization>
          </author>
          <author fullname="Tal Mizrahi" initials="T." surname="Mizrahi">
            <organization>Huawei</organization>
          </author>
          <date day="20" month="October" year="2025"/>
          <abstract>
            <t>   As the IETF continues to produce and standardize different
   Operations, Administration, and Maintenance (OAM) protocols and
   technologies, various qualifiers and modifiers are prepended to the
   OAM abbreviation.  While, at first glance, the most used appear to be
   well understood, the same qualifier may be interpreted differently in
   different contexts.  A case in point is the qualifiers "in-band" and
   "out-of-band" which have their origins in the radio lexicon, and
   which have been extrapolated into other communication networks.  This
   document recommends not to use these two terms when referring to OAM.

   This document considers some common qualifiers and modifiers that are
   prepended, within the context of packet networks, to the OAM
   abbreviation and lays out guidelines for their use in future IETF
   work.

   This document updates [RFC6291] by adding to the guidelines for the
   use of the term "OAM".  It does not modify any other part of
   [RFC6291].

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-oam-characterization-13"/>
      </reference>
      <reference anchor="I-D.ietf-nmop-network-incident-yang">
        <front>
          <title>A YANG Data Model for Network Incident Management</title>
          <author fullname="Tong Hu" initials="T." surname="Hu">
            <organization>CMCC</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Qin Wu" initials="Q." surname="Wu">
            <organization>Huawei</organization>
          </author>
          <author fullname="Nigel Davis" initials="N." surname="Davis">
            <organization>Ciena</organization>
          </author>
          <author fullname="Chong Feng" initials="C." surname="Feng">
         </author>
          <date day="12" month="October" year="2025"/>
          <abstract>
            <t>   A network incident refers to an unexpected interruption of a network
   service, degradation of a network service quality, or sub-health of a
   network service.  Different data sources including alarms, metrics,
   and other anomaly information can be aggregated into a few of network
   incidents through data correlation analysis and the service impact
   analysis.

   This document defines a YANG Module for the network incident
   lifecycle management.  This YANG module is meant to provide a
   standard way to report, diagnose, and help resolve network incidents
   for the sake of network service health and probable cause analysis.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-network-incident-yang-06"/>
      </reference>
      <reference anchor="RFC5218">
        <front>
          <title>What Makes for a Successful Protocol?</title>
          <author fullname="D. Thaler" initials="D." surname="Thaler"/>
          <author fullname="B. Aboba" initials="B." surname="Aboba"/>
          <date month="July" year="2008"/>
          <abstract>
            <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success. It is hoped that these observations can serve as guidance for future protocol work. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5218"/>
        <seriesInfo name="DOI" value="10.17487/RFC5218"/>
      </reference>
      <reference anchor="RFC2439">
        <front>
          <title>BGP Route Flap Damping</title>
          <author fullname="C. Villamizar" initials="C." surname="Villamizar"/>
          <author fullname="R. Chandra" initials="R." surname="Chandra"/>
          <author fullname="R. Govindan" initials="R." surname="Govindan"/>
          <date month="November" year="1998"/>
          <abstract>
            <t>A usage of the BGP routing protocol is described which is capable of reducing the routing traffic passed on to routing peers and therefore the load on these peers without adversely affecting route convergence time for relatively stable routes. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2439"/>
        <seriesInfo name="DOI" value="10.17487/RFC2439"/>
      </reference>
      <reference anchor="RFC1958">
        <front>
          <title>Architectural Principles of the Internet</title>
          <author fullname="B. Carpenter" initials="B." role="editor" surname="Carpenter"/>
          <date month="June" year="1996"/>
          <abstract>
            <t>The Internet and its architecture have grown in evolutionary fashion from modest beginnings, rather than from a Grand Plan. While this process of evolution is one of the main reasons for the technology's success, it nevertheless seems useful to record a snapshot of the current principles of the Internet architecture. This is intended for general guidance and general interest, and is in no way intended to be a formal or invariant reference model. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="1958"/>
        <seriesInfo name="DOI" value="10.17487/RFC1958"/>
      </reference>
      <reference anchor="RFC6298">
        <front>
          <title>Computing TCP's Retransmission Timer</title>
          <author fullname="V. Paxson" initials="V." surname="Paxson"/>
          <author fullname="M. Allman" initials="M." surname="Allman"/>
          <author fullname="J. Chu" initials="J." surname="Chu"/>
          <author fullname="M. Sargent" initials="M." surname="Sargent"/>
          <date month="June" year="2011"/>
          <abstract>
            <t>This document defines the standard algorithm that Transmission Control Protocol (TCP) senders are required to use to compute and manage their retransmission timer. It expands on the discussion in Section 4.2.3.1 of RFC 1122 and upgrades the requirement of supporting the algorithm from a SHOULD to a MUST. This document obsoletes RFC 2988. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6298"/>
        <seriesInfo name="DOI" value="10.17487/RFC6298"/>
      </reference>
      <reference anchor="I-D.ietf-lamps-dilithium-certificates">
        <front>
          <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
          <author fullname="Jake Massimo" initials="J." surname="Massimo">
            <organization>AWS</organization>
          </author>
          <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
            <organization>AWS</organization>
          </author>
          <author fullname="Sean Turner" initials="S." surname="Turner">
            <organization>sn3rd</organization>
          </author>
          <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
            <organization>Cloudflare</organization>
          </author>
          <date day="30" month="September" year="2025"/>
          <abstract>
            <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-13"/>
      </reference>
      <reference anchor="RFC8170">
        <front>
          <title>Planning for Protocol Adoption and Subsequent Transitions</title>
          <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>Over the many years since the introduction of the Internet Protocol, we have seen a number of transitions throughout the protocol stack, such as deploying a new protocol, or updating or replacing an existing protocol. Many protocols and technologies were not designed to enable smooth transition to alternatives or to easily deploy extensions; thus, some transitions, such as the introduction of IPv6, have been difficult. This document attempts to summarize some basic principles to enable future transitions, and it also summarizes what makes for a good transition plan.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8170"/>
        <seriesInfo name="DOI" value="10.17487/RFC8170"/>
      </reference>
      <reference anchor="RFC2205">
        <front>
          <title>Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification</title>
          <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
          <author fullname="L. Zhang" initials="L." surname="Zhang"/>
          <author fullname="S. Berson" initials="S." surname="Berson"/>
          <author fullname="S. Herzog" initials="S." surname="Herzog"/>
          <author fullname="S. Jamin" initials="S." surname="Jamin"/>
          <date month="September" year="1997"/>
          <abstract>
            <t>This memo describes version 1 of RSVP, a resource reservation setup protocol designed for an integrated services Internet. RSVP provides receiver-initiated setup of resource reservations for multicast or unicast data flows, with good scaling and robustness properties. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2205"/>
        <seriesInfo name="DOI" value="10.17487/RFC2205"/>
      </reference>
      <reference anchor="RFC2113">
        <front>
          <title>IP Router Alert Option</title>
          <author fullname="D. Katz" initials="D." surname="Katz"/>
          <date month="February" year="1997"/>
          <abstract>
            <t>This memo describes a new IP Option type that alerts transit routers to more closely examine the contents of an IP packet. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2113"/>
        <seriesInfo name="DOI" value="10.17487/RFC2113"/>
      </reference>
      <reference anchor="RFC2711">
        <front>
          <title>IPv6 Router Alert Option</title>
          <author fullname="C. Partridge" initials="C." surname="Partridge"/>
          <author fullname="A. Jackson" initials="A." surname="Jackson"/>
          <date month="October" year="1999"/>
          <abstract>
            <t>This memo describes a new IPv6 Hop-by-Hop Option type that alerts transit routers to more closely examine the contents of an IP datagram. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2711"/>
        <seriesInfo name="DOI" value="10.17487/RFC2711"/>
      </reference>
      <reference anchor="RFC6709">
        <front>
          <title>Design Considerations for Protocol Extensions</title>
          <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
          <author fullname="B. Aboba" initials="B." role="editor" surname="Aboba"/>
          <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
          <date month="September" year="2012"/>
          <abstract>
            <t>This document discusses architectural issues related to the extensibility of Internet protocols, with a focus on design considerations. It is intended to assist designers of both base protocols and extensions. Case studies are included. A companion document, RFC 4775 (BCP 125), discusses procedures relating to the extensibility of IETF protocols. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6709"/>
        <seriesInfo name="DOI" value="10.17487/RFC6709"/>
      </reference>
      <reference anchor="RFC8799">
        <front>
          <title>Limited Domains and Internet Protocols</title>
          <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
          <author fullname="B. Liu" initials="B." surname="Liu"/>
          <date month="July" year="2020"/>
          <abstract>
            <t>There is a noticeable trend towards network behaviors and semantics that are specific to a particular set of requirements applied within a limited region of the Internet. Policies, default parameters, the options supported, the style of network management, and security requirements may vary between such limited regions. This document reviews examples of such limited domains (also known as controlled environments), notes emerging solutions, and includes a related taxonomy. It then briefly discusses the standardization of protocols for limited domains. Finally, it shows the need for a precise definition of "limited domain membership" and for mechanisms to allow nodes to join a domain securely and to find other members, including boundary nodes.</t>
            <t>This document is the product of the research of the authors. It has been produced through discussions and consultation within the IETF but is not the product of IETF consensus.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8799"/>
        <seriesInfo name="DOI" value="10.17487/RFC8799"/>
      </reference>
      <referencegroup anchor="BCP133" target="https://www.rfc-editor.org/info/bcp133">
        <reference anchor="RFC9743" target="https://www.rfc-editor.org/info/rfc9743">
          <front>
            <title>Specifying New Congestion Control Algorithms</title>
            <author fullname="M. Duke" initials="M." role="editor" surname="Duke"/>
            <author fullname="G. Fairhurst" initials="G." role="editor" surname="Fairhurst"/>
            <date month="March" year="2025"/>
            <abstract>
              <t>RFC 5033 discusses the principles and guidelines for standardizing new congestion control algorithms. This document obsoletes RFC 5033 to reflect changes in the congestion control landscape by providing a framework for the development and assessment of congestion control mechanisms, promoting stability across diverse network paths. This document seeks to ensure that proposed congestion control algorithms operate efficiently and without harm when used in the global Internet. It emphasizes the need for comprehensive testing and validation to prevent adverse interactions with existing flows.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="133"/>
          <seriesInfo name="RFC" value="9743"/>
          <seriesInfo name="DOI" value="10.17487/RFC9743"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC1034">
        <front>
          <title>Domain names - concepts and facilities</title>
          <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
          <date month="November" year="1987"/>
          <abstract>
            <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="13"/>
        <seriesInfo name="RFC" value="1034"/>
        <seriesInfo name="DOI" value="10.17487/RFC1034"/>
      </reference>
      <reference anchor="RFC5321">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin"/>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
      <reference anchor="RFC5884">
        <front>
          <title>Bidirectional Forwarding Detection (BFD) for MPLS Label Switched Paths (LSPs)</title>
          <author fullname="R. Aggarwal" initials="R." surname="Aggarwal"/>
          <author fullname="K. Kompella" initials="K." surname="Kompella"/>
          <author fullname="T. Nadeau" initials="T." surname="Nadeau"/>
          <author fullname="G. Swallow" initials="G." surname="Swallow"/>
          <date month="June" year="2010"/>
          <abstract>
            <t>One desirable application of Bidirectional Forwarding Detection (BFD) is to detect a Multiprotocol Label Switching (MPLS) Label Switched Path (LSP) data plane failure. LSP Ping is an existing mechanism for detecting MPLS data plane failures and for verifying the MPLS LSP data plane against the control plane. BFD can be used for the former, but not for the latter. However, the control plane processing required for BFD Control packets is relatively smaller than the processing required for LSP Ping messages. A combination of LSP Ping and BFD can be used to provide faster data plane failure detection and/or make it possible to provide such detection on a greater number of LSPs. This document describes the applicability of BFD in relation to LSP Ping for this application. It also describes procedures for using BFD in this environment. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5884"/>
        <seriesInfo name="DOI" value="10.17487/RFC5884"/>
      </reference>
      <reference anchor="RFC6390">
        <front>
          <title>Guidelines for Considering New Performance Metric Development</title>
          <author fullname="A. Clark" initials="A." surname="Clark"/>
          <author fullname="B. Claise" initials="B." surname="Claise"/>
          <date month="October" year="2011"/>
          <abstract>
            <t>This document describes a framework and a process for developing Performance Metrics of protocols and applications transported over IETF-specified protocols. These metrics can be used to characterize traffic on live networks and services. This memo documents an Internet Best Current Practice.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="170"/>
        <seriesInfo name="RFC" value="6390"/>
        <seriesInfo name="DOI" value="10.17487/RFC6390"/>
      </reference>
      <reference anchor="RFC9424">
        <front>
          <title>Indicators of Compromise (IoCs) and Their Role in Attack Defence</title>
          <author fullname="K. Paine" initials="K." surname="Paine"/>
          <author fullname="O. Whitehouse" initials="O." surname="Whitehouse"/>
          <author fullname="J. Sellwood" initials="J." surname="Sellwood"/>
          <author fullname="A. Shaw" initials="A." surname="Shaw"/>
          <date month="August" year="2023"/>
          <abstract>
            <t>Cyber defenders frequently rely on Indicators of Compromise (IoCs) to identify, trace, and block malicious activity in networks or on endpoints. This document reviews the fundamentals, opportunities, operational limitations, and recommendations for IoC use. It highlights the need for IoCs to be detectable in implementations of Internet protocols, tools, and technologies -- both for the IoCs' initial discovery and their use in detection -- and provides a foundation for approaches to operational challenges in network security.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9424"/>
        <seriesInfo name="DOI" value="10.17487/RFC9424"/>
      </reference>
      <reference anchor="I-D.ietf-quic-qlog-main-schema">
        <front>
          <title>qlog: Structured Logging for Network Protocols</title>
          <author fullname="Robin Marx" initials="R." surname="Marx">
            <organization>Akamai</organization>
          </author>
          <author fullname="Luca Niccolini" initials="L." surname="Niccolini">
            <organization>Meta</organization>
          </author>
          <author fullname="Marten Seemann" initials="M." surname="Seemann">
         </author>
          <author fullname="Lucas Pardue" initials="L." surname="Pardue">
            <organization>Cloudflare</organization>
          </author>
          <date day="20" month="October" year="2025"/>
          <abstract>
            <t>   qlog provides extensible structured logging for network protocols,
   allowing for easy sharing of data that benefits common debug and
   analysis methods and tooling.  This document describes key concepts
   of qlog: formats, files, traces, events, and extension points.  This
   definition includes the high-level log file schemas, and generic
   event schemas.  Requirements and guidelines for creating protocol-
   specific event schemas are also presented.  All schemas are defined
   independent of serialization format, allowing logs to be represented
   in various ways such as JSON, CSV, or protobuf.

Note to Readers

      Note to RFC editor: Please remove this section before publication.

   Feedback and discussion are welcome at https://github.com/quicwg/qlog
   (https://github.com/quicwg/qlog).  Readers are advised to refer to
   the "editor's draft" at that URL for an up-to-date version of this
   document.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-quic-qlog-main-schema-13"/>
      </reference>
      <referencegroup anchor="BCP166" target="https://www.rfc-editor.org/info/bcp166">
        <reference anchor="RFC6365" target="https://www.rfc-editor.org/info/rfc6365">
          <front>
            <title>Terminology Used in Internationalization in the IETF</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <date month="September" year="2011"/>
            <abstract>
              <t>This document provides a list of terms used in the IETF when discussing internationalization. The purpose is to help frame discussions of internationalization in the various areas of the IETF and to help introduce the main concepts to IETF participants. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="166"/>
          <seriesInfo name="RFC" value="6365"/>
          <seriesInfo name="DOI" value="10.17487/RFC6365"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC3535">
        <front>
          <title>Overview of the 2002 IAB Network Management Workshop</title>
          <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
          <date month="May" year="2003"/>
          <abstract>
            <t>This document provides an overview of a workshop held by the Internet Architecture Board (IAB) on Network Management. The workshop was hosted by CNRI in Reston, VA, USA on June 4 thru June 6, 2002. The goal of the workshop was to continue the important dialog started between network operators and protocol developers, and to guide the IETFs focus on future work regarding network management. This report summarizes the discussions and lists the conclusions and recommendations to the Internet Engineering Task Force (IETF) community. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3535"/>
        <seriesInfo name="DOI" value="10.17487/RFC3535"/>
      </reference>
      <reference anchor="RFC6632">
        <front>
          <title>An Overview of the IETF Network Management Standards</title>
          <author fullname="M. Ersue" initials="M." role="editor" surname="Ersue"/>
          <author fullname="B. Claise" initials="B." surname="Claise"/>
          <date month="June" year="2012"/>
          <abstract>
            <t>This document gives an overview of the IETF network management standards and summarizes existing and ongoing development of IETF Standards Track network management protocols and data models. The document refers to other overview documents, where they exist and classifies the standards for easy orientation. The purpose of this document is, on the one hand, to help system developers and users to select appropriate standard management protocols and data models to address relevant management needs. On the other hand, the document can be used as an overview and guideline by other Standard Development Organizations or bodies planning to use IETF management technologies and data models. This document does not cover Operations, Administration, and Maintenance (OAM) technologies on the data-path, e.g., OAM of tunnels, MPLS Transport Profile (MPLS-TP) OAM, and pseudowire as well as the corresponding management models. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6632"/>
        <seriesInfo name="DOI" value="10.17487/RFC6632"/>
      </reference>
      <reference anchor="RFC7950">
        <front>
          <title>The YANG 1.1 Data Modeling Language</title>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <date month="August" year="2016"/>
          <abstract>
            <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7950"/>
        <seriesInfo name="DOI" value="10.17487/RFC7950"/>
      </reference>
      <reference anchor="RFC6241">
        <front>
          <title>Network Configuration Protocol (NETCONF)</title>
          <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
          <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
          <date month="June" year="2011"/>
          <abstract>
            <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6241"/>
        <seriesInfo name="DOI" value="10.17487/RFC6241"/>
      </reference>
      <reference anchor="RFC8040">
        <front>
          <title>RESTCONF Protocol</title>
          <author fullname="A. Bierman" initials="A." surname="Bierman"/>
          <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
          <author fullname="K. Watsen" initials="K." surname="Watsen"/>
          <date month="January" year="2017"/>
          <abstract>
            <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8040"/>
        <seriesInfo name="DOI" value="10.17487/RFC8040"/>
      </reference>
      <reference anchor="RFC7011">
        <front>
          <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
          <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
          <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
          <author fullname="P. Aitken" initials="P." surname="Aitken"/>
          <date month="September" year="2013"/>
          <abstract>
            <t>This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network. In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required. This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process. This document obsoletes RFC 5101.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="77"/>
        <seriesInfo name="RFC" value="7011"/>
        <seriesInfo name="DOI" value="10.17487/RFC7011"/>
      </reference>
      <reference anchor="RFC5424">
        <front>
          <title>The Syslog Protocol</title>
          <author fullname="R. Gerhards" initials="R." surname="Gerhards"/>
          <date month="March" year="2009"/>
          <abstract>
            <t>This document describes the syslog protocol, which is used to convey event notification messages. This protocol utilizes a layered architecture, which allows the use of any number of transport protocols for transmission of syslog messages. It also provides a message format that allows vendor-specific extensions to be provided in a structured way.</t>
            <t>This document has been written with the original design goals for traditional syslog in mind. The need for a new layered specification has arisen because standardization efforts for reliable and secure syslog extensions suffer from the lack of a Standards-Track and transport-independent RFC. Without this document, each other standard needs to define its own syslog packet format and transport mechanism, which over time will introduce subtle compatibility issues. This document tries to provide a foundation that syslog extensions can build on. This layered architecture approach also provides a solid basis that allows code to be written once for each syslog feature rather than once for each transport. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5424"/>
        <seriesInfo name="DOI" value="10.17487/RFC5424"/>
      </reference>
      <reference anchor="RFC6020">
        <front>
          <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <date month="October" year="2010"/>
          <abstract>
            <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6020"/>
        <seriesInfo name="DOI" value="10.17487/RFC6020"/>
      </reference>
      <reference anchor="RFC8791">
        <front>
          <title>YANG Data Structure Extensions</title>
          <author fullname="A. Bierman" initials="A." surname="Bierman"/>
          <author fullname="M. Björklund" initials="M." surname="Björklund"/>
          <author fullname="K. Watsen" initials="K." surname="Watsen"/>
          <date month="June" year="2020"/>
          <abstract>
            <t>This document describes YANG mechanisms for defining abstract data structures with YANG.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8791"/>
        <seriesInfo name="DOI" value="10.17487/RFC8791"/>
      </reference>
      <reference anchor="I-D.ietf-netmod-rfc8407bis">
        <front>
          <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
          <author fullname="Andy Bierman" initials="A." surname="Bierman">
            <organization>YumaWorks</organization>
          </author>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Qin Wu" initials="Q." surname="Wu">
            <organization>Huawei</organization>
          </author>
          <date day="5" month="June" year="2025"/>
          <abstract>
            <t>   This document provides guidelines for authors and reviewers of
   specifications containing YANG data models, including IANA-maintained
   modules.  Recommendations and procedures are defined, which are
   intended to increase interoperability and usability of Network
   Configuration Protocol (NETCONF) and RESTCONF Protocol
   implementations that utilize YANG modules.  This document obsoletes
   RFC 8407.

   Also, this document updates RFC 8126 by providing additional
   guidelines for writing the IANA considerations for RFCs that specify
   IANA-maintained modules.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-rfc8407bis-28"/>
      </reference>
      <reference anchor="RFC8340">
        <front>
          <title>YANG Tree Diagrams</title>
          <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
          <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
          <date month="March" year="2018"/>
          <abstract>
            <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="215"/>
        <seriesInfo name="RFC" value="8340"/>
        <seriesInfo name="DOI" value="10.17487/RFC8340"/>
      </reference>
      <reference anchor="RFC8199">
        <front>
          <title>YANG Module Classification</title>
          <author fullname="D. Bogdanovic" initials="D." surname="Bogdanovic"/>
          <author fullname="B. Claise" initials="B." surname="Claise"/>
          <author fullname="C. Moberg" initials="C." surname="Moberg"/>
          <date month="July" year="2017"/>
          <abstract>
            <t>The YANG data modeling language is currently being considered for a wide variety of applications throughout the networking industry at large. Many standards development organizations (SDOs), open-source software projects, vendors, and users are using YANG to develop and publish YANG modules for a wide variety of applications. At the same time, there is currently no well-known terminology to categorize various types of YANG modules.</t>
            <t>A consistent terminology would help with the categorization of YANG modules, assist in the analysis of the YANG data modeling efforts in the IETF and other organizations, and bring clarity to the YANG- related discussions between the different groups.</t>
            <t>This document describes a set of concepts and associated terms to support consistent classification of YANG modules.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8199"/>
        <seriesInfo name="DOI" value="10.17487/RFC8199"/>
      </reference>
      <reference anchor="RFC9182">
        <front>
          <title>A YANG Network Data Model for Layer 3 VPNs</title>
          <author fullname="S. Barguil" initials="S." surname="Barguil"/>
          <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="L. Munoz" initials="L." surname="Munoz"/>
          <author fullname="A. Aguado" initials="A." surname="Aguado"/>
          <date month="February" year="2022"/>
          <abstract>
            <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
            <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9182"/>
        <seriesInfo name="DOI" value="10.17487/RFC9182"/>
      </reference>
      <reference anchor="RFC9291">
        <front>
          <title>A YANG Network Data Model for Layer 2 VPNs</title>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
          <author fullname="S. Barguil" initials="S." surname="Barguil"/>
          <author fullname="L. Munoz" initials="L." surname="Munoz"/>
          <date month="September" year="2022"/>
          <abstract>
            <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
            <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9291"/>
        <seriesInfo name="DOI" value="10.17487/RFC9291"/>
      </reference>
      <reference anchor="RFC8309">
        <front>
          <title>Service Models Explained</title>
          <author fullname="Q. Wu" initials="Q." surname="Wu"/>
          <author fullname="W. Liu" initials="W." surname="Liu"/>
          <author fullname="A. Farrel" initials="A." surname="Farrel"/>
          <date month="January" year="2018"/>
          <abstract>
            <t>The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
            <t>A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
            <t>This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture. Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8309"/>
        <seriesInfo name="DOI" value="10.17487/RFC8309"/>
      </reference>
      <reference anchor="RFC8299">
        <front>
          <title>YANG Data Model for L3VPN Service Delivery</title>
          <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
          <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
          <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
          <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
          <date month="January" year="2018"/>
          <abstract>
            <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
            <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8299"/>
        <seriesInfo name="DOI" value="10.17487/RFC8299"/>
      </reference>
      <reference anchor="RFC8466">
        <front>
          <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
          <author fullname="B. Wen" initials="B." surname="Wen"/>
          <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
          <author fullname="C. Xie" initials="C." surname="Xie"/>
          <author fullname="L. Jalil" initials="L." surname="Jalil"/>
          <date month="October" year="2018"/>
          <abstract>
            <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
            <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
            <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8466"/>
        <seriesInfo name="DOI" value="10.17487/RFC8466"/>
      </reference>
      <reference anchor="RFC3139">
        <front>
          <title>Requirements for Configuration Management of IP-based Networks</title>
          <author fullname="L. Sanchez" initials="L." surname="Sanchez"/>
          <author fullname="K. McCloghrie" initials="K." surname="McCloghrie"/>
          <author fullname="J. Saperia" initials="J." surname="Saperia"/>
          <date month="June" year="2001"/>
          <abstract>
            <t>This memo discusses different approaches to configure networks and identifies a set of configuration management requirements for IP-based networks. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3139"/>
        <seriesInfo name="DOI" value="10.17487/RFC3139"/>
      </reference>
      <reference anchor="RFC3198">
        <front>
          <title>Terminology for Policy-Based Management</title>
          <author fullname="A. Westerinen" initials="A." surname="Westerinen"/>
          <author fullname="J. Schnizlein" initials="J." surname="Schnizlein"/>
          <author fullname="J. Strassner" initials="J." surname="Strassner"/>
          <author fullname="M. Scherling" initials="M." surname="Scherling"/>
          <author fullname="B. Quinn" initials="B." surname="Quinn"/>
          <author fullname="S. Herzog" initials="S." surname="Herzog"/>
          <author fullname="A. Huynh" initials="A." surname="Huynh"/>
          <author fullname="M. Carlson" initials="M." surname="Carlson"/>
          <author fullname="J. Perry" initials="J." surname="Perry"/>
          <author fullname="S. Waldbusser" initials="S." surname="Waldbusser"/>
          <date month="November" year="2001"/>
          <abstract>
            <t>This document is a glossary of policy-related terms. It provides abbreviations, explanations, and recommendations for use of these terms. The intent is to improve the comprehensibility and consistency of writing that deals with network policy, particularly Internet Standards documents (ISDs). This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3198"/>
        <seriesInfo name="DOI" value="10.17487/RFC3198"/>
      </reference>
      <reference anchor="RFC2975">
        <front>
          <title>Introduction to Accounting Management</title>
          <author fullname="B. Aboba" initials="B." surname="Aboba"/>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="D. Harrington" initials="D." surname="Harrington"/>
          <date month="October" year="2000"/>
          <abstract>
            <t>This document describes and discusses the issues involved in the design of the modern accounting systems. The field of Accounting Management is concerned with the collection the collection of resource consumption data for the purposes of capacity and trend analysis, cost allocation, auditing, and billing. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2975"/>
        <seriesInfo name="DOI" value="10.17487/RFC2975"/>
      </reference>
      <reference anchor="RFC4251">
        <front>
          <title>The Secure Shell (SSH) Protocol Architecture</title>
          <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
          <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
          <date month="January" year="2006"/>
          <abstract>
            <t>The Secure Shell (SSH) Protocol is a protocol for secure remote login and other secure network services over an insecure network. This document describes the architecture of the SSH protocol, as well as the notation and terminology used in SSH protocol documents. It also discusses the SSH algorithm naming system that allows local extensions. The SSH protocol consists of three major components: The Transport Layer Protocol provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User Authentication Protocol authenticates the client to the server. The Connection Protocol multiplexes the encrypted tunnel into several logical channels. Details of these protocols are described in separate documents. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4251"/>
        <seriesInfo name="DOI" value="10.17487/RFC4251"/>
      </reference>
      <reference anchor="NEMOPS">
        <front>
          <title>Report from the IAB Workshop on the Next Era of Network Management Operations (NEMOPS)</title>
          <author fullname="Wes Hardaker" initials="W." surname="Hardaker">
         </author>
          <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
         </author>
          <date day="29" month="August" year="2025"/>
          <abstract>
            <t>   The "Next Era of Network Management Operations (NEMOPS)" workshop was
   convened by the Internet Architecture Board (IAB) from December 3-5,
   2024, as a three-day online meeting.  It builds on a previous 2002
   workshop, the outcome of which was documented in RFC 3535,
   identifying 14 operator requirements for consideration in future
   network management protocol design and related data models, along
   with some recommendations for the IETF.  Much has changed in the
   Internet’s operation and technological foundations since then.  The
   NEMOPS workshop reviewed the past outcomes and discussed any
   operational barriers that prevented these technologies from being
   widely implemented.  With the industry, network operators and
   protocol engineers working in collaboration, the workshop developed a
   suggested plan of action and network management recommendations for
   the IETF and IRTF.  Building on RFC 3535, this document provides the
   report of the follow-up IAB workshop on Network Management.

   Note that this document is a report on the proceedings of the
   workshop.  The views and positions documented in this report are
   those of the workshop participants and do not necessarily reflect IAB
   views and positions.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-iab-nemops-workshop-report-04"/>
      </reference>
    </references>
    <?line 1452?>

<section anchor="sec-changes-since-5706">
      <name>Changes Since RFC 5706</name>
      <t>The following changes have been made to the guidelines published in  <xref target="RFC5706"/>:</t>
      <ul spacing="normal">
        <li>
          <t>Change intended status from Informational to Best Current Practice</t>
        </li>
        <li>
          <t>Move the "Operational Considerations" Appendix A to a Checklist <xref target="CHECKLIST"/> maintained in GitHub</t>
        </li>
        <li>
          <t>Add a requirement for an "Operational Considerations" section in all new Standard Track RFCs, along with specific guidance on its content.</t>
        </li>
        <li>
          <t>Update the operational and manageability-related technologies to reflect over 15 years of advancements  </t>
          <ul spacing="normal">
            <li>
              <t>Provide focus and details on YANG-based standards, deprioritizing MIB Modules.</t>
            </li>
            <li>
              <t>Add a "YANG Data Model Considerations" section</t>
            </li>
            <li>
              <t>Update the "Available Management Technologies" landscape</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Add an "Operational and Management Tooling Considerations" section</t>
        </li>
      </ul>
      <section anchor="sec-todo">
        <name>TO DO LIST</name>
        <t>See the list of open issues at https://github.com/IETF-OPSAWG-WG/draft-opsarea-rfc5706bis/issues</t>
      </section>
    </section>
    <section numbered="false" anchor="sec-ack">
      <name>Acknowledgements</name>
      <t>The authors thank the following individuals and groups,
whose efforts have helped to improve this document:</t>
      <dl>
        <dt>The IETF Ops Directorate (OpsDir):</dt>
        <dd>
          <t>The IETF OpsDir <xref target="IETF-OPS-Dir"/> reviewer team, which has been providing document reviews for more than a decade, and its Chairs past and present: Gunter Van de Velde, Carlos Pignataro, Bo Wu, and Daniele Ceccarelli.</t>
        </dd>
        <dt>The AD championing the update:</dt>
        <dd>
          <t>Med Boucadair, who initiated and championed the effort to refresh RFC 5706, 15 years after its publication, building on an idea originally suggested by Carlos Pignataro.</t>
        </dd>
        <dt>Reviewers of this document, in chronological order:</dt>
        <dd>
          <t>Mahesh Jethanandani, Chongfeng Xie, Alvaro Retana, Michael P., Scott Hollenbeck, Ron Bonica, Italo Busi, Brian Trammel, Aijun Wang, and Richard Shockey for their review, comments, and contributions.</t>
        </dd>
        <dt>The author of RFC 5706:</dt>
        <dd>
          <t>David Harrington</t>
        </dd>
        <dt>Acknowledgments from RFC 5706:</dt>
        <dd>
          <t>This document started from an earlier document edited by Adrian
Farrel, which itself was based on work exploring the need for
Manageability Considerations sections in all Internet-Drafts produced
within the Routing Area of the IETF. That earlier work was produced
by Avri Doria, Loa Andersson, and Adrian Farrel, with valuable
feedback provided by Pekka Savola and Bert Wijnen.</t>
        </dd>
        <dt/>
        <dd>
          <t>Some of the discussion about designing for manageability came from
private discussions between Dan Romascanu, Bert Wijnen, Jürgen Schönwälder, Andy Bierman, and David Harrington.</t>
        </dd>
        <dt/>
        <dd>
          <t>Thanks to reviewers who helped fashion this document, including
Harald Alvestrand, Ron Bonica, Brian Carpenter, Benoît Claise, Adrian
Farrel, David Kessens, Dan Romascanu, Pekka Savola, Jürgen Schönwälder, Bert Wijnen, Ralf Wolter, and Lixia Zhang.</t>
        </dd>
      </dl>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Thomas Graf">
        <organization>Swisscom</organization>
        <address>
          <email>thomas.graf@swisscom.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
