<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-opsarea-rfc5706bis-05" category="bcp" consensus="true" submissionType="IETF" obsoletes="5706" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.1 -->
  <front>
    <title abbrev="Operations &amp; Management Considerations">Guidelines for Considering Operations and Management in IETF Specifications</title>
    <seriesInfo name="Internet-Draft" value="draft-opsarea-rfc5706bis-05"/>
    <author fullname="Benoit Claise">
      <organization>Everything OPS</organization>
      <address>
        <email>benoit@everything-ops.net</email>
      </address>
    </author>
    <author fullname="Joe Clarke">
      <organization>Cisco</organization>
      <address>
        <email>jclarke@cisco.com</email>
      </address>
    </author>
    <author fullname="Adrian Farrel">
      <organization>Old Dog Consulting</organization>
      <address>
        <email>adrian@olddog.co.uk</email>
      </address>
    </author>
    <author fullname="Samier Barguil">
      <organization>Nokia</organization>
      <address>
        <email>samier.barguil_giraldo@nokia.com</email>
      </address>
    </author>
    <author fullname="Carlos Pignataro">
      <organization>Blue Fern Consulting</organization>
      <address>
        <email>carlos@bluefern.consulting</email>
        <email>cpignata@gmail.com</email>
        <uri>https://bluefern.consulting</uri>
      </address>
    </author>
    <author fullname="Ran Chen">
      <organization>ZTE</organization>
      <address>
        <email>chen.ran@zte.com.cn</email>
      </address>
    </author>
    <date year="2025" month="September" day="05"/>
    <area>Operations and Management</area>
    <keyword>management</keyword>
    <keyword>operations</keyword>
    <keyword>operations and management</keyword>
    <keyword>ops considerations</keyword>
    <abstract>
      <?line 89?>

<t>New Protocols or Protocol Extensions are best designed with due
   consideration of the functionality needed to operate and manage the
   protocols.  Retrofitting operations and management is sub-optimal.
   The purpose of this document is to provide guidance to authors and
   reviewers on what operational and management aspects should be
   addressed when defining New Protocols or Protocol Extensions.</t>
      <t>This document obsoletes RFC 5706, replacing it completely and updating
   it with new operational and management techniques and mechanisms. It also
   introduces a requirement to include an "Operational Considerations"
   section in new RFCs in the IETF Stream.</t>
    </abstract>
  </front>
  <middle>
    <?line 103?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Often when New Protocols or Protocol Extensions are developed, not
   enough consideration is given to how the protocol will be deployed,
   operated, and managed. Retrofitting operations and management
   mechanisms is often hard and architecturally unpleasant, and certain
   protocol design choices may make deployment, operations, and
   management particularly difficult.
   To ensure deployability, the operational environment and manageability
   must be considered during design.</t>
      <t>This document provides guidelines to help Protocol Designers and working
   groups (WGs) consider the operations and management functionality for
   their New Protocol or Protocol Extension at an early phase in the design
   process.</t>
      <t>This document obsoletes <xref target="RFC5706"/> and fully updates its content
   with new operational and management techniques and mechanisms. It also
   introduces a requirement for an "Operational Considerations"
   section in new RFCs in the IETF Stream.
   This document also removes outdated
   references and aligns with current practices, protocols, and
   technologies used in operating and managing devices, networks, and
   services. See <xref target="sec-changes-since-5706"/> for more details.</t>
      <section anchor="sec-this-doc">
        <name>This Document</name>
        <t>This document provides a set of guidelines for considering
   operations and management in an IETF technical specification
   with an eye toward being flexible while also striving for
   interoperability.</t>
        <t>Entirely New Protocols may require significant consideration of expected
   operations and management, while Protocol Extensions to existing, widely
   deployed protocols may have established de facto operations and
   management practices that are already well understood. This document does
   not mandate a comprehensive inventory of all operational considerations.
   Instead, it guides authors to focus on key aspects that are essential for
   the technology's deployability, operation, and maintenance.</t>
        <t>Suitable management approaches may vary for different areas, working
   groups, and protocols in the IETF. This document does not prescribe
   a fixed solution or format in dealing with operational and management
   aspects of IETF protocols. However, these aspects should be
   considered for any IETF protocol, given the IETF's role in developing technologies and
   protocols to be deployed and operated in the real-world Internet.</t>
        <t>A WG may decide that its protocol does not need interoperable
   management or a standardized Data Model, but this should be a
   deliberate and documented decision, not the result of omission. This document
   provides some guidelines for those considerations.</t>
        <t>This document makes a distinction between "Operational
   Considerations" and "Management Considerations", although the two are
   closely related. The operational considerations apply to operating the protocol within a network, even
   if there were no management protocol actively being used. The section on manageability is focused on
   management technology, such as how to utilize management protocols
   and how to design management Data Models.</t>
      </section>
      <section anchor="sec-audience">
        <name>Audience</name>
        <t>The guidelines are intended to be useful to authors
   writing protocol specifications.
   They outline what to consider for management and deployment, how to document
   those aspects, and how to present them in a consistent format.
    This document is intended to offer a flexible set of
   guiding principles applicable to various circumstances. It provides a framework for working groups
   to ensure that manageability considerations are an integral part of the protocol design process, and
   its use should not be misinterpreted as imposing new hurdles on work in other areas.</t>
        <t>Protocol Designers should consider which operations and management
   needs are relevant to their protocol, document how those needs could
   be addressed, and suggest (preferably standard) management protocols
   and Data Models that could be used to address those needs. This is
   similar to a WG that considers which security threats are relevant to
   their protocol, documents (in the required Security Considerations section,
   per Guidelines for Writing RFC Text on Security Considerations <xref target="BCP72"/>)
   how threats should be mitigated, and then suggests appropriate standard
   protocols that could mitigate the threats.</t>
        <t>A core principle of this document is to encourage early on discussions rather than mandating any specific solution.
   It does not impose a specific management or operational solution,
   imply that a formal Data Model is needed, or imply that using a specific management
   protocol is mandatory. If Protocol Designers conclude that the technology can be
   managed solely by using Proprietary Interfaces or that it does
   not need any structured or standardized Data Model, this might be fine,
   but it is a decision that should be explicit in a manageability discussion
   -- that this is how the protocol will need to be operated and managed.
   Protocol Designers should avoid deferring manageability to a later
   phase of the development of the specification.</t>
        <t>When a WG considers operation and management functionality for a
   protocol, the document should contain enough information for readers
   to understand how the protocol will be deployed, operated, and managed. The considerations
   do not need to be comprehensive and exhaustive; focus should be on key aspects. The WG
   should expect that considerations for operations and management may
   need to be updated in the future, after further operational
   experience has been gained.</t>
        <t>The OPS Directorate can use this document to inform their reviews. A list of guidelines and a
   checklist of questions to consider, which a reviewer can use to evaluate whether the protocol and
   documentation address common operations and management needs, is provided in <xref target="CHECKLIST"/>. Ultimately,
   the decision to incorporate this dociument's advice into their work remains with Protocol Designers and working groups themselves.</t>
        <t>This document is also of interest to the broader community, who wants to understand, contribute to,
   and review Internet-Drafts, taking operational considerations into account.</t>
      </section>
    </section>
    <section anchor="sec-terms">
      <name>Terminology</name>
      <t>This document does not describe interoperability requirements. As such, it does not use the capitalized keywords defined in <xref target="BCP14"/>.</t>
      <t>This section defines key terms used throughout the document to ensure clarity and consistency. Some terms are drawn from existing RFCs and IETF Internet-Drafts, while others are defined here for the purposes of this document. Where appropriate, references are provided for further reading or authoritative definitions.</t>
      <ul spacing="normal">
        <li>
          <t>Anomaly: See <xref target="I-D.ietf-nmop-terminology"/>.</t>
        </li>
        <li>
          <t>Cause: See <xref target="I-D.ietf-nmop-terminology"/>.</t>
        </li>
        <li>
          <t>CLI: Command Line Interface. A human-oriented interface, typically
a Proprietary Interface, to hardware or software devices
(e.g., routers or operating systems). The commands, their syntax,
and the precise semantics of the parameters may vary considerably
between different vendors, between products from the same
vendor, and even between different versions or releases of a single
product. No attempt at standardizing CLIs has been made by the IETF.</t>
        </li>
        <li>
          <t>Data Model: A set of mechanisms for representing, organizing, storing
and handling data within a particular type of data store or repository.
This usually comprises a collection of data structures such as lists, tables,
relations, etc., a collection of operations that can be applied to the
structures such as retrieval, update, summation, etc., and a collection of
integrity rules that define the legal states (set of values) or changes of
state (operations on values). A Data Model may be derived by mapping the
contents of an Information Model or may be developed ab initio. Further
discussion of Data Models can be found in <xref target="RFC3444"/>, <xref target="sec-interop"/>,
and <xref target="sec-mgmt-info"/>.</t>
        </li>
        <li>
          <t>Fault: See <xref target="I-D.ietf-nmop-terminology"/>.</t>
        </li>
        <li>
          <t>Fault Management: The process of interpreting fault notifications and other alerts
and alarms, isolating faults, correlating them, and deducing underlying
Causes. See <xref target="sec-fm-mgmt"/> for more information.</t>
        </li>
        <li>
          <t>Information Model: An abstraction and representation of the
entities in a managed environment, their properties, attributes
and operations, and the way that they relate to each other. The model is
independent of any specific software usage, protocol,
or platform <xref target="RFC3444"/>. See Sections <xref format="counter" target="sec-interop"/> and <xref format="counter" target="sec-im-design"/> for
further discussion of Information Models.</t>
        </li>
        <li>
          <t>New Protocol and Protocol Extension: These terms are used in this document
to identify entirely new protocols, new versions of existing
protocols, and extensions to protocols.</t>
        </li>
        <li>
          <t>OAM: Operations, Administration, and Maintenance <xref target="RFC6291"/>
            <xref target="I-D.ietf-opsawg-oam-characterization"/> is the term given to the
combination of:  </t>
          <ol spacing="normal" type="1"><li>
              <t>Operation activities that are undertaken to keep the
network running as intended. They include monitoring of the network.</t>
            </li>
            <li>
              <t>Administration activities that keep track of resources in the
network and how they are used. They include the bookkeeping necessary
to track networking resources.</t>
            </li>
            <li>
              <t>Maintenance activities focused on facilitating repairs and upgrades.
They also involve corrective and preventive measures to make the
managed network run more effectively.</t>
            </li>
          </ol>
          <t>
The broader concept of "operations and management" that is the subject of
this document encompasses OAM, in addition to other management and provisioning
tools and concepts.</t>
        </li>
        <li>
          <t>Probable Root Cause: See <xref target="I-D.ietf-nmop-network-incident-yang"/></t>
        </li>
        <li>
          <t>Problem: See <xref target="I-D.ietf-nmop-terminology"/>.</t>
        </li>
        <li>
          <t>Proprietary Interface: An interface to manage a network element
that is not standardized. As such, the user interface, syntax, and
semantics typically vary significantly between implementations.
Examples of proprietary interfaces include Command Line
Interface (CLI), management web portal and Browser User Interface (BUI),
Graphical User Interface (GUI), and vendor-specific application
programming interface (API).</t>
        </li>
        <li>
          <t>Protocol Designer: An individual, a group of
people, or an IETF WG involved in the development and specification
of New Protocols or Protocol Extensions.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-doc-req-ietf-spec">
      <name>Documentation Requirements for IETF Specifications</name>
      <section anchor="sec-oper-manag-considerations">
        <name>"Operational Considerations" Section</name>
        <t>All Internet-Drafts that document a technical specification and are advanced for publication
   as IETF RFCs are required to include an "Operational Considerations" section.
   Internet-Drafts that do not document technical specifications such as process, policy, or administrative
   Internet-Drafts are not required to include such a section.</t>
        <t>After evaluating the operational (<xref target="sec-oper-consid"/>) and manageability aspects (<xref target="sec-mgmt-consid"/>) of a New
   Protocol, a Protocol Extension, or an architecture, the resulting practices and
   requirements should be documented
   in an "Operational Considerations" section within a
   specification. Since protocols are intended for operational deployment and
   management within real networks, it is expected that such considerations
   will be present.</t>
        <t>It is also recommended that operational and manageability considerations
   be addressed early in the protocol design process. Consequently, early
   revisions of Internet-Drafts are expected to include an "Operational
   Considerations" section.</t>
        <t>An "Operational Considerations" section should include discussion of
   the management and operations topics raised in this document, and
   when one or more of these topics is not relevant, it would be useful
   to include a simple statement explaining why the topic is not
   relevant or applicable for the New Protocol or Protocol Extension.
   Of course, additional relevant operational and manageability topics
   should be included as well.</t>
        <t>Existing protocols and Data Models can provide the management
   functions identified in the previous section. Protocol Designers
   should consider how using existing protocols and Data Models might
   impact network operations.</t>
      </section>
      <section anchor="sec-null-sec">
        <name>"Operational Considerations" Section Boilerplate When No New Considerations Exist</name>
        <t>After a Protocol Designer has considered the manageability
   requirements of a New Protocol or Protocol Extension, they may determine that no
   management functionality or operational best-practice clarifications are
   needed. It would be helpful to
   reviewers, those who may update or write extensions to the protocol in the
   future, or to those deploying the protocol, to know the rationale
   regarding the decisions on manageability of the protocol at the
   time of its design.</t>
        <t>If there are no new manageability or deployment considerations, "Operations Considerations" section
   must contain the following simple statement, followed by a brief explanation of
   why that is the case.</t>
        <artwork><![CDATA[
  "There are no new operations or manageability requirements introduced
    by this document.

    Explanation: [brief rationale goes here]"
]]></artwork>
        <t>The presence of such a
   section would indicate to the reader that due
   consideration has been given to manageability and operations.</t>
        <t>In cases where the specification is a Protocol Extension and the base protocol
   already addresses the relevant operational and manageability
   considerations, it is helpful to reference the considerations section
   in the base document.</t>
      </section>
      <section anchor="sec-placement-sec">
        <name>Placement of the "Operational Considerations" Section</name>
        <t>It is recommended that the section be
   placed immediately before the Security Considerations section.
   Reviewers interested in such sections will find it easily, and this
   placement could simplify the development of tools to detect the
   presence of such a section.</t>
      </section>
    </section>
    <section anchor="sec-oper-consid">
      <name>How Will the New Protocol Fit into the Current Environment?</name>
      <t>Designers of a New Protocol should carefully consider the operational
   aspects. To ensure that a protocol will be practical to deploy in
   the real world, it is not enough to merely define it very precisely
   in a well-written document. Operational aspects will have a serious
   impact on the actual success of a protocol. Such aspects include bad
   interactions with existing solutions, a difficult upgrade path,
   difficulty of debugging problems, difficulty configuring from a
   central database, or a complicated state diagram that operations
   staff will find difficult to understand.</t>
      <t>BGP flap damping <xref target="RFC2439"/> is an example. It was designed to block
   high-frequency route flaps; however, the design did not consider the
   existence of BGP path exploration / slow convergence. In real
   operations, path exploration caused false flap damping, resulting in
   loss of reachability. As a result, many networks turned flap damping
   off.</t>
      <section anchor="sec-ops">
        <name>Operations</name>
        <t>Protocol Designers can analyze the operational environment and mode
   of work in which the New Protocol and Protocol Extension will work. Such an
   exercise need not be reflected directly by text in their document
   but could help in visualizing how to apply the protocol in the
   Internet environments where it will be deployed.</t>
        <t>A key question is how the protocol can operate "out of the box". If
   implementers are free to select their own defaults, the protocol
   needs to operate well with any choice of values. If there are
   sensible defaults, these need to be stated.</t>
        <t>There may be a need to support both a human interface (e.g., for
   troubleshooting) and a programmatic interface (e.g., for automated
   monitoring and Cause analysis). The application programming
   interfaces (APIs) and the human interfaces might benefit from being similar
   to ensure that the information exposed by both is
   consistent when presented to an operator. It is also relevant to
   identify consistent methods for determining information, such as
   what is counted in specific counters.</t>
        <t>Protocol Designers should consider what management operations are
   expected to be performed as a result of the deployment of the
   protocol -- such as whether write operations will be allowed on
   routers and on hosts, or whether notifications for alarms or other
   events will be expected.</t>
      </section>
      <section anchor="sec-install">
        <name>Installation and Initial Setup</name>
        <t>Anything that can be configured can be misconfigured. "Architectural
   Principles of the Internet" <xref target="RFC1958"/>, Section 3.8, states: "Avoid
   options and parameters whenever possible. Any options and parameters
   should be configured or negotiated dynamically rather than manually".</t>
        <t>To simplify configuration, Protocol Designers should consider
   specifying reasonable defaults, including default modes and
   parameters. For example, it could be helpful or necessary to specify
   default values for modes, timers, default state of logical control
   variables, default transports, and so on. Even if default values are
   used, it must be possible to retrieve all the actual values or at
   least an indication that known default values are being used.</t>
        <t>Protocol Designers should consider how to enable operators to
   concentrate on the configuration of the network as a whole rather
   than on individual devices. Of course, how one accomplishes this is
   the hard part.</t>
        <t>It is desirable to discuss the background of chosen default values,
   or perhaps why a range of values makes sense. In many cases, as
   technology changes, the values in an RFC might make less and less
   sense. It is very useful to understand whether defaults are based on
   best current practice and are expected to change as technologies
   advance or whether they have a more universal value that should not
   be changed lightly. For example, the default interface speed might
   be expected to change over time due to increased speeds in the
   network, and cryptographical algorithms might be expected to change
   over time as older algorithms are "broken".</t>
        <t>It is extremely important to set a sensible default value for all
   parameters.</t>
        <t>Default values should generally favor the conservative side over the
   "optimizing performance" side (e.g., the initial RTT and RTTVAR values
   of a TCP connection <xref target="RFC6298"/>).</t>
        <t>For those parameters that are speed-dependent, instead of using a
   constant, try to set the default value as a function of the link
   speed or some other relevant factors. This would help reduce the
   chance of problems caused by technology advancement.</t>
        <t>For example, where protocols involve cryptographic keys, Protocol Designers should
   consider not only key generation and validation mechanisms but also the
   format in which private keys are stored, transmitted, and restored.
   Designers should specify any expected consistency checks
   (e.g., recomputing an expanded key from the seed) that help verify
   correctness and integrity. Additionally, guidance should be given on
   data retention, restoration limits, and cryptographic module
   interoperability when importing/exporting private key material. See <xref target="I-D.ietf-lamps-dilithium-certificates"/> for an example of how such considerations are incorporated.</t>
      </section>
      <section anchor="sec-migration">
        <name>Migration Path</name>
        <t>If the New Protocol is a new version of an existing one, or if it is
   replacing another technology, the Protocol Designer should consider
   how deployments should transition to the New Protocol or Protocol
   Extensions. This should include coexistence with previously deployed
   protocols and/or previous versions of the same protocol, management of
   incompatibilities between versions, translation between versions,
   and consideration of potential side effects. A key question becomes:
   Are older protocols or versions disabled, or do they coexist in the
   network with the New Protocol?</t>
        <t>Many protocols benefit from being incrementally deployable --
   operators may deploy aspects of a protocol before deploying the
   protocol fully. In those cases, the design considerations should
   also specify whether the New Protocol requires any changes to
   the existing infrastructure, particularly the network.
   If so, the protocol specification should describe the nature of those
   changes, where they are required, and how they can be introduced in
   a manner that facilitates deployment.</t>
      </section>
      <section anchor="sec-other">
        <name>Requirements on Other Protocols and Functional Components</name>
        <t>Protocol Designers should consider the requirements that the new
   protocol might put on other protocols and functional components and
   should also document the requirements from other protocols and
   functional components that have been considered in designing the new
   protocol.</t>
        <t>These considerations should generally remain illustrative to avoid
   creating restrictions or dependencies, or potentially impacting the
   behavior of existing protocols, or restricting the extensibility of
   other protocols, or assuming other protocols will not be extended in
   certain ways. If restrictions or dependencies exist, they should be
   stated.</t>
        <t>For example, the design of the Resource ReSerVation Protocol (RSVP)
   <xref target="RFC2205"/> required each router to look at the RSVP PATH message and,
   if the router understood RSVP, add its own address to the message to
   enable automatic tunneling through non-RSVP routers. But in reality,
   routers cannot look at an otherwise normal IP packet and potentially
   take it off the fast path! The initial designers overlooked that a
   new "deep packet inspection" requirement was being put on the
   functional components of a router. The "router alert" option
   (<xref target="RFC2113"/>, <xref target="RFC2711"/>) was finally developed to solve this problem,
   for RSVP and other protocols that require the router to take some
   packets off the fast-forwarding path. Yet, Router Alert has its own
   problems in impacting router performance.</t>
      </section>
      <section anchor="sec-impact">
        <name>Impact on Network Operation</name>
        <t>The introduction of a New Protocol or Protocol Extensions may
   have an impact on the operation of existing networks. Protocol
   Designers should outline such impacts (which may be positive),
   including scaling benefits or concerns, and interactions with other protocols.
   Protocol Designers should describe the scenarios in which the New
   Protocol or its extensions are expected to be applicable or
   beneficial. This includes any relevant deployment environments,
   network topologies, usage constraints such as limited domains
   <xref target="RFC8799"/>, or use cases that justify or constrain adoption.
   For example, a New Protocol that doubles the number of active,
   reachable addresses in a network might have implications for the
   scalability of interior gateway protocols, and such impacts should
   be evaluated accordingly.</t>
        <t>If the protocol specification requires changes to end hosts, it should
   also indicate whether safeguards exist to protect networks from
   potential overload. For instance, a congestion control algorithm must
   comply with <xref target="BCP133"/> to prevent congestion collapse and ensure
   network stability.</t>
        <t>A protocol could send active monitoring packets on the wire. Without careful
   consideration, active monitoring might achieve high accuracy at the cost of
   generating an excessive number of monitoring packets.</t>
        <t>Protocol Designers should consider the potential impact on the
   behavior of other protocols in the network and on the traffic levels
   and traffic patterns that might change, including specific types of
   traffic, such as multicast. Also, consider the need to install new
   components that are added to the network as a result of changes in
   the configuration, such as servers performing auto-configuration
   operations.</t>
        <t>Protocol Designers should consider also the impact on
   infrastructure applications like DNS <xref target="RFC1034"/>, the registries, or
   the size of routing tables. For example, Simple Mail Transfer
   Protocol (SMTP) <xref target="RFC5321"/> servers use a reverse DNS lookup to filter
   out incoming connection requests. When Berkeley installed a new spam
   filter, their mail server stopped functioning because of overload of
   the DNS cache resolver.</t>
        <t>The impact on performance may also be noted -- increased delay or
   jitter in real-time traffic applications, or increased response time
   in client-server applications when encryption or filtering are
   applied.</t>
        <t>It is important to minimize the impact caused by configuration
   changes. Given configuration A and configuration B, it should be
   possible to generate the operations necessary to get from A to B with
   minimal state changes and effects on network and systems.</t>
      </section>
      <section anchor="sec-oper-verify">
        <name>Verifying Correct Operation</name>
        <t>Protocol Designers should consider techniques for testing the
   effect that the protocol has had on the network by sending data
   through the network and observing its behavior (a.k.a., active
   monitoring). Protocol Designers should consider how the correct end-
   to-end operation of the New Protocol or Protocol Extension in the network can be tested
   actively and passively, and how the correct data or forwarding plane
   function of each network element can be verified to be working
   properly with the New Protocol. Which metrics are of interest?</t>
        <t>Having simple protocol status and health indicators on network
   devices is a recommended means to check correct operation.</t>
      </section>
    </section>
    <section anchor="sec-mgmt-consid">
      <name>How Will the Protocol Be Managed?</name>
      <t>The considerations of manageability should start from identifying the
   entities to be managed, as well as how the managed protocol is
   supposed to be installed, configured, and monitored.</t>
      <t>Considerations for management should include a discussion of what
   needs to be managed, and how to achieve various management tasks.
   Where are the managers and what type of interfaces and
   protocols will they need? The "write a MIB module" approach to
   considering management often focuses on monitoring a protocol
   endpoint on a single device. A MIB module document typically only
   considers monitoring properties observable at one end, while the
   document does not really cover managing the *protocol* (the
   coordination of multiple ends) and does not even come near managing
   the *service* (which includes a lot of stuff that is very far away
   from the box). This scenario reflects a common operational
   concern: the inability to manage both ends of a connection
   effectively. As noted in <xref target="RFC3535"/>, "MIB modules can often be
   characterized as a list of ingredients without a recipe".</t>
      <t>The management model should take into account factors such as:</t>
      <ul spacing="normal">
        <li>
          <t>What type of management entities will be involved (agents, network
management systems)?</t>
        </li>
        <li>
          <t>What is the possible architecture (client-server, manager-agent,
poll-driven or event-driven, auto-configuration, two levels or
hierarchical)?</t>
        </li>
        <li>
          <t>What are the management operations (initial configuration, dynamic
configuration, alarm and exception reporting, logging, performance
monitoring, performance reporting, debugging)?</t>
        </li>
        <li>
          <t>How are these operations performed (locally, remotely, atomic
operation, scripts)? Are they performed immediately or are they
time scheduled, or event triggered?</t>
        </li>
      </ul>
      <t>Protocol Designers should consider how the New Protocol or Protocol Extension will be
   managed in different deployment scales. It might be sensible to use
   a local management interface to manage the New Protocol on a single
   device, but in a large network, remote management using a centralized
   server and/or using distributed management functionality might make
   more sense. Auto-configuration and default parameters might be
   possible for some New Protocols.</t>
      <t>Management needs to be considered not only from the perspective of a
   device, but also from the perspective of network and service
   management. A service might be network and operational functionality
   derived from the implementation and deployment of a New Protocol.
   Often an individual network element is not aware of the service being
   delivered.</t>
      <t>WGs should consider how to configure multiple related/co-operating
   devices and how to back off if one of those configurations fails or
   causes trouble. NETCONF addresses this in a generic manner
   by allowing an operator to lock the configuration on multiple
   devices, perform the configuration settings/changes, check that they
   are OK (undo if not), and then unlock the devices.</t>
      <t>Techniques for debugging protocol interactions in a network must be
   part of the network-management discussion. Implementation source
   code should be debugged before ever being added to a network, so
   asserts and memory dumps do not normally belong in management data
   models. However, debugging on-the-wire interactions is a protocol
   issue: while the messages can be seen by sniffing, it is enormously
   helpful if a protocol specification supports features that make
   debugging of network interactions and behaviors easier. There could
   be alerts issued when messages are received or when there are state
   transitions in the protocol state machine. However, the state
   machine is often not part of the on-the-wire protocol; the state
   machine explains how the protocol works so that an implementer can
   decide, in an implementation-specific manner, how to react to a
   received event.</t>
      <t>In a client/server protocol, it may be more important to instrument
   the server end of a protocol than the client end, since the
   performance of the server might impact more nodes than the
   performance of a specific client.</t>
      <section anchor="sec-mgmt-tech">
        <name>Available Management Technologies</name>
        <t>The IETF provides several standardized management protocols suitable for various operational purposes, for example as outlined in <xref target="RFC6632"/>. Broadly, these include core network management protocols, purpose-specific management protocols, and network management Data Models. A non-exhaustive list of such protocols is provided below:</t>
        <ul spacing="normal">
          <li>
            <t>Remote Authentication Dial In User Service (RADIUS) <xref target="RFC2865"/></t>
          </li>
          <li>
            <t>The Syslog Protocol <xref target="RFC5424"/></t>
          </li>
          <li>
            <t>Packet Sampling (PSAMP) Protocol Specifications <xref target="RFC5476"/></t>
          </li>
          <li>
            <t>Network Configuration Protocol (NETCONF) <xref target="RFC6241"/></t>
          </li>
          <li>
            <t>Diameter Base Protocol <xref target="RFC6733"/></t>
          </li>
          <li>
            <t>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information <xref target="RFC7011"/></t>
          </li>
          <li>
            <t>BGP Monitoring Protocol (BMP) <xref target="RFC7854"/></t>
          </li>
          <li>
            <t>RESTCONF Protocol <xref target="RFC8040"/></t>
          </li>
          <li>
            <t>Network Telemetry Framework <xref target="RFC9232"/></t>
          </li>
        </ul>
        <t>The IETF previously also worked on the Simple Network Management Protocol
   (SNMP) <xref target="RFC3410"/> and the Structure of Management Information (SMI) <xref target="STD58"/>,
   but further use of this management protocol in new IETF documents has been constrained
   to maintenance of existing MIB modules and development of MIB modules for legacy devices
   that do not support more resent management protocols <xref target="IESG-STATEMENT"/>.</t>
        <t>This section is not intended to offer in-depth definitions or explanations; readers seeking more detail should consult the referenced materials.</t>
      </section>
      <section anchor="sec-interop">
        <name>Interoperability</name>
        <t>Just as when deploying protocols that will inter-connect devices,
   management interoperability should be considered -- whether across
   devices from different vendors, across models from the same vendor,
   or across different releases of the same product. Management
   interoperability refers to allowing information sharing and
   operations between multiple devices and multiple management
   applications, often from different vendors. Interoperability allows
   for the use of third-party applications and the outsourcing of
   management services.</t>
        <t>Some product designers and Protocol Designers assume that if a device
   can be managed individually using a command line interface or a web
   page interface, that such a solution is enough. But when equipment
   from multiple vendors is combined into a large network, scalability
   of management may become a Problem. It may be important to have
   consistency in the management protocol support so network-wide operational
   processes can be automated. For example, a single switch might be
   easily managed using an interactive web interface when installed in a
   single-office small business, but when, say, a fast-food company
   installs similar switches from multiple vendors in hundreds or
   thousands of individual branches and wants to automate monitoring
   them from a central location, monitoring vendor- and model-specific
   web pages would be difficult to automate.</t>
        <t>The primary goal is the ability to roll out new useful functions and
   services in a way in which they can be managed in a scalable manner,
   where one understands the network impact (as part of the total cost
   of operations) of that service.</t>
        <t>Getting everybody to agree on a single syntax and an associated
   protocol to do all management has proven to be difficult. So,
   management systems tend to speak whatever the boxes support, whether
   the IETF likes this. The IETF is moving from support for one
   schema language for modeling the structure of management information
   (SMIv2) and one simple network management protocol (SNMP) towards support for additional schema
   languages and additional management protocols suited to different
   purposes. Other Standard Development Organizations (e.g., the
   Distributed Management Task Force - DMTF, the Tele-Management Forum -
   TMF) also define schemas and protocols for management and these may
   be more suitable than IETF schemas and protocols in some cases. Some
   of the alternatives being considered include:</t>
        <ul spacing="normal">
          <li>
            <t>XML Schema Definition <xref target="W3C.REC-xmlschema-0-20041028"/></t>
          </li>
        </ul>
        <t>and</t>
        <ul spacing="normal">
          <li>
            <t>NETCONF Configuration Protocol <xref target="RFC6241"/></t>
          </li>
          <li>
            <t>the IP Flow Information Export (IPFIX) Protocol <xref target="RFC7011"/> for
usage accounting</t>
          </li>
          <li>
            <t>the syslog protocol <xref target="RFC5424"/> for logging</t>
          </li>
        </ul>
        <t>Interoperability needs to be considered on the syntactic level and
   the semantic level. While it can be irritating and time-consuming,
   application designers, including operators who write their own
   scripts, can make their processing conditional to accommodate
   syntactic differences across vendors, models, or releases of product.</t>
        <t>Semantic differences are much harder to deal with on the manager side
   -- once you have the data, its meaning is a function of the managed
   entity.</t>
        <t>Information Models help focus interoperability on the semantic level
   by defining what information should be gathered and how it might be used,
   regardless of the underlying management protocol or vendor implementation.
   The use of an Information Model might
   help improve the ability of operators to correlate messages in
   different protocols where the data overlaps, such as a YANG Data Model
   and IPFIX Information Elements about the same event. An Information Model
   might identify which error conditions should be counted separately,
   and which error conditions can be recorded together in a single
   counter. Then, whether the counter is gathered via, e.g., NETCONF or
   exported via IPFIX, the counter will have the same meaning.</t>
        <t>Protocol Designers must consider what operational, configuration,
   state, or statistical information will be relevant for effectively
   monitoring, controlling, or troubleshooting a New Protocol and its Protocol
   Extensions. This includes identifying key parameters that reflect the
   protocol's behavior, performance metrics, error indicators, and any
   contextual data that would aid in diagnostic, troubleshooting, or lifecycle management.</t>
        <figure anchor="fig-im-dm">
          <name>Information Models (IMs) and Data Models (DMs)</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="144" width="464" viewBox="0 0 464 144" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,64 L 8,80" fill="none" stroke="black"/>
                <path d="M 96,48 L 96,80" fill="none" stroke="black"/>
                <path d="M 176,64 L 176,80" fill="none" stroke="black"/>
                <path d="M 232,32 L 248,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 176,64" fill="none" stroke="black"/>
                <path d="M 232,96 L 248,96" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="256,96 244,90.4 244,101.6" fill="black" transform="rotate(0,248,96)"/>
                <polygon class="arrowhead" points="256,32 244,26.4 244,37.6" fill="black" transform="rotate(0,248,32)"/>
                <g class="text">
                  <text x="100" y="36">IM</text>
                  <text x="336" y="36">conceptual/abstract</text>
                  <text x="440" y="36">model</text>
                  <text x="272" y="52">for</text>
                  <text x="328" y="52">designers</text>
                  <text x="376" y="52">&amp;</text>
                  <text x="424" y="52">operators</text>
                  <text x="12" y="100">DM</text>
                  <text x="100" y="100">DM</text>
                  <text x="180" y="100">DM</text>
                  <text x="328" y="100">concrete/detailed</text>
                  <text x="424" y="100">model</text>
                  <text x="296" y="116">for</text>
                  <text x="364" y="116">implementers</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
           IM               --> conceptual/abstract model
           |                    for designers & operators
+----------+---------+
|          |         |
DM         DM        DM     --> concrete/detailed model
                                   for implementers

]]></artwork>
          </artset>
        </figure>
        <t>"On the Difference between Information Models and Data Models"
   <xref target="RFC3444"/> is helpful in determining what information to consider
   regarding Information Models (IMs), as compared to Data Models (DMs).</t>
        <t>Protocol Designers may directly develop Data Models without first producing an Information Model. For example, such a decision can be taken when it is given that the data component is not used by distinct protocols (e.g., IPFIX-only).</t>
        <t>Alternatively, Protocol Designers may decide to use an Information Model to describe the managed elements in a protocol or Protocol Extension. The protocol Designers then use the Information Model to develop Data Models that will be used for managing the protocol.</t>
        <t>Specifically, Protocol Designers should develop an Information Model if multiple Data Model representations (e.g., YANG <xref target="RFC6020"/><xref target="RFC7950"/> and/or IPFIX <xref target="RFC7011"/>) are to be produced, to ensure lossless semantic mapping. Protocol Designers may create an Information Model if the resulting Data Models are complex or numerous.</t>
        <t>Information models should come from the protocol WGs and include
   lists of events, counters, and configuration parameters that are
   relevant. There are several Information Models contained in
   protocol WG RFCs. Some examples:</t>
        <ul spacing="normal">
          <li>
            <t><xref target="RFC3060"/> - Policy Core Information Model -- Version 1 Specification</t>
          </li>
          <li>
            <t><xref target="RFC3290"/> - An Informal Management Model for Diffserv Routers</t>
          </li>
          <li>
            <t><xref target="RFC3460"/> - Policy Core Information Model (PCIM) Extensions</t>
          </li>
          <li>
            <t><xref target="RFC3585"/> - IPsec Configuration Policy Information Model</t>
          </li>
          <li>
            <t><xref target="RFC3644"/> - Policy Quality of Service (QoS) Information Model</t>
          </li>
          <li>
            <t><xref target="RFC3670"/> - Information Model for Describing Network Device QoS Datapath Mechanisms</t>
          </li>
        </ul>
        <t>Management protocol standards and management Data Model standards
   often contain compliance clauses to ensure interoperability.
   Manageability considerations should include discussion of which level
   of compliance is expected to be supported for interoperability.</t>
      </section>
      <section anchor="sec-mgmt-info">
        <name>Management Information</name>
        <t>Languages used to describe an Information Model can influence the
   nature of the model. Using a particular data modeling language, such
   as YANG, influences the model to use certain types of structures, for
   example, hierarchical trees, groupings, and reusable types.
   YANG, as described in <xref target="RFC6020"/> and <xref target="RFC7950"/>, provides advantages
   for expressing network information, including clear separation of
   configuration data and operational state, support for constraints and
   dependencies, and extensibility for evolving requirements. Its ability
   to represent relationships and dependencies in a structured and modular
   way makes it an effective choice for defining management information
   models.</t>
        <t>Although this document recommends using English text (the official
   language for IETF specifications) to describe an Information Model,
   including a complementary YANG module helps translate abstract concepts
   into implementation-specific Data Models. This ensures consistency between
   the high-level design and practical deployment.</t>
        <t>A management Information Model should include a discussion of what is
   manageable, which aspects of the protocol need to be configured, what
   types of operations are allowed, what protocol-specific events might
   occur, which events can be counted, and for which events an operator
   should be notified.</t>
        <t>Operators find it important to be able to make a clear distinction
   between configuration data, operational state, and statistics. They
   need to determine which parameters were administratively configured
   and which parameters have changed since configuration as the result
   of mechanisms such as routing protocols or network management
   protocols. It is important to be able to separately fetch current
   configuration information, initial configuration information,
   operational state information, and statistics from devices; to be
   able to compare current state to initial state; and to compare
   information between devices. So, when deciding what information
   should exist, do not conflate multiple information elements into a
   single element.</t>
        <t>What is typically difficult to work through are relationships between
   abstract objects. Ideally, an Information Model would describe the
   relationships between the objects and concepts in the information
   model.</t>
        <t>Is there always just one instance of this object or can there be
   multiple instances? Does this object relate to exactly one other
   object, or may it relate to multiple? When is it possible to change a
   relationship?</t>
        <t>Do objects (such as instances in lists) share fate? For example, if an
   instance in list A must exist before a related instance in list B can be
   created, what happens to the instance in list B if the related instance in
   list A is deleted? Does the existence of relationships between
   objects have an impact on fate sharing? YANG's relationships and
   constraints can help express and enforce these relationships.</t>
        <section anchor="sec-im-design">
          <name>Information Model Design</name>
          <t>This document recommends keeping the Information Model as simple as
   possible by applying the following criteria:</t>
          <ol spacing="normal" type="1"><li>
              <t>Start with a small set of essential objects and make additions only as
further objects are needed with the objective of keeping the absolute number of objects as small as possible while still delivering the required function such that there is
no duplication between objects and where one piece of information can be derived from the other pieces of information, it is not itself represented as an object.</t>
            </li>
            <li>
              <t>Require that all objects be essential for management.</t>
            </li>
            <li>
              <t>Consider evidence of current use of the managed protocol, and the perceived utility of objects added to the Information Model.</t>
            </li>
            <li>
              <t>Exclude objects that can be derived from others in this or
other information models.</t>
            </li>
            <li>
              <t>Avoid causing critical sections to be heavily instrumented. A
guideline is one counter per critical section per layer.</t>
            </li>
            <li>
              <t>When defining an Information Model using  YANG Data Structure Extensions <xref target="RFC8791"/> (thereby keeping it abstract and implementation-agnostic per <xref target="RFC3444"/>) ensure that the Information Model remains simple, modular, and clear by following the authoring guidelines in <xref target="I-D.ietf-netmod-rfc8407bis"/>.</t>
            </li>
            <li>
              <t>When illustrating the abstract Information Model, use YANG Tree Diagrams <xref target="RFC8340"/> to provide a simple, standardized, and implementation-neutral model structure.</t>
            </li>
          </ol>
        </section>
        <section anchor="sec-yang-dm">
          <name>YANG Data Model Considerations</name>
          <t>When considering YANG Data Models for a new specification, there
  are multiple types of Data Models that may be applicable. The
  hierarchy and relationship between these types is described in
  <xref section="3.5.1" sectionFormat="of" target="I-D.ietf-netmod-rfc8407bis"/>. A new specification
  may require or benefit from one or more of these YANG Data Model types.</t>
          <ul spacing="normal">
            <li>
              <t>Device Models - Also called Network Element Models,
represent the configuration, operational state, and notifications of
individual devices. These models are designed to distinguish
between these types of data and support querying and updating
device-specific parameters. Consideration should be given to
how device-level models might fit with broader network and
service Data Models.</t>
            </li>
            <li>
              <t>Network Models - Also called Network Service Models, define abstractions
for managing the behavior and relationships of multiple devices
and device subsystems within a network. As described in <xref target="RFC8199"/>,
these models are used to manage network-wide. These abstractions are
useful to network operators and applications that interface with network
controllers. Examples of network models include the L3VPN Network Model
(L3NM) <xref target="RFC9182"/> and the L2VPN Network Model (L2VPN) <xref target="RFC9291"/>.</t>
            </li>
            <li>
              <t>Service Models - Also called Customer Service Models,
defined in <xref target="RFC8309"/>, are designed to abstract the customer interface
into a service. They consider customer-centric parameters such as
Service Level Agreement (SLA) and high-level policy (e.g., network intent).
Given that different operators and different customers may have widely-varying
business processes, these models should focus on common aspects of a service
with strong multi-party consensus. Examples of service models include
the L3VPN Service Model (L3SM) <xref target="RFC8299"/> and the L2VPN Service Model (L2SM)
<xref target="RFC8466"/>.</t>
            </li>
          </ul>
          <t>A common challenge in YANG Data Model development lies in defining the
  relationships between abstract service or network constructs and the
  underlying device models. Therefore, when designing YANG modules, it
  is important to go beyond simply modeling configuration and
  operational data (i.e., leaf nodes), and also consider how the
  status and relationships of abstract or distributed constructs can
  be reflected based on parameters available in the network.</t>
          <t>For example, the status of a service may depend on the operational state
  of multiple network elements to which the service is attached. In such
  cases, the YANG Data Model (and its accompanying documentation) should
  clearly describe how service-level status is derived from underlying
  device-level information. Similarly, it is beneficial to define
  events (and relevant triggered notifications) that indicate changes in an underlying state,
  enabling reliable detection and correlation of service-affecting
  conditions. Including such mechanisms improves the robustness of
  integrations and helps ensure consistent behavior across
  implementations.</t>
          <t>Specific guidelines to consider when authoring any type of YANG
  modules are described in <xref target="I-D.ietf-netmod-rfc8407bis"/>.</t>
        </section>
      </section>
      <section anchor="sec-fm-mgmt">
        <name>Fault Management</name>
        <t>Protocol Designers should idenitify and documented
   essential Faults, health indicators, alarms, and events that must be
   propagated to management applications or exposed through a Data
   Model. It is also recommended to describe how the Protocol Extension
   will affect the existing alarms and notification structure of the
   base Protocol, and to outline the potential impact of misconfigurations
   of the Protocol Extensions.</t>
        <t>Protocol Designers should consider how fault information will be
   propagated. Will it be done using asynchronous notifications or
   polling of health indicators?</t>
        <t>If notifications are used to alert operators to certain conditions,
   then Protocol Designers should discuss mechanisms to throttle
   notifications to prevent congestion and duplications of event
   notifications. Will there be a hierarchy of Faults, and will the
   Fault reporting be done by each Fault in the hierarchy, or will only
   the lowest Fault be reported and the higher levels be suppressed?
   Should there be aggregated status indicators based on concatenation
   of propagated Faults from a given domain or device?</t>
        <t>SNMP notifications and syslog messages can alert an operator when an
   aspect of the New Protocol fails or encounters an error or failure
   condition, and SNMP is frequently used as a heartbeat monitor.
   Should the event reporting provide guaranteed accurate delivery of
   the event information within a given (high) margin of confidence?
   Can we poll the latest events in the box?</t>
        <section anchor="sec-monitor">
          <name>Liveness Detection and Monitoring</name>
          <t>Protocol Designers should always build in basic testing features
   (e.g., ICMP echo, UDP/TCP echo service, NULL RPCs (remote procedure
   calls)) that can be used to test for liveness, with an option to
   enable and disable them.</t>
          <t>Mechanisms for monitoring the liveness of the protocol and for
   detecting Faults in protocol connectivity are usually built into
   protocols. In some cases, mechanisms already exist within other
   protocols responsible for maintaining lower-layer connectivity (e.g.,
   ICMP echo), but often new procedures are required to detect failures
   and to report rapidly, allowing remedial action to be taken.</t>
          <t>These liveness monitoring mechanisms do not typically require
   additional management capabilities. However, when a system detects a
   Fault, there is often a requirement to coordinate recovery action
   through management applications or at least to record the fact in an
   event log.</t>
        </section>
        <section anchor="sec-fault-determ">
          <name>Fault Determination</name>
          <t>It can be helpful to describe how Faults can be pinpointed using
   management information. For example, counters might record instances
   of error conditions. Some Faults might be able to be pinpointed by
   comparing the outputs of one device and the inputs of another device,
   looking for anomalies. Protocol Designers should consider what
   counters should count. If a single counter provided by vendor A
   counts three types of error conditions, while the corresponding
   counter provided by vendor B counts seven types of error conditions,
   these counters cannot be compared effectively -- they are not
   interoperable counters.</t>
          <t>How do you distinguish between faulty messages and good messages?</t>
          <t>Would some threshold-based mechanisms, such as Remote Monitoring
   (RMON) events/alarms or the EVENT-MIB, be usable to help determine
   error conditions? Are SNMP notifications for all events needed, or
   are there some "standard" notifications that could be used? Or can
   relevant counters be polled as needed?</t>
        </section>
        <section anchor="sec-cause-analysis">
          <name>Probable Root Cause Analysis</name>
          <t>Probable Root Cause analysis is about working out where the foundational
   Fault or Problem might be. Since one Fault may give rise to another Fault or
   Problem, a probable root cause is commonly meant to describe the original,
   source event or combination of circumstances that is the foundation of all
   related Faults.</t>
          <t>For example, if end-to-end data delivery is failing (e.g., reported by a
   notification), Probable Root Cause analysis can help find the failed link
   or node, or mis-configuration, within the end-to-end path.</t>
        </section>
        <section anchor="sec-fault-isol">
          <name>Fault Isolation</name>
          <t>It might be useful to isolate or quarantine Faults, such as isolating
   a device that emits malformed messages that are necessary to
   coordinate connections properly. This might be able to be done by
   configuring next-hop devices to drop the faulty messages to prevent
   them from entering the rest of the network.</t>
        </section>
      </section>
      <section anchor="sec-config-mgmt">
        <name>Configuration Management</name>
        <t>A Protocol Designer should document the basic configuration
   parameters that need to be instrumented for a New Protocol or Protocol Extensions, as well
   as default values and modes of operation.</t>
        <t>What information should be maintained across reboots of the device,
   or restarts of the management system?</t>
        <t>"Requirements for Configuration Management of IP-based Networks"
   <xref target="RFC3139"/> discusses requirements for configuration management,
   including discussion of different levels of management, high-level
   policies, network-wide configuration data, and device-local
   configuration. Network configuration extends beyond simple multi-device
   push or pull operations. It also involves ensuring that the configurations
   being pushed are semantically compatible across devices and that the resulting
   behavior of all involved devices corresponds to the intended behavior.
   Is the attachment between them configured
   compatibly on both ends? Is the IS-IS metric the same? ... Now
   answer those questions for 1,000 devices.</t>
        <t>Several efforts have existed in the IETF to develop policy-based
   configuration management. "Terminology for Policy-Based Management"
   <xref target="RFC3198"/> was written to standardize the terminology across these
   efforts.</t>
        <t>Implementations should not arbitrarily modify configuration data. In
   some cases (such as access control lists (ACLs)), the order of data
   items is significant and comprises part of the configured data. If a
   Protocol Designer defines mechanisms for configuration, it would be
   desirable to standardize the order of elements for consistency of
   configuration and of reporting across vendors and across releases
   from vendors.</t>
        <t>There are two parts to this:</t>
        <ol spacing="normal" type="1"><li>
            <t>A Network Management System (NMS) could optimize ACLs for
performance reasons.</t>
          </li>
          <li>
            <t>Unless the device or NMS is configured with adequate rules and guided by administrators with extensive experience, reordering ACLs can introduce significant security risks.</t>
          </li>
        </ol>
        <t>Network-wide configurations may be stored in central master databases
   and transformed into readable formats that can be pushed to devices, either by
   generating sequences of CLI commands or complete textual configuration files
   that are pushed to devices. There is no common database schema for
   network configuration, although the models used by various operators
   are probably very similar. Many operators consider it desirable to
   extract, document, and standardize the common parts of these network-
   wide configuration database schemas. A Protocol Designer should
   consider how to standardize the common parts of configuring the New
   Protocol, while recognizing that vendors may also have proprietary
   aspects of their configurations.</t>
        <t>It is important to enable operators to concentrate on the
   configuration of the network as a whole, rather than individual
   devices. Support for configuration transactions across several
   devices could significantly simplify network configuration
   management. The ability to distribute configurations to multiple
   devices, or to modify candidate configurations on multiple devices,
   and then activate them in a near-simultaneous manner might help.
   Protocol Designers can consider how it would make sense for their
   protocol to be configured across multiple devices. Configuration
   templates might also be helpful.</t>
        <t>Consensus of the 2002 IAB Workshop <xref target="RFC3535"/> was that textual
   configuration files should be able to contain international
   characters. Human-readable strings should utilize UTF-8, and
   protocol elements should be in case-insensitive ASCII.</t>
        <t>A mechanism to dump and restore configurations is a primitive
   operation needed by operators. Standards for pulling and pushing
   configurations from/to devices are desirable.</t>
        <t>Given configuration A and configuration B, it should be possible to
   generate the operations necessary to get from A to B with minimal
   state changes and effects on network and systems. It is important to
   minimize the impact caused by configuration changes.</t>
        <t>A Protocol Designer should consider the configurable items that exist
   for the control of function via the protocol elements described in
   the protocol specification. For example, sometimes the protocol
   requires that timers can be configured by the operator to ensure
   specific policy-based behavior by the implementation. These timers
   should have default values suggested in the protocol specification
   and may not need to be otherwise configurable.</t>
        <section anchor="sec-mgmt-verify">
          <name>Verifying Correct Operation</name>
          <t>An important function that should be provided is guidance on how to
   verify the correct operation of a protocol. A Protocol Designer
   could suggest techniques for testing the impact of the protocol on
   the network before it is deployed as well as techniques for testing
   the effect that the protocol has had on the network after being
   deployed.</t>
          <t>Protocol Designers should consider how to test the correct end-to-end
   operation of the service or network, how to verify the correct
   functioning of the protocol, and whether that is verified by testing
   the service function and/or by testing the forwarding function of
   each network element. This may be achieved through status and
   statistical information gathered from devices.</t>
        </section>
      </section>
      <section anchor="sec-acc-mgmt">
        <name>Accounting Management</name>
        <t>A Protocol Designer should consider whether it would be appropriate
   to collect usage information related to this protocol and, if so,
   what usage information would be appropriate to collect.</t>
        <t>"Introduction to Accounting Management" <xref target="RFC2975"/> discusses a number
   of factors relevant to monitoring usage of protocols for purposes of
   capacity and trend analysis, cost allocation, auditing, and billing.
   The document also discusses how some existing protocols can be used
   for these purposes. These factors should be considered when
   designing a protocol whose usage might need to be monitored or when
   recommending a protocol to do usage accounting.</t>
      </section>
      <section anchor="sec-perf-mgmt">
        <name>Performance Management</name>
        <t>From a manageability point of view, it is important to determine how
   well a network deploying the protocol or technology defined in the
   document is doing. In order to do this, the network operators need
   to consider information that would be useful to determine the
   performance characteristics of a deployed system using the target
   protocol.</t>
        <t>The IETF, via the Benchmarking Methodology WG (BMWG), has defined
   recommendations for the measurement of the performance
   characteristics of various internetworking technologies in a
   laboratory environment, including the systems or services that are
   built from these technologies. Each benchmarking recommendation
   describes the class of equipment, system, or service being addressed;
   discusses the performance characteristics that are pertinent to that
   class; clearly identifies a set of metrics that aid in the
   description of those characteristics; specifies the methodologies
   required to collect said metrics; and lastly, presents the
   requirements for the common, unambiguous reporting of benchmarking
   results. Search for "benchmark" in the RFC search tool.</t>
        <t>Performance metrics may be useful in multiple environments and for
   different protocols. The IETF, via the IP Performance Monitoring
   (IPPM) WG, has developed a set of standard metrics that can be
   applied to the quality, performance, and reliability of Internet data
   delivery services. These metrics are designed such that they can be
   performed by network operators, end users, or independent testing
   groups. The existing metrics might be applicable to the new
   protocol. Search for "metric" in the RFC search tool. In some
   cases, new metrics need to be defined. It would be useful if the
   protocol documentation identified the need for such new metrics. For
   performance monitoring, it is often more important to report the time
   spent in a state rather than just the current state. Snapshots alone
   are typically of less value.</t>
        <t>There are several parts to performance management to be considered:
   protocol monitoring, device monitoring (the impact of the new
   protocol / service activation on the device), network monitoring,
   and service monitoring (the impact of service activation on the
   network). Hence, it is recommended that, if the implementation of the
   new Protocol Extension has any hardware/software performance implications
   (e.g., increased CPU utilization, memory consumption, or forwarding
   performance degradation), the Protocol Designers should clearly
   describe these impacts in the specification, along with any
   conditions under which they may occur and possible mitigation
   strategies.</t>
        <section anchor="sec-monitor-proto">
          <name>Monitoring the Protocol</name>
          <t>Certain properties of protocols are useful to monitor. The number of
   protocol packets received, the number of packets sent, and the number
   of packets dropped are usually very helpful to operators.</t>
          <t>Packet drops should be reflected in counter variable(s) somewhere
   that can be inspected -- both from the security point of view and
   from the troubleshooting point of view.</t>
          <t>Counter definitions should be unambiguous about what is included in
   the count and what is not included in the count.</t>
          <t>Consider the expected behaviors for counters -- what is a reasonable
   maximum value for expected usage? Should they stop counting at the
   maximum value and retain it, or should they rollover?
   Guidance should explain how rollovers are detected, including multiple
   occurrences.</t>
          <t>Consider whether multiple management applications will share a
   counter; if so, then no one management application should be allowed
   to reset the value to zero since this will impact other applications.</t>
          <t>Could events, such as hot-swapping a blade in a chassis, cause
   discontinuities in counter? Does this make any difference in
   evaluating the performance of a protocol?</t>
          <t>The protocol specification should clearly define any inherent
   limitations and describe expected behavior when those limits
   are exceeded. These considerations should be made independently
   of any specific management protocol or data modeling language.
   In other words, focus on what makes sense for the protocol being
   managed, not the protocol used for management. If a constraint
   is not specific to a management protocol, then it should be left
   to Data Model designers of that protocol to determine how to handle it.
   For example, VLAN identifiers are defined by standard to range
   from 1 to 4094. Therefore, a YANG "vlan-id" definition representing the
   12-bit VLAN ID used in the VLAN Tag header uses a range of "1..4094".</t>
        </section>
        <section anchor="sec-monitor-dev">
          <name>Monitoring the Device</name>
          <t>Consider whether device performance will be affected by the number of
   protocol entities being instantiated on the device. Designers of an
   Information Model should include information, accessible at runtime,
   about the maximum number of instances an implementation can support,
   the current number of instances, and the expected behavior when the
   current instances exceed the capacity of the implementation or the
   capacity of the device.</t>
          <t>Designers of an Information Model should model information,
   accessible at runtime, about the maximum number of protocol entity
   instances an implementation can support on a device, the current
   number of instances, and the expected behavior when the current
   instances exceed the capacity of the device.</t>
        </section>
        <section anchor="sec-monitor-net">
          <name>Monitoring the Network</name>
          <t>Consider whether network performance will be affected by the number
   of protocol entities being deployed.</t>
          <t>Consider the capability of determining the operational activity, such
   as the number of messages in and the messages out, the number of
   received messages rejected due to format Problems, and the expected
   behaviors when a malformed message is received.</t>
          <t>What are the principal performance factors that need to be considered
   when measuring the operational performance of a network built using
   the protocol? Is it important to measure setup times, end-to-end
   connectivity, hop-by-hop connectivity, or network throughput?</t>
        </section>
        <section anchor="sec-monitor-svc">
          <name>Monitoring the Service</name>
          <t>What are the principal performance factors that need to be considered
   when measuring the performance of a service using the protocol? Is
   it important to measure application-specific throughput, client-server
   associations, end-to-end application quality, service interruptions,
   or user experience (UX)?</t>
        </section>
      </section>
      <section anchor="sec-security-mgmt">
        <name>Security Management</name>
        <t>Protocol Designers should consider how to monitor and manage security
   aspects and vulnerabilities of the New Protocol or Protocol Extension.</t>
        <t>There will be security considerations related to the New Protocol.
   To make it possible for operators to be aware of security-related
   events, it is recommended that system logs should record events, such
   as failed logins, but the logs must be secured.</t>
        <t>Should a system automatically notify operators of every event
   occurrence, or should an operator-defined threshold control when a
   notification is sent to an operator?</t>
        <t>Should certain statistics be collected about the operation of the new
   protocol that might be useful for detecting attacks, such as the
   receipt of malformed messages, messages out of order, or messages
   with invalid timestamps? If such statistics are collected, is it
   important to count them separately for each sender to help identify
   the source of attacks?</t>
        <t>Security-oriented manageability topics may include risks of insufficient
   monitoring, regulatory issues with missing audit trails, log capacity
   limits, and security exposures in recommended management mechanisms.</t>
        <t>Consider security threats that may be introduced by management
   operations. For example, Control and Provisioning of Wireless Access
   Points (CAPWAP) breaks the structure of monolithic Access Points
   (APs) into Access Controllers and Wireless Termination Points (WTPs).
   By using a control protocol or management protocol, internal
   information that was previously not accessible is now exposed over
   the network and to management applications and may become a source of
   potential security threats.</t>
        <t>The granularity of access control needed on management interfaces
   needs to match operational needs. Typical requirements are a role-
   based access control model and the principle of least privilege,
   where a user can be given only the minimum access necessary to
   perform a required task.</t>
        <t>Some operators wish to do consistency checks of access control lists
   across devices. Protocol Designers should consider information
   models to promote comparisons across devices and across vendors to
   permit checking the consistency of security configurations.</t>
        <t>Protocol Designers should consider how to provide a secure transport,
   authentication, identity, and access control that integrates well
   with existing key and credential management infrastructure. It is a
   good idea to start with defining the threat model for the protocol,
   and from that deducing what is required.</t>
        <t>Protocol Designers should consider how access control lists are
   maintained and updated.</t>
        <t>Standard SNMP notifications or syslog messages might
   already exist, or can be defined, to alert operators to the
   conditions identified in the security considerations for the new
   protocol. For example, you can log all the commands entered by the
   operator using syslog (giving you some degree of audit trail), or you
   can see who has logged on/off using the Secure Shell (SSH) Protocol <xref target="RFC4251"/>
   and from where; failed SSH logins can be logged using syslog, etc.</t>
        <t>An analysis of existing counters might help operators recognize the
   conditions identified in the security considerations for the new
   protocol before they can impact the network.</t>
        <t>Different management protocols use different assumptions about
   message security and data-access controls. A Protocol Designer that
   recommends using different protocols should consider how security
   will be applied in a balanced manner across multiple management
   interfaces. SNMP authority levels and policy are data-oriented,
   while CLI authority levels and policy are usually command-oriented
   (i.e., task-oriented). Depending on the management function,
   sometimes data-oriented or task-oriented approaches make more sense.
   Protocol Designers should consider both data-oriented and task-
   oriented authority levels and policy.</t>
      </section>
    </section>
    <section anchor="sec-oper-mgmt-tooling">
      <name>Operational and Management Tooling Considerations</name>
      <t>The operational community's ability to effectively adopt and
   use new specifications is significantly influenced by the availability
   and adaptability of appropriate tooling. In this context, "tools" refers
   to software systems or utilities used by network operators to deploy,
   configure, monitor, troubleshoot, and manage networks or network protocols
   in real-world operational environments. While the introduction of a new
   specification does not automatically mandate the development of entirely
   new tools, careful consideration must be given to how existing tools can be
   leveraged or extended to support the management and operation of these new
   specifications.</t>
      <t>The <xref target="NEMOPS"/> workshop highlighted a
   consistent theme applicable beyond network management protocols: the
   "ease of use" and adaptability of existing tools are critical factors
   for successful adoption. Therefore, a new specification should provide
   examples using existing, common tooling, or running code that demonstrate
   how to perform key operational tasks.</t>
      <t>Specifically, the following tooling-related aspects should be considered,
   prioritizing the adaptation of existing tools:</t>
      <ul spacing="normal">
        <li>
          <t>Leveraging Existing Tooling: Before considering new tools, assess whether
existing tooling, such as monitoring systems, logging platforms,
configuration management systems, and/or orchestration frameworks, can be
adapted to support the new specification. This may involve developing
plugins, modules, or drivers that enable these tools to interact with
the new specification.</t>
        </li>
        <li>
          <t>Extending Existing Tools: Identify areas where existing tools can be
extended to provide the necessary visibility and control over the new
specification. For example, if a new transport protocol is introduced,
consider whether existing network monitoring tools can be extended to
track its performance metrics or whether existing security tools can be
adapted to analyze its traffic patterns.</t>
        </li>
        <li>
          <t>New Tools: Only when existing tools are demonstrably
inadequate for managing and operating the elements of the new specification
should the development of new tools be considered. In such cases,
carefully define the specific requirements for these new tools, focusing
on the functionalities that cannot be achieved through adaptation or
extension of existing solutions.</t>
        </li>
        <li>
          <t>IETF Hackathons for Manageability Testing:
IETF Hackathons <xref target="IETF-HACKATHONS"/>
provide an opportunity to test the functionality, interoperability,
and manageability of New Protocols. These events can be specifically
leveraged to assess the operational (including manageability) implications
of a New Protocol by focusing tasks on:  </t>
          <ul spacing="normal">
            <li>
              <t>Adapting existing tools to interact with the new specification.</t>
            </li>
            <li>
              <t>Developing example management scripts or modules for existing management
platforms.</t>
            </li>
            <li>
              <t>Testing the specification's behavior under various operational conditions.</t>
            </li>
            <li>
              <t>Identifying potential tooling gaps and areas for improvement.</t>
            </li>
            <li>
              <t>Creating example flows and use cases for manageability.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Open-Source for Tooling: If new tools are deemed necessary, or if significant
adaptations to existing tools are required, prioritize open-source development
with community involvement. Open-source tools lower the barrier to entry,
encourage collaboration, and provide operators with the flexibility to customize
and extend the tools to meet their specific needs.</t>
        </li>
      </ul>
      <section anchor="sec-ai-tooling">
        <name>AI Tooling Considerations</name>
        <t>With the increasing adoption of Artificial Intelligence (AI)
   in network operations, Protocol Designers
   must consider the implication such functions may have on protocols
   and protocol extensions. AI
   models often require extensive and granular data for training and
   inference, requiring efficient, scalable, and secure mechanisms
   for telemetry, logging, and state information collection. Protocol Designers
   should anticipate that AI-powered management tools may generate
   frequent and potentially aggressive querying patterns on network
   devices and controllers. Therefore, protocols should be designed with data
   models and mechanisms intended to prevent overload from automated
   interactions, while also accounting for AI-specific security
   considerations such as data integrity and protection against
   adversarial attacks on management interfaces. These considerations
   are also relevant to Performance Management (Section <xref format="counter" target="sec-perf-mgmt"/>)
   and Security Management (Section <xref format="counter" target="sec-security-mgmt"/>).</t>
      </section>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not have any IANA actions required.</t>
    </section>
    <section anchor="sec-oper-mgmt-consid">
      <name>Operational Considerations</name>
      <t>Although this document focuses on operations and manageability guidance, it does not define a New Protocol, a Protocol Extension, or an architecture. As such, there are no new operations or manageability requirements introduced by this document.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>This document provides guidelines for
   considering manageability and operations. It introduces no new
   security concerns.</t>
      <t>The provision of a management portal to a network device provides a
   doorway through which an attack on the device may be launched.
   Making the protocol under development be manageable through a
   management protocol creates a vulnerability to a new source of
   attacks. Only management protocols with adequate security apparatus,
   such as authentication, message integrity checking, and
   authorization, should be used.</t>
      <t>While a standard description of a protocol's manageable parameters facilitates
   legitimate operation, it may also inadvertently simplify an attacker's efforts
   to understand and manipulate the protocol.</t>
      <t>A well-designed protocol is usually more stable and secure. A
   protocol that can be managed and inspected offers the operator a
   better chance of spotting and quarantining any attacks. Conversely,
   making a protocol easy to inspect is a risk if the wrong person
   inspects it.</t>
      <t>If security events cause logs and/or notifications/alerts, a
   concerted attack might be able to be mounted by causing an excess of
   these events. In other words, the security-management mechanisms
   could constitute a security vulnerability. The management of
   security aspects is important (see <xref target="sec-security-mgmt"/>).</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="CHECKLIST" target="https://github.com/IETF-OPS-DIR/Review-Template/tree/main">
        <front>
          <title>Operations and Management Review Checklist</title>
          <author>
            <organization/>
          </author>
          <date year="2025"/>
        </front>
      </reference>
      <reference anchor="IETF-OPS-Dir" target="https://datatracker.ietf.org/group/opsdir/about/">
        <front>
          <title>Ops Directorate (opsdir)</title>
          <author>
            <organization/>
          </author>
          <date year="2025"/>
        </front>
      </reference>
      <reference anchor="IETF-HACKATHONS" target="https://www.ietf.org/meeting/hackathons/">
        <front>
          <title>IETF Hackathons</title>
          <author>
            <organization>IETF</organization>
          </author>
          <date year="2025" month="May" day="01"/>
        </front>
      </reference>
      <reference anchor="IESG-STATEMENT" target="https://datatracker.ietf.org/doc/statement-iesg-writable-mib-module-iesg-statement-20140302/">
        <front>
          <title>Writable MIB Module IESG Statement</title>
          <author>
            <organization>IESG</organization>
          </author>
          <date year="2014" month="March" day="02"/>
        </front>
      </reference>
      <reference anchor="NEMOPS-WORKSHOP" target="https://datatracker.ietf.org/group/nemopsws/about/">
        <front>
          <title>IAB workshop on the Next Era of Network Management Operations</title>
          <author>
            <organization>IAB</organization>
          </author>
          <date year="2024" month="December"/>
        </front>
      </reference>
      <reference anchor="RFC5706">
        <front>
          <title>Guidelines for Considering Operations and Management of New Protocols and Protocol Extensions</title>
          <author fullname="D. Harrington" initials="D." surname="Harrington"/>
          <date month="November" year="2009"/>
          <abstract>
            <t>New protocols or protocol extensions are best designed with due consideration of the functionality needed to operate and manage the protocols. Retrofitting operations and management is sub-optimal. The purpose of this document is to provide guidance to authors and reviewers of documents that define new protocols or protocol extensions regarding aspects of operations and management that should be considered. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5706"/>
        <seriesInfo name="DOI" value="10.17487/RFC5706"/>
      </reference>
      <referencegroup anchor="BCP72" target="https://www.rfc-editor.org/info/bcp72">
        <reference anchor="RFC3552" target="https://www.rfc-editor.org/info/rfc3552">
          <front>
            <title>Guidelines for Writing RFC Text on Security Considerations</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="B. Korver" initials="B." surname="Korver"/>
            <date month="July" year="2003"/>
            <abstract>
              <t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak. This document provides guidelines to RFC authors on how to write a good Security Considerations section. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="72"/>
          <seriesInfo name="RFC" value="3552"/>
          <seriesInfo name="DOI" value="10.17487/RFC3552"/>
        </reference>
        <reference anchor="RFC9416" target="https://www.rfc-editor.org/info/rfc9416">
          <front>
            <title>Security Considerations for Transient Numeric Identifiers Employed in Network Protocols</title>
            <author fullname="F. Gont" initials="F." surname="Gont"/>
            <author fullname="I. Arce" initials="I." surname="Arce"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>Poor selection of transient numerical identifiers in protocols such as the TCP/IP suite has historically led to a number of attacks on implementations, ranging from Denial of Service (DoS) or data injection to information leakages that can be exploited by pervasive monitoring. Due diligence in the specification of transient numeric identifiers is required even when cryptographic techniques are employed, since these techniques might not mitigate all the associated issues. This document formally updates RFC 3552, incorporating requirements for transient numeric identifiers, to prevent flaws in future protocols and implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="72"/>
          <seriesInfo name="RFC" value="9416"/>
          <seriesInfo name="DOI" value="10.17487/RFC9416"/>
        </reference>
      </referencegroup>
      <referencegroup anchor="BCP14" target="https://www.rfc-editor.org/info/bcp14">
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </referencegroup>
      <reference anchor="I-D.ietf-nmop-terminology">
        <front>
          <title>Some Key Terms for Network Fault and Problem Management</title>
          <author fullname="Nigel Davis" initials="N." surname="Davis">
            <organization>Ciena</organization>
          </author>
          <author fullname="Adrian Farrel" initials="A." surname="Farrel">
            <organization>Old Dog Consulting</organization>
          </author>
          <author fullname="Thomas Graf" initials="T." surname="Graf">
            <organization>Swisscom</organization>
          </author>
          <author fullname="Qin Wu" initials="Q." surname="Wu">
            <organization>Huawei</organization>
          </author>
          <author fullname="Chaode Yu" initials="C." surname="Yu">
            <organization>Huawei Technologies</organization>
          </author>
          <date day="18" month="August" year="2025"/>
          <abstract>
            <t>   This document sets out some terms that are fundamental to a common
   understanding of network fault and problem management within the
   IETF.

   The purpose of this document is to bring clarity to discussions and
   other work related to network fault and problem management, in
   particular to YANG data models and management protocols that report,
   make visible, or manage network faults and problems.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-terminology-23"/>
      </reference>
      <reference anchor="RFC3444">
        <front>
          <title>On the Difference between Information Models and Data Models</title>
          <author fullname="A. Pras" initials="A." surname="Pras"/>
          <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
          <date month="January" year="2003"/>
          <abstract>
            <t>There has been ongoing confusion about the differences between Information Models and Data Models for defining managed objects in network management. This document explains the differences between these terms by analyzing how existing network management model specifications (from the IETF and other bodies such as the International Telecommunication Union (ITU) or the Distributed Management Task Force (DMTF)) fit into the universe of Information Models and Data Models. This memo documents the main results of the 8th workshop of the Network Management Research Group (NMRG) of the Internet Research Task Force (IRTF) hosted by the University of Texas at Austin. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3444"/>
        <seriesInfo name="DOI" value="10.17487/RFC3444"/>
      </reference>
      <reference anchor="RFC6291">
        <front>
          <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
          <author fullname="L. Andersson" initials="L." surname="Andersson"/>
          <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
          <author fullname="R. Bonica" initials="R." surname="Bonica"/>
          <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
          <author fullname="S. Mansfield" initials="S." surname="Mansfield"/>
          <date month="June" year="2011"/>
          <abstract>
            <t>At first glance, the acronym "OAM" seems to be well-known and well-understood. Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
            <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM. There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term. This memo documents an Internet Best Current Practice.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="161"/>
        <seriesInfo name="RFC" value="6291"/>
        <seriesInfo name="DOI" value="10.17487/RFC6291"/>
      </reference>
      <reference anchor="I-D.ietf-opsawg-oam-characterization">
        <front>
          <title>Guidelines for Characterizing "OAM"</title>
          <author fullname="Carlos Pignataro" initials="C." surname="Pignataro">
            <organization>Blue Fern
      Consulting</organization>
          </author>
          <author fullname="Adrian Farrel" initials="A." surname="Farrel">
            <organization>Old Dog Consulting</organization>
          </author>
          <author fullname="Tal Mizrahi" initials="T." surname="Mizrahi">
            <organization>Huawei</organization>
          </author>
          <date day="13" month="August" year="2025"/>
          <abstract>
            <t>   As the IETF continues to produce and standardize different
   Operations, Administration, and Maintenance (OAM) protocols and
   technologies, various qualifiers and modifiers are prepended to the
   OAM abbreviation.  While, at first glance, the most used appear to be
   well understood, the same qualifier may be interpreted differently in
   different contexts.  A case in point is the qualifiers "in-band" and
   "out-of-band" which have their origins in the radio lexicon, and
   which have been extrapolated into other communication networks.

   This document considers some common qualifiers and modifiers that are
   prepended, within the context of packet networks, to the OAM
   abbreviation and lays out guidelines for their use in future IETF
   work.

   This document updates RFC 6291 by adding to the guidelines for the
   use of the term "OAM".  It does not modify any other part of RFC
   6291.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-oam-characterization-10"/>
      </reference>
      <reference anchor="I-D.ietf-nmop-network-incident-yang">
        <front>
          <title>A YANG Data Model for Network Incident Management</title>
          <author fullname="Tong Hu" initials="T." surname="Hu">
            <organization>CMCC</organization>
          </author>
          <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
            <organization>Telefonica</organization>
          </author>
          <author fullname="Qin Wu" initials="Q." surname="Wu">
            <organization>Huawei</organization>
          </author>
          <author fullname="Nigel Davis" initials="N." surname="Davis">
            <organization>Ciena</organization>
          </author>
          <author fullname="Chong Feng" initials="C." surname="Feng">
         </author>
          <date day="6" month="July" year="2025"/>
          <abstract>
            <t>   A network incident refers to an unexpected interruption of a network
   service, degradation of a network service quality, or sub-health of a
   network service.  Different data sources including alarms, metrics,
   and other anomaly information can be aggregated into a few of network
   incidents through data correlation analysis and the service impact
   analysis.

   This document defines a YANG Module for the network incident
   lifecycle management.  This YANG module is meant to provide a
   standard way to report, diagnose, and help resolve network incidents
   for the sake of network service health and probable cause analysis.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-network-incident-yang-05"/>
      </reference>
      <reference anchor="RFC2439">
        <front>
          <title>BGP Route Flap Damping</title>
          <author fullname="C. Villamizar" initials="C." surname="Villamizar"/>
          <author fullname="R. Chandra" initials="R." surname="Chandra"/>
          <author fullname="R. Govindan" initials="R." surname="Govindan"/>
          <date month="November" year="1998"/>
          <abstract>
            <t>A usage of the BGP routing protocol is described which is capable of reducing the routing traffic passed on to routing peers and therefore the load on these peers without adversely affecting route convergence time for relatively stable routes. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2439"/>
        <seriesInfo name="DOI" value="10.17487/RFC2439"/>
      </reference>
      <reference anchor="RFC1958">
        <front>
          <title>Architectural Principles of the Internet</title>
          <author fullname="B. Carpenter" initials="B." role="editor" surname="Carpenter"/>
          <date month="June" year="1996"/>
          <abstract>
            <t>The Internet and its architecture have grown in evolutionary fashion from modest beginnings, rather than from a Grand Plan. While this process of evolution is one of the main reasons for the technology's success, it nevertheless seems useful to record a snapshot of the current principles of the Internet architecture. This is intended for general guidance and general interest, and is in no way intended to be a formal or invariant reference model. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="1958"/>
        <seriesInfo name="DOI" value="10.17487/RFC1958"/>
      </reference>
      <reference anchor="RFC6298">
        <front>
          <title>Computing TCP's Retransmission Timer</title>
          <author fullname="V. Paxson" initials="V." surname="Paxson"/>
          <author fullname="M. Allman" initials="M." surname="Allman"/>
          <author fullname="J. Chu" initials="J." surname="Chu"/>
          <author fullname="M. Sargent" initials="M." surname="Sargent"/>
          <date month="June" year="2011"/>
          <abstract>
            <t>This document defines the standard algorithm that Transmission Control Protocol (TCP) senders are required to use to compute and manage their retransmission timer. It expands on the discussion in Section 4.2.3.1 of RFC 1122 and upgrades the requirement of supporting the algorithm from a SHOULD to a MUST. This document obsoletes RFC 2988. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6298"/>
        <seriesInfo name="DOI" value="10.17487/RFC6298"/>
      </reference>
      <reference anchor="I-D.ietf-lamps-dilithium-certificates">
        <front>
          <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
          <author fullname="Jake Massimo" initials="J." surname="Massimo">
            <organization>AWS</organization>
          </author>
          <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
            <organization>AWS</organization>
          </author>
          <author fullname="Sean Turner" initials="S." surname="Turner">
            <organization>sn3rd</organization>
          </author>
          <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
            <organization>Cloudflare</organization>
          </author>
          <date day="26" month="June" year="2025"/>
          <abstract>
            <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-12"/>
      </reference>
      <reference anchor="RFC2205">
        <front>
          <title>Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification</title>
          <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
          <author fullname="L. Zhang" initials="L." surname="Zhang"/>
          <author fullname="S. Berson" initials="S." surname="Berson"/>
          <author fullname="S. Herzog" initials="S." surname="Herzog"/>
          <author fullname="S. Jamin" initials="S." surname="Jamin"/>
          <date month="September" year="1997"/>
          <abstract>
            <t>This memo describes version 1 of RSVP, a resource reservation setup protocol designed for an integrated services Internet. RSVP provides receiver-initiated setup of resource reservations for multicast or unicast data flows, with good scaling and robustness properties. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2205"/>
        <seriesInfo name="DOI" value="10.17487/RFC2205"/>
      </reference>
      <reference anchor="RFC2113">
        <front>
          <title>IP Router Alert Option</title>
          <author fullname="D. Katz" initials="D." surname="Katz"/>
          <date month="February" year="1997"/>
          <abstract>
            <t>This memo describes a new IP Option type that alerts transit routers to more closely examine the contents of an IP packet. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2113"/>
        <seriesInfo name="DOI" value="10.17487/RFC2113"/>
      </reference>
      <reference anchor="RFC2711">
        <front>
          <title>IPv6 Router Alert Option</title>
          <author fullname="C. Partridge" initials="C." surname="Partridge"/>
          <author fullname="A. Jackson" initials="A." surname="Jackson"/>
          <date month="October" year="1999"/>
          <abstract>
            <t>This memo describes a new IPv6 Hop-by-Hop Option type that alerts transit routers to more closely examine the contents of an IP datagram. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2711"/>
        <seriesInfo name="DOI" value="10.17487/RFC2711"/>
      </reference>
      <reference anchor="RFC8799">
        <front>
          <title>Limited Domains and Internet Protocols</title>
          <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
          <author fullname="B. Liu" initials="B." surname="Liu"/>
          <date month="July" year="2020"/>
          <abstract>
            <t>There is a noticeable trend towards network behaviors and semantics that are specific to a particular set of requirements applied within a limited region of the Internet. Policies, default parameters, the options supported, the style of network management, and security requirements may vary between such limited regions. This document reviews examples of such limited domains (also known as controlled environments), notes emerging solutions, and includes a related taxonomy. It then briefly discusses the standardization of protocols for limited domains. Finally, it shows the need for a precise definition of "limited domain membership" and for mechanisms to allow nodes to join a domain securely and to find other members, including boundary nodes.</t>
            <t>This document is the product of the research of the authors. It has been produced through discussions and consultation within the IETF but is not the product of IETF consensus.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8799"/>
        <seriesInfo name="DOI" value="10.17487/RFC8799"/>
      </reference>
      <referencegroup anchor="BCP133" target="https://www.rfc-editor.org/info/bcp133">
        <reference anchor="RFC9743" target="https://www.rfc-editor.org/info/rfc9743">
          <front>
            <title>Specifying New Congestion Control Algorithms</title>
            <author fullname="M. Duke" initials="M." role="editor" surname="Duke"/>
            <author fullname="G. Fairhurst" initials="G." role="editor" surname="Fairhurst"/>
            <date month="March" year="2025"/>
            <abstract>
              <t>RFC 5033 discusses the principles and guidelines for standardizing new congestion control algorithms. This document obsoletes RFC 5033 to reflect changes in the congestion control landscape by providing a framework for the development and assessment of congestion control mechanisms, promoting stability across diverse network paths. This document seeks to ensure that proposed congestion control algorithms operate efficiently and without harm when used in the global Internet. It emphasizes the need for comprehensive testing and validation to prevent adverse interactions with existing flows.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="133"/>
          <seriesInfo name="RFC" value="9743"/>
          <seriesInfo name="DOI" value="10.17487/RFC9743"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC1034">
        <front>
          <title>Domain names - concepts and facilities</title>
          <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
          <date month="November" year="1987"/>
          <abstract>
            <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="13"/>
        <seriesInfo name="RFC" value="1034"/>
        <seriesInfo name="DOI" value="10.17487/RFC1034"/>
      </reference>
      <reference anchor="RFC5321">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin"/>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
      <reference anchor="RFC6632">
        <front>
          <title>An Overview of the IETF Network Management Standards</title>
          <author fullname="M. Ersue" initials="M." role="editor" surname="Ersue"/>
          <author fullname="B. Claise" initials="B." surname="Claise"/>
          <date month="June" year="2012"/>
          <abstract>
            <t>This document gives an overview of the IETF network management standards and summarizes existing and ongoing development of IETF Standards Track network management protocols and data models. The document refers to other overview documents, where they exist and classifies the standards for easy orientation. The purpose of this document is, on the one hand, to help system developers and users to select appropriate standard management protocols and data models to address relevant management needs. On the other hand, the document can be used as an overview and guideline by other Standard Development Organizations or bodies planning to use IETF management technologies and data models. This document does not cover Operations, Administration, and Maintenance (OAM) technologies on the data-path, e.g., OAM of tunnels, MPLS Transport Profile (MPLS-TP) OAM, and pseudowire as well as the corresponding management models. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6632"/>
        <seriesInfo name="DOI" value="10.17487/RFC6632"/>
      </reference>
      <reference anchor="RFC2865">
        <front>
          <title>Remote Authentication Dial In User Service (RADIUS)</title>
          <author fullname="C. Rigney" initials="C." surname="Rigney"/>
          <author fullname="S. Willens" initials="S." surname="Willens"/>
          <author fullname="A. Rubens" initials="A." surname="Rubens"/>
          <author fullname="W. Simpson" initials="W." surname="Simpson"/>
          <date month="June" year="2000"/>
          <abstract>
            <t>This document describes a protocol for carrying authentication, authorization, and configuration information between a Network Access Server which desires to authenticate its links and a shared Authentication Server. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2865"/>
        <seriesInfo name="DOI" value="10.17487/RFC2865"/>
      </reference>
      <reference anchor="RFC5424">
        <front>
          <title>The Syslog Protocol</title>
          <author fullname="R. Gerhards" initials="R." surname="Gerhards"/>
          <date month="March" year="2009"/>
          <abstract>
            <t>This document describes the syslog protocol, which is used to convey event notification messages. This protocol utilizes a layered architecture, which allows the use of any number of transport protocols for transmission of syslog messages. It also provides a message format that allows vendor-specific extensions to be provided in a structured way.</t>
            <t>This document has been written with the original design goals for traditional syslog in mind. The need for a new layered specification has arisen because standardization efforts for reliable and secure syslog extensions suffer from the lack of a Standards-Track and transport-independent RFC. Without this document, each other standard needs to define its own syslog packet format and transport mechanism, which over time will introduce subtle compatibility issues. This document tries to provide a foundation that syslog extensions can build on. This layered architecture approach also provides a solid basis that allows code to be written once for each syslog feature rather than once for each transport. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5424"/>
        <seriesInfo name="DOI" value="10.17487/RFC5424"/>
      </reference>
      <reference anchor="RFC5476">
        <front>
          <title>Packet Sampling (PSAMP) Protocol Specifications</title>
          <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
          <author fullname="A. Johnson" initials="A." surname="Johnson"/>
          <author fullname="J. Quittek" initials="J." surname="Quittek"/>
          <date month="March" year="2009"/>
          <abstract>
            <t>This document specifies the export of packet information from a Packet SAMPling (PSAMP) Exporting Process to a PSAMP Collecting Process. For export of packet information, the IP Flow Information eXport (IPFIX) protocol is used, as both the IPFIX and PSAMP architecture match very well, and the means provided by the IPFIX protocol are sufficient. The document specifies in detail how the IPFIX protocol is used for PSAMP export of packet information. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5476"/>
        <seriesInfo name="DOI" value="10.17487/RFC5476"/>
      </reference>
      <reference anchor="RFC6241">
        <front>
          <title>Network Configuration Protocol (NETCONF)</title>
          <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
          <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
          <date month="June" year="2011"/>
          <abstract>
            <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6241"/>
        <seriesInfo name="DOI" value="10.17487/RFC6241"/>
      </reference>
      <reference anchor="RFC6733">
        <front>
          <title>Diameter Base Protocol</title>
          <author fullname="V. Fajardo" initials="V." role="editor" surname="Fajardo"/>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="J. Loughney" initials="J." surname="Loughney"/>
          <author fullname="G. Zorn" initials="G." role="editor" surname="Zorn"/>
          <date month="October" year="2012"/>
          <abstract>
            <t>The Diameter base protocol is intended to provide an Authentication, Authorization, and Accounting (AAA) framework for applications such as network access or IP mobility in both local and roaming situations. This document specifies the message format, transport, error reporting, accounting, and security services used by all Diameter applications. The Diameter base protocol as defined in this document obsoletes RFC 3588 and RFC 5719, and it must be supported by all new Diameter implementations. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6733"/>
        <seriesInfo name="DOI" value="10.17487/RFC6733"/>
      </reference>
      <reference anchor="RFC7011">
        <front>
          <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
          <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
          <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
          <author fullname="P. Aitken" initials="P." surname="Aitken"/>
          <date month="September" year="2013"/>
          <abstract>
            <t>This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network. In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required. This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process. This document obsoletes RFC 5101.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="77"/>
        <seriesInfo name="RFC" value="7011"/>
        <seriesInfo name="DOI" value="10.17487/RFC7011"/>
      </reference>
      <reference anchor="RFC7854">
        <front>
          <title>BGP Monitoring Protocol (BMP)</title>
          <author fullname="J. Scudder" initials="J." role="editor" surname="Scudder"/>
          <author fullname="R. Fernando" initials="R." surname="Fernando"/>
          <author fullname="S. Stuart" initials="S." surname="Stuart"/>
          <date month="June" year="2016"/>
          <abstract>
            <t>This document defines the BGP Monitoring Protocol (BMP), which can be used to monitor BGP sessions. BMP is intended to provide a convenient interface for obtaining route views. Prior to the introduction of BMP, screen scraping was the most commonly used approach to obtaining such views. The design goals are to keep BMP simple, useful, easily implemented, and minimally service affecting. BMP is not suitable for use as a routing protocol.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7854"/>
        <seriesInfo name="DOI" value="10.17487/RFC7854"/>
      </reference>
      <reference anchor="RFC8040">
        <front>
          <title>RESTCONF Protocol</title>
          <author fullname="A. Bierman" initials="A." surname="Bierman"/>
          <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
          <author fullname="K. Watsen" initials="K." surname="Watsen"/>
          <date month="January" year="2017"/>
          <abstract>
            <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8040"/>
        <seriesInfo name="DOI" value="10.17487/RFC8040"/>
      </reference>
      <reference anchor="RFC9232">
        <front>
          <title>Network Telemetry Framework</title>
          <author fullname="H. Song" initials="H." surname="Song"/>
          <author fullname="F. Qin" initials="F." surname="Qin"/>
          <author fullname="P. Martinez-Julia" initials="P." surname="Martinez-Julia"/>
          <author fullname="L. Ciavaglia" initials="L." surname="Ciavaglia"/>
          <author fullname="A. Wang" initials="A." surname="Wang"/>
          <date month="May" year="2022"/>
          <abstract>
            <t>Network telemetry is a technology for gaining network insight and facilitating efficient and automated network management. It encompasses various techniques for remote data generation, collection, correlation, and consumption. This document describes an architectural framework for network telemetry, motivated by challenges that are encountered as part of the operation of networks and by the requirements that ensue. This document clarifies the terminology and classifies the modules and components of a network telemetry system from different perspectives. The framework and taxonomy help to set a common ground for the collection of related work and provide guidance for related technique and standard developments.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9232"/>
        <seriesInfo name="DOI" value="10.17487/RFC9232"/>
      </reference>
      <reference anchor="RFC3410">
        <front>
          <title>Introduction and Applicability Statements for Internet-Standard Management Framework</title>
          <author fullname="J. Case" initials="J." surname="Case"/>
          <author fullname="R. Mundy" initials="R." surname="Mundy"/>
          <author fullname="D. Partain" initials="D." surname="Partain"/>
          <author fullname="B. Stewart" initials="B." surname="Stewart"/>
          <date month="December" year="2002"/>
          <abstract>
            <t>The purpose of this document is to provide an overview of the third version of the Internet-Standard Management Framework, termed the SNMP version 3 Framework (SNMPv3). This Framework is derived from and builds upon both the original Internet-Standard Management Framework (SNMPv1) and the second Internet-Standard Management Framework (SNMPv2). The architecture is designed to be modular to allow the evolution of the Framework over time. The document explains why using SNMPv3 instead of SNMPv1 or SNMPv2 is strongly recommended. The document also recommends that RFCs 1157, 1441, 1901, 1909 and 1910 be retired by moving them to Historic status. This document obsoletes RFC 2570. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3410"/>
        <seriesInfo name="DOI" value="10.17487/RFC3410"/>
      </reference>
      <referencegroup anchor="STD58" target="https://www.rfc-editor.org/info/std58">
        <reference anchor="RFC2578" target="https://www.rfc-editor.org/info/rfc2578">
          <front>
            <title>Structure of Management Information Version 2 (SMIv2)</title>
            <author fullname="K. McCloghrie" initials="K." role="editor" surname="McCloghrie"/>
            <author fullname="D. Perkins" initials="D." role="editor" surname="Perkins"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <date month="April" year="1999"/>
            <abstract>
              <t>It is the purpose of this document, the Structure of Management Information Version 2 (SMIv2), to define that adapted subset, and to assign a set of associated administrative values. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="58"/>
          <seriesInfo name="RFC" value="2578"/>
          <seriesInfo name="DOI" value="10.17487/RFC2578"/>
        </reference>
        <reference anchor="RFC2579" target="https://www.rfc-editor.org/info/rfc2579">
          <front>
            <title>Textual Conventions for SMIv2</title>
            <author fullname="K. McCloghrie" initials="K." role="editor" surname="McCloghrie"/>
            <author fullname="D. Perkins" initials="D." role="editor" surname="Perkins"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <date month="April" year="1999"/>
            <abstract>
              <t>It is the purpose of this document to define the initial set of textual conventions available to all MIB modules. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="58"/>
          <seriesInfo name="RFC" value="2579"/>
          <seriesInfo name="DOI" value="10.17487/RFC2579"/>
        </reference>
        <reference anchor="RFC2580" target="https://www.rfc-editor.org/info/rfc2580">
          <front>
            <title>Conformance Statements for SMIv2</title>
            <author fullname="K. McCloghrie" initials="K." role="editor" surname="McCloghrie"/>
            <author fullname="D. Perkins" initials="D." role="editor" surname="Perkins"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <date month="April" year="1999"/>
            <abstract>
              <t>Collections of related objects are defined in MIB modules. It may be useful to define the acceptable lower-bounds of implementation, along with the actual level of implementation achieved. It is the purpose of this document to define the notation used for these purposes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="58"/>
          <seriesInfo name="RFC" value="2580"/>
          <seriesInfo name="DOI" value="10.17487/RFC2580"/>
        </reference>
      </referencegroup>
      <reference anchor="W3C.REC-xmlschema-0-20041028" target="https://www.w3.org/TR/2004/REC-xmlschema-0-20041028/">
        <front>
          <title>XML Schema Part 0: Primer Second Edition</title>
          <author fullname="David Fallside" role="editor"/>
          <author fullname="Priscilla Walmsley" role="editor"/>
          <date day="28" month="October" year="2004"/>
        </front>
        <seriesInfo name="W3C REC" value="REC-xmlschema-0-20041028"/>
        <seriesInfo name="W3C" value="REC-xmlschema-0-20041028"/>
      </reference>
      <reference anchor="RFC6020">
        <front>
          <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <date month="October" year="2010"/>
          <abstract>
            <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6020"/>
        <seriesInfo name="DOI" value="10.17487/RFC6020"/>
      </reference>
      <reference anchor="RFC7950">
        <front>
          <title>The YANG 1.1 Data Modeling Language</title>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <date month="August" year="2016"/>
          <abstract>
            <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7950"/>
        <seriesInfo name="DOI" value="10.17487/RFC7950"/>
      </reference>
      <reference anchor="RFC3060">
        <front>
          <title>Policy Core Information Model -- Version 1 Specification</title>
          <author fullname="B. Moore" initials="B." surname="Moore"/>
          <author fullname="E. Ellesson" initials="E." surname="Ellesson"/>
          <author fullname="J. Strassner" initials="J." surname="Strassner"/>
          <author fullname="A. Westerinen" initials="A." surname="Westerinen"/>
          <date month="February" year="2001"/>
          <abstract>
            <t>This document presents the object-oriented information model for representing policy information developed jointly in the IETF Policy Framework WG and as extensions to the Common Information Model (CIM) activity in the Distributed Management Task Force (DMTF). [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3060"/>
        <seriesInfo name="DOI" value="10.17487/RFC3060"/>
      </reference>
      <reference anchor="RFC3290">
        <front>
          <title>An Informal Management Model for Diffserv Routers</title>
          <author fullname="Y. Bernet" initials="Y." surname="Bernet"/>
          <author fullname="S. Blake" initials="S." surname="Blake"/>
          <author fullname="D. Grossman" initials="D." surname="Grossman"/>
          <author fullname="A. Smith" initials="A." surname="Smith"/>
          <date month="May" year="2002"/>
          <abstract>
            <t>This document proposes an informal management model of Differentiated Services (Diffserv) routers for use in their management and configuration. This model defines functional datapath elements (e.g., classifiers, meters, actions, marking, absolute dropping, counting, multiplexing), algorithmic droppers, queues and schedulers. It describes possible configuration parameters for these elements and how they might be interconnected to realize the range of traffic conditioning and per-hop behavior (PHB) functionalities described in the Diffserv Architecture. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3290"/>
        <seriesInfo name="DOI" value="10.17487/RFC3290"/>
      </reference>
      <reference anchor="RFC3460">
        <front>
          <title>Policy Core Information Model (PCIM) Extensions</title>
          <author fullname="B. Moore" initials="B." role="editor" surname="Moore"/>
          <date month="January" year="2003"/>
          <abstract>
            <t>This document specifies a number of changes to the Policy Core Information Model (PCIM, RFC 3060). Two types of changes are included. First, several completely new elements are introduced, for example, classes for header filtering, that extend PCIM into areas that it did not previously cover. Second, there are cases where elements of PCIM (for example, policy rule priorities) are deprecated, and replacement elements are defined (in this case, priorities tied to associations that refer to policy rules). Both types of changes are done in such a way that, to the extent possible, interoperability with implementations of the original PCIM model is preserved. This document updates RFC 3060. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3460"/>
        <seriesInfo name="DOI" value="10.17487/RFC3460"/>
      </reference>
      <reference anchor="RFC3585">
        <front>
          <title>IPsec Configuration Policy Information Model</title>
          <author fullname="J. Jason" initials="J." surname="Jason"/>
          <author fullname="L. Rafalow" initials="L." surname="Rafalow"/>
          <author fullname="E. Vyncke" initials="E." surname="Vyncke"/>
          <date month="August" year="2003"/>
          <abstract>
            <t>This document presents an object-oriented information model of IP Security (IPsec) policy designed to facilitate agreement about the content and semantics of IPsec policy, and enable derivations of task- specific representations of IPsec policy such as storage schema, distribution representations, and policy specification languages used to configure IPsec-enabled endpoints. The information model described in this document models the configuration parameters defined by IPSec. The information model also covers the parameters found by the Internet Key Exchange protocol (IKE). Other key exchange protocols could easily be added to the information model by a simple extension. Further extensions can further be added easily due to the object-oriented nature of the model. This information model is based upon the core policy classes as defined in the Policy Core Information Model (PCIM) and in the Policy Core Information Model Extensions (PCIMe). [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3585"/>
        <seriesInfo name="DOI" value="10.17487/RFC3585"/>
      </reference>
      <reference anchor="RFC3644">
        <front>
          <title>Policy Quality of Service (QoS) Information Model</title>
          <author fullname="Y. Snir" initials="Y." surname="Snir"/>
          <author fullname="Y. Ramberg" initials="Y." surname="Ramberg"/>
          <author fullname="J. Strassner" initials="J." surname="Strassner"/>
          <author fullname="R. Cohen" initials="R." surname="Cohen"/>
          <author fullname="B. Moore" initials="B." surname="Moore"/>
          <date month="November" year="2003"/>
          <abstract>
            <t>This document presents an object-oriented information model for representing Quality of Service (QoS) network management policies. This document is based on the IETF Policy Core Information Model and its extensions. It defines an information model for QoS enforcement for differentiated and integrated services using policy. It is important to note that this document defines an information model, which by definition is independent of any particular data storage mechanism and access protocol.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3644"/>
        <seriesInfo name="DOI" value="10.17487/RFC3644"/>
      </reference>
      <reference anchor="RFC3670">
        <front>
          <title>Information Model for Describing Network Device QoS Datapath Mechanisms</title>
          <author fullname="B. Moore" initials="B." surname="Moore"/>
          <author fullname="D. Durham" initials="D." surname="Durham"/>
          <author fullname="J. Strassner" initials="J." surname="Strassner"/>
          <author fullname="A. Westerinen" initials="A." surname="Westerinen"/>
          <author fullname="W. Weiss" initials="W." surname="Weiss"/>
          <date month="January" year="2004"/>
          <abstract>
            <t>The purpose of this document is to define an information model to describe the quality of service (QoS) mechanisms inherent in different network devices, including hosts. Broadly speaking, these mechanisms describe the properties common to selecting and conditioning traffic through the forwarding path (datapath) of a network device. This selection and conditioning of traffic in the datapath spans both major QoS architectures: Differentiated Services and Integrated Services. This document should be used with the QoS Policy Information Model (QPIM) to model how policies can be defined to manage and configure the QoS mechanisms (i.e., the classification, marking, metering, dropping, queuing, and scheduling functionality) of devices. Together, these two documents describe how to write QoS policy rules to configure and manage the QoS mechanisms present in the datapaths of devices. This document, as well as QPIM, are information models. That is, they represent information independent of a binding to a specific type of repository</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3670"/>
        <seriesInfo name="DOI" value="10.17487/RFC3670"/>
      </reference>
      <reference anchor="RFC8791">
        <front>
          <title>YANG Data Structure Extensions</title>
          <author fullname="A. Bierman" initials="A." surname="Bierman"/>
          <author fullname="M. Björklund" initials="M." surname="Björklund"/>
          <author fullname="K. Watsen" initials="K." surname="Watsen"/>
          <date month="June" year="2020"/>
          <abstract>
            <t>This document describes YANG mechanisms for defining abstract data structures with YANG.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8791"/>
        <seriesInfo name="DOI" value="10.17487/RFC8791"/>
      </reference>
      <reference anchor="I-D.ietf-netmod-rfc8407bis">
        <front>
          <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
          <author fullname="Andy Bierman" initials="A." surname="Bierman">
            <organization>YumaWorks</organization>
          </author>
          <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
            <organization>Orange</organization>
          </author>
          <author fullname="Qin Wu" initials="Q." surname="Wu">
            <organization>Huawei</organization>
          </author>
          <date day="5" month="June" year="2025"/>
          <abstract>
            <t>   This document provides guidelines for authors and reviewers of
   specifications containing YANG data models, including IANA-maintained
   modules.  Recommendations and procedures are defined, which are
   intended to increase interoperability and usability of Network
   Configuration Protocol (NETCONF) and RESTCONF Protocol
   implementations that utilize YANG modules.  This document obsoletes
   RFC 8407.

   Also, this document updates RFC 8126 by providing additional
   guidelines for writing the IANA considerations for RFCs that specify
   IANA-maintained modules.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-rfc8407bis-28"/>
      </reference>
      <reference anchor="RFC8340">
        <front>
          <title>YANG Tree Diagrams</title>
          <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
          <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
          <date month="March" year="2018"/>
          <abstract>
            <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="215"/>
        <seriesInfo name="RFC" value="8340"/>
        <seriesInfo name="DOI" value="10.17487/RFC8340"/>
      </reference>
      <reference anchor="RFC8199">
        <front>
          <title>YANG Module Classification</title>
          <author fullname="D. Bogdanovic" initials="D." surname="Bogdanovic"/>
          <author fullname="B. Claise" initials="B." surname="Claise"/>
          <author fullname="C. Moberg" initials="C." surname="Moberg"/>
          <date month="July" year="2017"/>
          <abstract>
            <t>The YANG data modeling language is currently being considered for a wide variety of applications throughout the networking industry at large. Many standards development organizations (SDOs), open-source software projects, vendors, and users are using YANG to develop and publish YANG modules for a wide variety of applications. At the same time, there is currently no well-known terminology to categorize various types of YANG modules.</t>
            <t>A consistent terminology would help with the categorization of YANG modules, assist in the analysis of the YANG data modeling efforts in the IETF and other organizations, and bring clarity to the YANG- related discussions between the different groups.</t>
            <t>This document describes a set of concepts and associated terms to support consistent classification of YANG modules.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8199"/>
        <seriesInfo name="DOI" value="10.17487/RFC8199"/>
      </reference>
      <reference anchor="RFC9182">
        <front>
          <title>A YANG Network Data Model for Layer 3 VPNs</title>
          <author fullname="S. Barguil" initials="S." surname="Barguil"/>
          <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="L. Munoz" initials="L." surname="Munoz"/>
          <author fullname="A. Aguado" initials="A." surname="Aguado"/>
          <date month="February" year="2022"/>
          <abstract>
            <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
            <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9182"/>
        <seriesInfo name="DOI" value="10.17487/RFC9182"/>
      </reference>
      <reference anchor="RFC9291">
        <front>
          <title>A YANG Network Data Model for Layer 2 VPNs</title>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
          <author fullname="S. Barguil" initials="S." surname="Barguil"/>
          <author fullname="L. Munoz" initials="L." surname="Munoz"/>
          <date month="September" year="2022"/>
          <abstract>
            <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
            <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9291"/>
        <seriesInfo name="DOI" value="10.17487/RFC9291"/>
      </reference>
      <reference anchor="RFC8309">
        <front>
          <title>Service Models Explained</title>
          <author fullname="Q. Wu" initials="Q." surname="Wu"/>
          <author fullname="W. Liu" initials="W." surname="Liu"/>
          <author fullname="A. Farrel" initials="A." surname="Farrel"/>
          <date month="January" year="2018"/>
          <abstract>
            <t>The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
            <t>A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
            <t>This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture. Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8309"/>
        <seriesInfo name="DOI" value="10.17487/RFC8309"/>
      </reference>
      <reference anchor="RFC8299">
        <front>
          <title>YANG Data Model for L3VPN Service Delivery</title>
          <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
          <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
          <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
          <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
          <date month="January" year="2018"/>
          <abstract>
            <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
            <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8299"/>
        <seriesInfo name="DOI" value="10.17487/RFC8299"/>
      </reference>
      <reference anchor="RFC8466">
        <front>
          <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
          <author fullname="B. Wen" initials="B." surname="Wen"/>
          <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
          <author fullname="C. Xie" initials="C." surname="Xie"/>
          <author fullname="L. Jalil" initials="L." surname="Jalil"/>
          <date month="October" year="2018"/>
          <abstract>
            <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
            <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
            <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8466"/>
        <seriesInfo name="DOI" value="10.17487/RFC8466"/>
      </reference>
      <reference anchor="RFC3139">
        <front>
          <title>Requirements for Configuration Management of IP-based Networks</title>
          <author fullname="L. Sanchez" initials="L." surname="Sanchez"/>
          <author fullname="K. McCloghrie" initials="K." surname="McCloghrie"/>
          <author fullname="J. Saperia" initials="J." surname="Saperia"/>
          <date month="June" year="2001"/>
          <abstract>
            <t>This memo discusses different approaches to configure networks and identifies a set of configuration management requirements for IP-based networks. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3139"/>
        <seriesInfo name="DOI" value="10.17487/RFC3139"/>
      </reference>
      <reference anchor="RFC3198">
        <front>
          <title>Terminology for Policy-Based Management</title>
          <author fullname="A. Westerinen" initials="A." surname="Westerinen"/>
          <author fullname="J. Schnizlein" initials="J." surname="Schnizlein"/>
          <author fullname="J. Strassner" initials="J." surname="Strassner"/>
          <author fullname="M. Scherling" initials="M." surname="Scherling"/>
          <author fullname="B. Quinn" initials="B." surname="Quinn"/>
          <author fullname="S. Herzog" initials="S." surname="Herzog"/>
          <author fullname="A. Huynh" initials="A." surname="Huynh"/>
          <author fullname="M. Carlson" initials="M." surname="Carlson"/>
          <author fullname="J. Perry" initials="J." surname="Perry"/>
          <author fullname="S. Waldbusser" initials="S." surname="Waldbusser"/>
          <date month="November" year="2001"/>
          <abstract>
            <t>This document is a glossary of policy-related terms. It provides abbreviations, explanations, and recommendations for use of these terms. The intent is to improve the comprehensibility and consistency of writing that deals with network policy, particularly Internet Standards documents (ISDs). This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3198"/>
        <seriesInfo name="DOI" value="10.17487/RFC3198"/>
      </reference>
      <reference anchor="RFC3535">
        <front>
          <title>Overview of the 2002 IAB Network Management Workshop</title>
          <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
          <date month="May" year="2003"/>
          <abstract>
            <t>This document provides an overview of a workshop held by the Internet Architecture Board (IAB) on Network Management. The workshop was hosted by CNRI in Reston, VA, USA on June 4 thru June 6, 2002. The goal of the workshop was to continue the important dialog started between network operators and protocol developers, and to guide the IETFs focus on future work regarding network management. This report summarizes the discussions and lists the conclusions and recommendations to the Internet Engineering Task Force (IETF) community. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3535"/>
        <seriesInfo name="DOI" value="10.17487/RFC3535"/>
      </reference>
      <reference anchor="RFC2975">
        <front>
          <title>Introduction to Accounting Management</title>
          <author fullname="B. Aboba" initials="B." surname="Aboba"/>
          <author fullname="J. Arkko" initials="J." surname="Arkko"/>
          <author fullname="D. Harrington" initials="D." surname="Harrington"/>
          <date month="October" year="2000"/>
          <abstract>
            <t>This document describes and discusses the issues involved in the design of the modern accounting systems. The field of Accounting Management is concerned with the collection the collection of resource consumption data for the purposes of capacity and trend analysis, cost allocation, auditing, and billing. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2975"/>
        <seriesInfo name="DOI" value="10.17487/RFC2975"/>
      </reference>
      <reference anchor="RFC4251">
        <front>
          <title>The Secure Shell (SSH) Protocol Architecture</title>
          <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
          <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
          <date month="January" year="2006"/>
          <abstract>
            <t>The Secure Shell (SSH) Protocol is a protocol for secure remote login and other secure network services over an insecure network. This document describes the architecture of the SSH protocol, as well as the notation and terminology used in SSH protocol documents. It also discusses the SSH algorithm naming system that allows local extensions. The SSH protocol consists of three major components: The Transport Layer Protocol provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User Authentication Protocol authenticates the client to the server. The Connection Protocol multiplexes the encrypted tunnel into several logical channels. Details of these protocols are described in separate documents. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4251"/>
        <seriesInfo name="DOI" value="10.17487/RFC4251"/>
      </reference>
      <reference anchor="NEMOPS">
        <front>
          <title>Report from the IAB Workshop on the Next Era of Network Management Operations (NEMOPS)</title>
          <author fullname="Wes Hardaker" initials="W." surname="Hardaker">
         </author>
          <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
         </author>
          <date day="29" month="August" year="2025"/>
          <abstract>
            <t>   The "Next Era of Network Management Operations (NEMOPS)" workshop was
   convened by the Internet Architecture Board (IAB) from December 3-5,
   2024, as a three-day online meeting.  It builds on a previous 2002
   workshop, the outcome of which was documented in RFC 3535,
   identifying 14 operator requirements for consideration in future
   network management protocol design and related data models, along
   with some recommendations for the IETF.  Much has changed in the
   Internet’s operation and technological foundations since then.  The
   NEMOPS workshop reviewed the past outcomes and discussed any
   operational barriers that prevented these technologies from being
   widely implemented.  With the industry, network operators and
   protocol engineers working in collaboration, the workshop developed a
   suggested plan of action and network management recommendations for
   the IETF and IRTF.  Building on RFC 3535, this document provides the
   report of the follow-up IAB workshop on Network Management.

   Note that this document is a report on the proceedings of the
   workshop.  The views and positions documented in this report are
   those of the workshop participants and do not necessarily reflect IAB
   views and positions.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-iab-nemops-workshop-report-04"/>
      </reference>
    </references>
    <?line 1490?>

<section anchor="sec-changes-since-5706">
      <name>Changes Since RFC 5706</name>
      <t>The following changes have been made to the guidelines published in  <xref target="RFC5706"/>:</t>
      <ul spacing="normal">
        <li>
          <t>Change intended status from Informational to Best Current Practice</t>
        </li>
        <li>
          <t>Move the "Operational Considerations" Appendix A to a Checklist maintained in GitHub</t>
        </li>
        <li>
          <t>Add a requirement for an "Operational Considerations" section in all new Standard Track RFCs, along with specific guidance on its content.</t>
        </li>
        <li>
          <t>Update the operational and manageability-related technologies to reflect over 15 years of advancements  </t>
          <ul spacing="normal">
            <li>
              <t>Provide focus and details on YANG-based standards, deprioritizing MIB Modules.</t>
            </li>
            <li>
              <t>Add a "YANG Data Model Considerations" section</t>
            </li>
            <li>
              <t>Update the "Available Management Technologies" landscape</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Add an "Operational and Management Tooling Considerations" section</t>
        </li>
      </ul>
      <section anchor="sec-todo">
        <name>TO DO LIST</name>
        <t>See the list of open issues at https://github.com/IETF-OPSAWG-WG/draft-opsarea-rfc5706bis/issues</t>
      </section>
    </section>
    <section numbered="false" anchor="sec-ack">
      <name>Acknowledgements</name>
      <t>The authors wish to thank the following individuals and groups.</t>
      <dl>
        <dt>The IETF Ops Directorate:</dt>
        <dd>
          <t>The IETF Ops Directorate <xref target="IETF-OPS-Dir"/> reviewer team, who has been providing document reviews for over a decade, and its Chairs past and present: Gunter Van de Velde, Carlos Pignataro, Bo Wu, and Daniele Ceccarelli.</t>
        </dd>
        <dt>The AD championing the update:</dt>
        <dd>
          <t>Med Boucadair initiated the effort to refresh RFC 5706, 15 years after its publication, building on an idea originally suggested by Carlos Pignataro.</t>
        </dd>
        <dt>Reviewers of this document:</dt>
        <dd>
          <t>Thanks Mahesh Jethanandani, Chongfeng Xie, Alvaro Retana, and Michael P. to for review comments and contributions.</t>
        </dd>
        <dt>The author of RFC 5706:</dt>
        <dd>
          <t>David Harrington</t>
        </dd>
        <dt>Acknowledgments from RFC 5706:</dt>
        <dd>
          <t>This document started from an earlier document edited by Adrian
Farrel, which itself was based on work exploring the need for
Manageability Considerations sections in all Internet-Drafts produced
within the Routing Area of the IETF. That earlier work was produced
by Avri Doria, Loa Andersson, and Adrian Farrel, with valuable
feedback provided by Pekka Savola and Bert Wijnen.</t>
        </dd>
        <dt/>
        <dd>
          <t>Some of the discussion about designing for manageability came from
private discussions between Dan Romascanu, Bert Wijnen, Jürgen Schönwälder, Andy Bierman, and David Harrington.</t>
        </dd>
        <dt/>
        <dd>
          <t>Thanks to reviewers who helped fashion this document, including
Harald Alvestrand, Ron Bonica, Brian Carpenter, Benoît Claise, Adrian
Farrel, David Kessens, Dan Romascanu, Pekka Savola, Jürgen Schönwälder, Bert Wijnen, Ralf Wolter, and Lixia Zhang.</t>
        </dd>
      </dl>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Thomas Graf">
        <organization>Swisscom</organization>
        <address>
          <email>thomas.graf@swisscom.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
