<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-boucadair-nmop-rfc3535-20years-later-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="RFC 3535, 20 Years Later">RFC 3535, 20 Years Later</title>
    <seriesInfo name="Internet-Draft" value="draft-boucadair-nmop-rfc3535-20years-later-00"/>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2023" month="November" day="20"/>
    <keyword>network management</keyword>
    <keyword>future networks</keyword>
    <abstract>
      <?line 29?>

<t>The IAB has organized an important workshop
to establish a dialog between network operators and
protocol developers, and to guide the IETF focus on work
regarding network management.  The outcome of that workshop
was documented in the "IAB Network Management Workshop" (RFC 3535)
which was instrumental for developing NETCONF and YANG, in particular.</t>
      <t>20 years later, it is time to evaluate what has been achieved since then and
identify the operational barriers for making these
technologies widely implemented. Also, this document intends to capture new
requirements for network management operations.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/rfc3535-20years-later"/>.</t>
    </note>
  </front>
  <middle>
    <?line 43?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The IAB has organized a workshop (June 4-June 6, 2002)
to establish a dialog between network operators and
protocol developers, and to guide the IETF focus on work
regarding network management.  The outcome of that workshop
was documented in the "IAB Network Management Workshop" <xref target="RFC3535"/>
which was instrumental for developing NETCONF <xref target="RFC6241"/>, YANG <xref target="RFC6020"/><xref target="RFC7950"/>, and RESTCONF <xref target="RFC8040"/>.</t>
      <t>20 years later, new requirements on network management operations are emerging from the operators. This document intends to capture these requirements that reflect the progress in this area. The document also provide an assessment of the RFC3535 recommendations and to what extend that roadmap was driving network management efforts within the IETF.</t>
      <t>Early version of the document includes <strong>many placeholders on purpose</strong> as the intent is to collect inputs from interested parties. Items listed in <xref target="sec-obs"/> are provided to exemplify candidate items to discuss in that section.</t>
    </section>
    <section anchor="summary-of-technology-advences-since-rfc-3535">
      <name>Summary of Technology Advences Since RFC 3535</name>
      <t>To be further elaborated:</t>
      <ul spacing="normal">
        <li>
          <t>NETCONF</t>
        </li>
        <li>
          <t>YANG</t>
        </li>
        <li>
          <t>RESTCONF</t>
        </li>
        <li>
          <t>SDN &amp; Programmable Networks</t>
        </li>
        <li>
          <t>Automation</t>
        </li>
        <li>
          <t>Virtualization</t>
        </li>
        <li>
          <t>Containerization</t>
        </li>
        <li>
          <t>Intent-based</t>
        </li>
        <li>
          <t>Network APIs</t>
        </li>
        <li>
          <t>Telemetry</t>
        </li>
      </ul>
      <t>See also "An Overview of the IETF Network Management Standards" <xref target="RFC6632"/>.</t>
    </section>
    <section anchor="assessment-of-rfc-3535-recommendations">
      <name>Assessment of RFC 3535 Recommendations</name>
      <t><xref section="6" sectionFormat="of" target="RFC3535"/> includes the following recommendations:</t>
      <ol spacing="normal" type="1"><li>
          <t>The workshop recommends that the IETF stop forcing working groups
to provide writable MIB modules.  It should be the decision of
the working group whether they want to provide writable objects
or not.  </t>
          <t><strong>Status Update</strong>: In 2014, the IESG published a statement Writable MIB Module, which states that:
  &gt; SNMP MIB modules creating and modifying configuration state should only be produced by working groups in cases of clear utility and consensus to use SNMP
 write operations for configuration, and in consultation with the OPS ADs/MIB doctors.</t>
        </li>
        <li>
          <t>The workshop recommends that a group be formed to investigate why
current MIB modules do not contain all the objects needed by
operators to monitor their networks.  </t>
          <t><strong>Status Update</strong>: xxx</t>
        </li>
        <li>
          <t>The workshop recommends that a group be formed to investigate why
the current SNMP protocol does not satisfy all the monitoring
requirements of operators.  </t>
          <t><strong>Status Update</strong>: xxx</t>
        </li>
        <li>
          <t>The workshop recommends, with strong consensus from both protocol
developers and operators, that the IETF focus resources on the
standardization of configuration management mechanisms.  </t>
          <t><strong>Status Update</strong>: NETCONF, RESTCONF, CORECONF, YANG.</t>
        </li>
        <li>
          <t>The workshop recommends, with strong consensus from the operators
and rough consensus from the protocol developers, that the
IETF/IRTF should spend resources on the development and
standardization of XML-based device configuration and management
technologies (such as common XML configuration schemas, exchange
protocols and so on).  </t>
          <t><strong>Status Update</strong>: OK. This recommendation was also mirrored in other documents such as <xref target="RFC5706"/>.</t>
        </li>
        <li>
          <t>The workshop recommends, with strong consensus from the operators
and rough consensus from the protocol developers, that the
IETF/IRTF should not spend resources on developing HTML-based or
HTTP-based methods for configuration management.  </t>
          <t><strong>Status Update</strong>: The IETF deviated from this recommendation, e.g., RESTCONF <xref target="RFC8040"/> or CoAP Management Interface (CORECONF) <xref target="I-D.ietf-core-comi"/>.</t>
        </li>
        <li>
          <t>The workshop recommends, with rough consensus from the operators
and strong consensus from the protocol developers, that the IETF
should continue to spend resources on the evolution of the
SMI/SPPI data definition languages as being done in the SMIng
working group.  </t>
          <t><strong>Status Update</strong>: SMIng WG was concluded in 2003-04-04.</t>
        </li>
        <li>
          <t>The workshop recommends, with split consensus from the operators
and rough consensus from the protocol developers, that the IETF
should spend resources on fixing the MIB development and
standardization processs.  </t>
          <t><strong>Status Update</strong>: The IETF dedicated some resources to fix some
SNMP shortcomings with a focus on security (e.g., Transport Layer Security (TLS) Transport Model for
the SNMP <xref target="RFC6353"/> or <xref target="RFC9456"/>, HMAC-SHA-2 Authentication Protocols in User-Based Security Model (USM) for SNMPv3 <xref target="RFC7860"/>).</t>
        </li>
      </ol>
      <t><xref section="6" sectionFormat="of" target="RFC3535"/> also includes the following but without tagging them as recommendations:</t>
      <ol spacing="normal" type="1"><li>
          <t>The workshop had split consensus from the operators and rough
consensus from the protocol developers, that the IETF should not
focus resources on CIM extensions.  </t>
          <t><strong>Status Update</strong>: The IETF didn't dedicate any resources on CIM extensions.</t>
        </li>
        <li>
          <t>The workshop had rough consensus from the protocol developers
that the IETF should not spend resources on COPS-PR development.
So far, the operators have only very limited experience with
COPS-PR.  In general, however, they felt that further development
of COPS-PR might be a waste of resources as they assume that
COPS-PR does not really address their requirements.  </t>
          <t><strong>Status Update</strong>: The IETF has reclassified COPS Usage for Policy Provisioning <xref target="RFC3084"/>
to Historic status.</t>
        </li>
        <li>
          <t>The workshop had rough consensus from the protocol developers
that the IETF should not spend resources on SPPI PIB definitions.
The operators had rough consensus that they do not care about
SPPI PIBs.  </t>
          <t><strong>Status Update</strong>: The IETF has reclassified Structure of Policy Provisioning Information <xref target="RFC3159"/>, as well as
three Policy Information Bases (<xref target="RFC3317"/>, <xref target="RFC3318"/>, and <xref target="RFC3571"/>) to
Historic status.</t>
        </li>
      </ol>
    </section>
    <section anchor="sec-obs">
      <name>Some Observations</name>
      <section anchor="fragmented-ecosystem">
        <name>Fragmented Ecosystem</name>
        <t>The current YANG device models ecosystem is fragmented: some
standards models are defined in the IETF while similar ones are
defined in other fora such as Openconfig.  Unlike service and
network models, IETF-defined device models are not widely
implemented. There is a need to rationalize this space and
avoid redundant efforts.</t>
      </section>
      <section anchor="need-for-profiling">
        <name>Need for Profiling</name>
        <t>Many NETCONF-related tools are (being) specified by the IETF,
but these tools are not widely supported (e.g., Push). Editing a
profile document with a set of recommendations about core/key
features with the appropriate justification will help the
emergence of more implementations that meet the operators’
needs. Examples of such profile documents are RFCs that
were published by the behave WG <xref target="BCP127"/>.</t>
        <t>Likewise, reassess the value of some IETF proposals vs. competing/emerging solution would be useful.</t>
      </section>
      <section anchor="lack-of-agile-process-for-yang-modules">
        <name>Lack of Agile Process for YANG Modules</name>
        <t>RFCs might not be suited for documenting YANG modules. In the meantime, there is a need for
"reference models" and "sufficiently stable models". An
hybrid approach might be investigated for documenting IETF-
endorsed YANG modules, such as considering an RFC to
describe the initial module sketch and objectives and an
official IETF repository for maintaining intermediate YANG
versions.</t>
      </section>
      <section anchor="integration-complexity">
        <name>Integration Complexity</name>
        <t>TBC.</t>
      </section>
      <section anchor="yang-formatted-data-manipulation">
        <name>YANG-formatted Data Manipulation</name>
        <t>TBC.</t>
      </section>
      <section anchor="another-item">
        <name>Another Item</name>
        <t>TBC.</t>
      </section>
      <section anchor="another-item-1">
        <name>Another Item</name>
        <t>TBC.</t>
      </section>
    </section>
    <section anchor="perspectives-recommendations">
      <name>Perspectives &amp; Recommendations</name>
      <t>TBC</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBC</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="RFC3535">
        <front>
          <title>Overview of the 2002 IAB Network Management Workshop</title>
          <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
          <date month="May" year="2003"/>
          <abstract>
            <t>This document provides an overview of a workshop held by the Internet Architecture Board (IAB) on Network Management. The workshop was hosted by CNRI in Reston, VA, USA on June 4 thru June 6, 2002. The goal of the workshop was to continue the important dialog started between network operators and protocol developers, and to guide the IETFs focus on future work regarding network management. This report summarizes the discussions and lists the conclusions and recommendations to the Internet Engineering Task Force (IETF) community. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3535"/>
        <seriesInfo name="DOI" value="10.17487/RFC3535"/>
      </reference>
      <reference anchor="RFC6241">
        <front>
          <title>Network Configuration Protocol (NETCONF)</title>
          <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
          <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
          <date month="June" year="2011"/>
          <abstract>
            <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6241"/>
        <seriesInfo name="DOI" value="10.17487/RFC6241"/>
      </reference>
      <reference anchor="RFC6020">
        <front>
          <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <date month="October" year="2010"/>
          <abstract>
            <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6020"/>
        <seriesInfo name="DOI" value="10.17487/RFC6020"/>
      </reference>
      <reference anchor="RFC7950">
        <front>
          <title>The YANG 1.1 Data Modeling Language</title>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <date month="August" year="2016"/>
          <abstract>
            <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7950"/>
        <seriesInfo name="DOI" value="10.17487/RFC7950"/>
      </reference>
      <reference anchor="RFC8040">
        <front>
          <title>RESTCONF Protocol</title>
          <author fullname="A. Bierman" initials="A." surname="Bierman"/>
          <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
          <author fullname="K. Watsen" initials="K." surname="Watsen"/>
          <date month="January" year="2017"/>
          <abstract>
            <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8040"/>
        <seriesInfo name="DOI" value="10.17487/RFC8040"/>
      </reference>
      <reference anchor="RFC6632">
        <front>
          <title>An Overview of the IETF Network Management Standards</title>
          <author fullname="M. Ersue" initials="M." role="editor" surname="Ersue"/>
          <author fullname="B. Claise" initials="B." surname="Claise"/>
          <date month="June" year="2012"/>
          <abstract>
            <t>This document gives an overview of the IETF network management standards and summarizes existing and ongoing development of IETF Standards Track network management protocols and data models. The document refers to other overview documents, where they exist and classifies the standards for easy orientation. The purpose of this document is, on the one hand, to help system developers and users to select appropriate standard management protocols and data models to address relevant management needs. On the other hand, the document can be used as an overview and guideline by other Standard Development Organizations or bodies planning to use IETF management technologies and data models. This document does not cover Operations, Administration, and Maintenance (OAM) technologies on the data-path, e.g., OAM of tunnels, MPLS Transport Profile (MPLS-TP) OAM, and pseudowire as well as the corresponding management models. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6632"/>
        <seriesInfo name="DOI" value="10.17487/RFC6632"/>
      </reference>
      <reference anchor="RFC5706">
        <front>
          <title>Guidelines for Considering Operations and Management of New Protocols and Protocol Extensions</title>
          <author fullname="D. Harrington" initials="D." surname="Harrington"/>
          <date month="November" year="2009"/>
          <abstract>
            <t>New protocols or protocol extensions are best designed with due consideration of the functionality needed to operate and manage the protocols. Retrofitting operations and management is sub-optimal. The purpose of this document is to provide guidance to authors and reviewers of documents that define new protocols or protocol extensions regarding aspects of operations and management that should be considered. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5706"/>
        <seriesInfo name="DOI" value="10.17487/RFC5706"/>
      </reference>
      <reference anchor="I-D.ietf-core-comi">
        <front>
          <title>CoAP Management Interface (CORECONF)</title>
          <author fullname="Michel Veillette" initials="M." surname="Veillette">
            <organization>Trilliant Networks Inc.</organization>
          </author>
          <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
            <organization>consultant</organization>
          </author>
          <author fullname="Alexander Pelov" initials="A." surname="Pelov">
            <organization>Acklio</organization>
          </author>
          <author fullname="Andy Bierman" initials="A." surname="Bierman">
            <organization>YumaWorks</organization>
          </author>
          <author fullname="Carsten Bormann" initials="C." surname="Bormann">
            <organization>Universität Bremen TZI</organization>
          </author>
          <date day="4" month="September" year="2023"/>
          <abstract>
            <t>   This document describes a network management interface for
   constrained devices and networks, called CoAP Management Interface
   (CORECONF).  The Constrained Application Protocol (CoAP) is used to
   access datastore and data node resources specified in YANG, or SMIv2
   converted to YANG.  CORECONF uses the YANG to CBOR mapping and
   converts YANG identifier strings to numeric identifiers for payload
   size reduction.  CORECONF extends the set of YANG based protocols,
   NETCONF and RESTCONF, with the capability to manage constrained
   devices and networks.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-core-comi-16"/>
      </reference>
      <reference anchor="RFC6353">
        <front>
          <title>Transport Layer Security (TLS) Transport Model for the Simple Network Management Protocol (SNMP)</title>
          <author fullname="W. Hardaker" initials="W." surname="Hardaker"/>
          <date month="July" year="2011"/>
          <abstract>
            <t>This document describes a Transport Model for the Simple Network Management Protocol (SNMP), that uses either the Transport Layer Security protocol or the Datagram Transport Layer Security (DTLS) protocol. The TLS and DTLS protocols provide authentication and privacy services for SNMP applications. This document describes how the TLS Transport Model (TLSTM) implements the needed features of an SNMP Transport Subsystem to make this protection possible in an interoperable way.</t>
            <t>This Transport Model is designed to meet the security and operational needs of network administrators. It supports the sending of SNMP messages over TLS/TCP and DTLS/UDP. The TLS mode can make use of TCP's improved support for larger packet sizes and the DTLS mode provides potentially superior operation in environments where a connectionless (e.g., UDP) transport is preferred. Both TLS and DTLS integrate well into existing public keying infrastructures.</t>
            <t>This document also defines a portion of the Management Information Base (MIB) for use with network management protocols. In particular, it defines objects for managing the TLS Transport Model for SNMP. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="78"/>
        <seriesInfo name="RFC" value="6353"/>
        <seriesInfo name="DOI" value="10.17487/RFC6353"/>
      </reference>
      <reference anchor="RFC9456">
        <front>
          <title>Updates to the TLS Transport Model for SNMP</title>
          <author fullname="K. Vaughn" initials="K." role="editor" surname="Vaughn"/>
          <date month="November" year="2023"/>
          <abstract>
            <t>This document updates RFC 6353 ("Transport Layer Security (TLS) Transport Model for the Simple Network Management Protocol (SNMP)") to reflect changes necessary to support Transport Layer Security version 1.3 (TLS 1.3) and Datagram Transport Layer Security version 1.3 (DTLS 1.3), which are jointly known as "(D)TLS 1.3". This document is compatible with (D)TLS 1.2 and is intended to be compatible with future versions of SNMP and (D)TLS.</t>
            <t>This document updates the SNMP-TLS-TM-MIB as defined in RFC 6353.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9456"/>
        <seriesInfo name="DOI" value="10.17487/RFC9456"/>
      </reference>
      <reference anchor="RFC7860">
        <front>
          <title>HMAC-SHA-2 Authentication Protocols in User-Based Security Model (USM) for SNMPv3</title>
          <author fullname="J. Merkle" initials="J." role="editor" surname="Merkle"/>
          <author fullname="M. Lochter" initials="M." surname="Lochter"/>
          <date month="April" year="2016"/>
          <abstract>
            <t>This document specifies several authentication protocols based on the SHA-2 hash functions for the User-based Security Model (USM) for SNMPv3 defined in RFC 3414. It obsoletes RFC 7630, in which the MIB MODULE-IDENTITY value was incorrectly specified.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7860"/>
        <seriesInfo name="DOI" value="10.17487/RFC7860"/>
      </reference>
      <reference anchor="RFC3084">
        <front>
          <title>COPS Usage for Policy Provisioning (COPS-PR)</title>
          <author fullname="K. Chan" initials="K." surname="Chan"/>
          <author fullname="J. Seligson" initials="J." surname="Seligson"/>
          <author fullname="D. Durham" initials="D." surname="Durham"/>
          <author fullname="S. Gai" initials="S." surname="Gai"/>
          <author fullname="K. McCloghrie" initials="K." surname="McCloghrie"/>
          <author fullname="S. Herzog" initials="S." surname="Herzog"/>
          <author fullname="F. Reichmeyer" initials="F." surname="Reichmeyer"/>
          <author fullname="R. Yavatkar" initials="R." surname="Yavatkar"/>
          <author fullname="A. Smith" initials="A." surname="Smith"/>
          <date month="March" year="2001"/>
          <abstract>
            <t>This document describes the use of the Common Open Policy Service (COPS) protocol for support of policy provisioning (COPS-PR). [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3084"/>
        <seriesInfo name="DOI" value="10.17487/RFC3084"/>
      </reference>
      <reference anchor="RFC3159">
        <front>
          <title>Structure of Policy Provisioning Information (SPPI)</title>
          <author fullname="K. McCloghrie" initials="K." surname="McCloghrie"/>
          <author fullname="M. Fine" initials="M." surname="Fine"/>
          <author fullname="J. Seligson" initials="J." surname="Seligson"/>
          <author fullname="K. Chan" initials="K." surname="Chan"/>
          <author fullname="S. Hahn" initials="S." surname="Hahn"/>
          <author fullname="R. Sahita" initials="R." surname="Sahita"/>
          <author fullname="A. Smith" initials="A." surname="Smith"/>
          <author fullname="F. Reichmeyer" initials="F." surname="Reichmeyer"/>
          <date month="August" year="2001"/>
          <abstract>
            <t>This document, the Structure of Policy Provisioning Information (SPPI), defines the adapted subset of SNMP's Structure of Management Information (SMI) used to write Policy Information Base (PIB) modules. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3159"/>
        <seriesInfo name="DOI" value="10.17487/RFC3159"/>
      </reference>
      <reference anchor="RFC3317">
        <front>
          <title>Differentiated Services Quality of Service Policy Information Base</title>
          <author fullname="K. Chan" initials="K." surname="Chan"/>
          <author fullname="R. Sahita" initials="R." surname="Sahita"/>
          <author fullname="S. Hahn" initials="S." surname="Hahn"/>
          <author fullname="K. McCloghrie" initials="K." surname="McCloghrie"/>
          <date month="March" year="2003"/>
        </front>
        <seriesInfo name="RFC" value="3317"/>
        <seriesInfo name="DOI" value="10.17487/RFC3317"/>
      </reference>
      <reference anchor="RFC3318">
        <front>
          <title>Framework Policy Information Base</title>
          <author fullname="R. Sahita" initials="R." role="editor" surname="Sahita"/>
          <author fullname="S. Hahn" initials="S." surname="Hahn"/>
          <author fullname="K. Chan" initials="K." surname="Chan"/>
          <author fullname="K. McCloghrie" initials="K." surname="McCloghrie"/>
          <date month="March" year="2003"/>
          <abstract>
            <t>This document defines a set of PRovisioning Classes (PRCs) and textual conventions that are common to all clients that provision policy using Common Open Policy Service (COPS) protocol for Provisioning.</t>
            <t>Structure of Policy Provisioning Information (SPPI) describes a structure for specifying policy information that can then be transmitted to a network device for the purpose of configuring policy at that device. The model underlying this structure is one of well-defined (PRCs) and instances of these classes (PRIs) residing in a virtual information store called the Policy Information Base (PIB).</t>
            <t>One way to provision policy is by means of the (COPS) protocol with the extensions for provisioning. This protocol supports multiple clients, each of which may provision policy for a specific policy domain such as QoS, virtual private networks, or security.</t>
            <t>As described in COPS usage for Policy Provisioning (COPS-PR), each client supports a non-overlapping and independent set of PIB modules. However, some PRovisioning Classes are common to all subject-categories (client-types) and need to be present in each.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3318"/>
        <seriesInfo name="DOI" value="10.17487/RFC3318"/>
      </reference>
      <reference anchor="RFC3571">
        <front>
          <title>Framework Policy Information Base for Usage Feedback</title>
          <author fullname="D. Rawlins" initials="D." surname="Rawlins"/>
          <author fullname="A. Kulkarni" initials="A." surname="Kulkarni"/>
          <author fullname="K. Ho Chan" initials="K." surname="Ho Chan"/>
          <author fullname="M. Bokaemper" initials="M." surname="Bokaemper"/>
          <author fullname="D. Dutt" initials="D." surname="Dutt"/>
          <date month="August" year="2003"/>
          <abstract>
            <t>This document describes a portion of the Policy Information Base (PIB) to control policy usage collection and reporting in a device. The provisioning classes specified here allow a Policy Decision Point (PDP) to select which policy objects should collect usage information, what information should be collected and when it should be reported. This PIB requires the presence of other PIBs (defined elsewhere) that provide the policy objects from which usage information is collected. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3571"/>
        <seriesInfo name="DOI" value="10.17487/RFC3571"/>
      </reference>
      <referencegroup anchor="BCP127">
        <reference anchor="RFC4787" target="https://www.rfc-editor.org/info/rfc4787">
          <front>
            <title>Network Address Translation (NAT) Behavioral Requirements for Unicast UDP</title>
            <author fullname="F. Audet" initials="F." role="editor" surname="Audet"/>
            <author fullname="C. Jennings" initials="C." surname="Jennings"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document defines basic terminology for describing different types of Network Address Translation (NAT) behavior when handling Unicast UDP and also defines a set of requirements that would allow many applications, such as multimedia communications or online gaming, to work consistently. Developing NATs that meet this set of requirements will greatly increase the likelihood that these applications will function properly. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="127"/>
          <seriesInfo name="RFC" value="4787"/>
          <seriesInfo name="DOI" value="10.17487/RFC4787"/>
        </reference>
        <reference anchor="RFC6888" target="https://www.rfc-editor.org/info/rfc6888">
          <front>
            <title>Common Requirements for Carrier-Grade NATs (CGNs)</title>
            <author fullname="S. Perreault" initials="S." role="editor" surname="Perreault"/>
            <author fullname="I. Yamagata" initials="I." surname="Yamagata"/>
            <author fullname="S. Miyakawa" initials="S." surname="Miyakawa"/>
            <author fullname="A. Nakagawa" initials="A." surname="Nakagawa"/>
            <author fullname="H. Ashida" initials="H." surname="Ashida"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This document defines common requirements for Carrier-Grade NATs (CGNs). It updates RFC 4787.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="127"/>
          <seriesInfo name="RFC" value="6888"/>
          <seriesInfo name="DOI" value="10.17487/RFC6888"/>
        </reference>
        <reference anchor="RFC7857" target="https://www.rfc-editor.org/info/rfc7857">
          <front>
            <title>Updates to Network Address Translation (NAT) Behavioral Requirements</title>
            <author fullname="R. Penno" initials="R." surname="Penno"/>
            <author fullname="S. Perreault" initials="S." surname="Perreault"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="S. Sivakumar" initials="S." surname="Sivakumar"/>
            <author fullname="K. Naito" initials="K." surname="Naito"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This document clarifies and updates several requirements of RFCs 4787, 5382, and 5508 based on operational and development experience. The focus of this document is Network Address Translation from IPv4 to IPv4 (NAT44).</t>
              <t>This document updates RFCs 4787, 5382, and 5508.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="127"/>
          <seriesInfo name="RFC" value="7857"/>
          <seriesInfo name="DOI" value="10.17487/RFC7857"/>
        </reference>
      </referencegroup>
    </references>
    <?line 229?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
