diff options
| author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 | 
|---|---|---|
| committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 | 
| commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
| tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc3535.txt | |
| parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) | |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc3535.txt')
| -rw-r--r-- | doc/rfc/rfc3535.txt | 1123 | 
1 files changed, 1123 insertions, 0 deletions
diff --git a/doc/rfc/rfc3535.txt b/doc/rfc/rfc3535.txt new file mode 100644 index 0000000..da6ba2d --- /dev/null +++ b/doc/rfc/rfc3535.txt @@ -0,0 +1,1123 @@ + + + + + + +Network Working Group                                   J. Schoenwaelder +Request for Comments: 3535               International University Bremen +Category: Informational                                         May 2003 + + +          Overview of the 2002 IAB Network Management Workshop + +Status of this Memo + +   This memo provides information for the Internet community.  It does +   not specify an Internet standard of any kind.  Distribution of this +   memo is unlimited. + +Copyright Notice + +   Copyright (C) The Internet Society (2003).  All Rights Reserved. + +Abstract + +   This document provides an overview of a workshop held by the Internet +   Architecture Board (IAB) on Network Management.  The workshop was +   hosted by CNRI in Reston, VA, USA on June 4 thru June 6, 2002.  The +   goal of the workshop was to continue the important dialog started +   between network operators and protocol developers, and to guide the +   IETFs focus on future work regarding network management.  This report +   summarizes the discussions and lists the conclusions and +   recommendations to the Internet Engineering Task Force (IETF) +   community. + + + + + + + + + + + + + + + + + + + + + + + +Schoenwaelder                Informational                      [Page 1] + +RFC 3535            IAB Network Management Workshop             May 2003 + + +Table of Contents + +   1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  2 +   2. Network Management Technologies  . . . . . . . . . . . . . . .  3 +        2.1 SNMP / SMI / MIBs  . . . . . . . . . . . . . . . . . . .  4 +        2.2 COPS-PR / SPPI / PIBs  . . . . . . . . . . . . . . . . .  5 +        2.3 CIM / MOF / UML / PCIM . . . . . . . . . . . . . . . . .  6 +        2.4 CLI / TELNET / SSH . . . . . . . . . . . . . . . . . . .  7 +        2.5 HTTP / HTML  . . . . . . . . . . . . . . . . . . . . . .  8 +        2.6 XML  . . . . . . . . . . . . . . . . . . . . . . . . . .  9 +   3. Operator Requirements  . . . . . . . . . . . . . . . . . . . . 10 +   4. SNMP Framework Discussions . . . . . . . . . . . . . . . . . . 12 +   5. Consolidated Observations  . . . . . . . . . . . . . . . . . . 14 +   6. Recommendations  . . . . . . . . . . . . . . . . . . . . . . . 16 +   7. Security Considerations  . . . . . . . . . . . . . . . . . . . 17 +   8. Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . . 17 +   Normative References  . . . . . . . . . . . . . . . . . . . . . . 18 +   Informative References  . . . . . . . . . . . . . . . . . . . . . 18 +   Appendix - Participants . . . . . . . . . . . . . . . . . . . . . 19 +   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . . 19 +   Full Copyright Statement  . . . . . . . . . . . . . . . . . . . . 20 + +1. Introduction + +   The IETF has started several activities in the operations and +   management area to develop technologies and standards that aim to +   help network operators manage their networks.  The main network +   management technologies currently being developed within the IETF +   are: + +   o  The Simple Network Management Protocol (SNMP) [RFC3410] was +      created in the late 1980s.  The initial version (SNMPv1) is widely +      deployed, while the latest version (SNMPv3), which addresses +      security requirements, is just beginning to gain significant +      deployment. + +   o  The Common Information Model (CIM) [CIM], developed by the +      Distributed Management Task Force (DMTF), has been extended in +      cooperation with the DMTF to describe high-level policies as rule +      sets (PCIM) [RFC3060].  Mappings of the CIM policy extensions to +      LDAP schemas have been defined and work continues to define +      specific schema extension for QoS and security policies. + +   o  The Common Open Policy Service (COPS) [RFC2748] protocol has been +      extended to provision configuration information on devices (COPS- +      PR) [RFC3084].  Work is underway to define data definitions for +      specific services such as Differentiated Services (DiffServ). + + + + +Schoenwaelder                Informational                      [Page 2] + +RFC 3535            IAB Network Management Workshop             May 2003 + + +   During 2001, several meetings have been organized at various events +   (NANOG-22 May 2001, RIPE-40 October 2001, LISA-XV December 2001, +   IETF-52 December 2001) to start a direct dialog between network +   operators and protocol developers.  During these meetings, several +   operators have expressed their opinion that the developments in the +   IETF do not really address their requirements, especially for +   configuration management.  This naturally leads to the question of +   whether the IETF should refocus resources, and which strategic future +   activities in the operations and management area should be started. + +   The Internet Architecture Board (IAB), on June 4 thru June 6, 2002, +   held an invitational workshop on network management.  The goal of the +   workshop was to continue the important dialog started between network +   operators and protocol developers, and to guide the IETFs focus on +   future work regarding network management. + +   The workshop started with two breakout session to (a) identify a list +   of technologies relevant for network management together with their +   strengths and weaknesses, and to (b) identify the most important +   operator needs.  The results of these discussions are documented in +   Section 2 and Section 3.  During the following discussions, many more +   specific characteristics of the current SNMP framework were +   identified.  These discussions are documented in Section 4.  Section +   5 defines a combined feature list that was developed during the +   discussions following the breakout sessions.  Section 6 gives +   concrete recommendations to the IETF. + +   The following text makes no explicit distinction between different +   versions of SNMP.  For the majority of the SNMP related statements, +   the protocol version is irrelevant.  Nevertheless, some statements +   are more applicable to SNMPv1/SNMPv2c environments, while other +   statements (especially those concerned with security) are more +   applicable to SNMPv3 environments. + +2. Network Management Technologies + +   During the breakout sessions, the protocol developers assembled a +   list of the various network management technologies that are +   available or under active development.  For each technology, a list +   of strong (+) and weak (-) points were identified.  There are also +   some characteristics which appear to be neutral (o). + +   The list does not attempt to be complete.  Focus was given to IETF +   specific technologies (SNMP, COPS-PR, PCIM) and widely used +   proprietary technologies (CLI, HTTP/HTML, XML).  The existence of +   other generic management technologies (such as TL1, CORBA, CMIP/GDMO, + + + + + +Schoenwaelder                Informational                      [Page 3] + +RFC 3535            IAB Network Management Workshop             May 2003 + + +   TMN) or specific management technologies for specific problem domains +   (such as RADIUS, DHCP, BGP, OSPF) were acknowledged, but were not the +   focus of discussion. + +2.1 SNMP / SMI / MIBs + +   The SNMP management technology was created in the late 1980s and has +   since been widely implemented and deployed in the Internet.  There is +   lots of implementational and operational experience, and the +   characteristics of the technology are thus well understood. + +   +  SNMP works reasonably well for device monitoring.  The stateless +      nature of SNMP is useful for statistical and status polling. + +   +  SNMP is widely deployed for basic monitoring.  Some core MIB +      modules, such as the IF-MIB [RFC2863], are implemented on most +      networking devices. + +   +  There are many well defined proprietary MIB modules developed by +      network device vendors to support their management products. + +   +  SNMP is an important data source for systems that do event +      correlation, alarm detection, and root cause analysis. + +   o  SNMP requires applications to be useful.  SNMP was, from its early +      days, designed as a programmatic interface between management +      applications and devices.  As such, using SNMP without management +      applications or smart tools appears to be more complicated. + +   o  Standardized MIB modules often lack writable MIB objects which can +      be used for configuration, and this leads to a situation where the +      interesting writable objects exist in proprietary MIB modules. + +   -  There are scaling problems with regard to the number of objects in +      a device.  While SNMP provides reasonable performance for the +      retrieval of a small amount of data from many devices, it becomes +      rather slow when retrieving large amounts of data (such as routing +      tables) from a few devices. + +   -  There is too little deployment of writable MIB modules.  While +      there are some notable exceptions in areas, such as cable modems +      where writable MIB modules are essential, it appears that router +      equipment is usually not fully configurable via SNMP. + +   -  The SNMP transactional model and the protocol constraints make it +      more complex to implement MIBs, as compared to the implementation +      of commands of a command line interface interpreter.  A logical +      operation on a MIB can turn into a sequence of SNMP interactions + + + +Schoenwaelder                Informational                      [Page 4] + +RFC 3535            IAB Network Management Workshop             May 2003 + + +      where the implementation has to maintain state until the operation +      is complete, or until a failure has been determined.  In case of a +      failure, a robust implementation must be smart enough to roll the +      device back into a consistent state. + +   -  SNMP does not support easy retrieval and playback of +      configurations.  One part of the problem is that it is not easy to +      identify configuration objects.  Another part of the problem is +      that the naming system is very specific and physical device +      reconfigurations can thus break the capability to play back a +      previous configuration. + +   -  There is often a semantic mismatch between the task-oriented view +      of the world usually preferred by operators and the data-centric +      view of the world provided by SNMP.  Mapping from a task-oriented +      view to the data-centric view often requires some non-trivial code +      on the management application side. + +   -  Several standardized MIB modules lack a description of high-level +      procedures.  It is often not obvious from reading the MIB modules +      how certain high-level tasks are accomplished, which leads to +      several different ways to achieve the same goal, which increases +      costs and hinders interoperability. + +   A more detailed discussion about the SNMP management technology can +   be found in Section 4. + +2.2 COPS-PR / SPPI / PIBs + +   The COPS protocol [RFC2748] was defined in the late 1990s to support +   policy control over QoS signaling protocols.  The COPS-PR extension +   allows provision policy information on devises. + +   +  COPS-PR allows high-level transactions for single devices, +      including deleting one configuration and replacing it with +      another. + +   +  COPS-PRs non-overlapping instance namespace normally ensures that +      no other manager can corrupt a specific configuration.  All +      transactions for a given instance namespace are required to be +      executed in-order. + +   +  Both manager and device states are completely synchronized with +      one another at all times.  If there is a failure in communication, +      the state is resynchronized when the network is operating properly +      again and the device's network configuration is valid. + + + + + +Schoenwaelder                Informational                      [Page 5] + +RFC 3535            IAB Network Management Workshop             May 2003 + + +   +  The atomicity of transactions is well-defined.  If there is any +      failure in a transaction, that specific failure is reported to the +      manager, and the local configuration is supposed to be +      automatically rolled-back to the state of the last "good" +      transaction. + +   +  Capability reporting is part of the framework PIB which must be +      supported by COPS-PR implementations.  This allows management +      applications to adapt to the capabilities present on a device. + +   +  The focus of COPS-PR is configuration, and the protocol has been +      optimized for this purpose (by using for example TCP as a +      transport mechanism). + +   o  Only a single manager is allowed to have control, at any point in +      time, for a given subject category on a device.  (The subject +      category maps to a COPS Client-Type.)  This single manager +      assumption simplifies the protocol as it makes it easier to +      maintain shared state. + +   o  Similar to SNMP, COPS-PR requires applications to be useful since +      it is also designed as a programmatic interface between management +      applications and devices. + +   -  As of the time of the meeting, there are no standardized PIB +      modules. + +   -  Compared to SNMP, there is not yet enough experience to understand +      the strong and weak aspects of the protocol in operational +      environments. + +   -  COPS-PR does not support easy retrieval and playback of +      configurations.  The reasons are similar as for SNMP. + +   -  The COPS-PR view of the world is data-centric, similar to SNMP's +      view of the world.  A mapping from the data-centric view to a +      task-oriented view and vice versa, has similar complexities as +      with SNMP. + +2.3 CIM / MOF / UML / PCIM + +   The development of the Common Information Model (CIM) [CIM] started +   in the DMTF in the mid 1990s.  The development follows a top-down +   approach where core classes are defined first and later extended to +   model specific services.  The DMTF and the IETF jointly developed +   policy extensions of the CIM, known as PCIM [RFC3060]. + + + + + +Schoenwaelder                Informational                      [Page 6] + +RFC 3535            IAB Network Management Workshop             May 2003 + + +   +  The CIM technology generally follows principles of object- +      orientation with full support of methods on data objects, which is +      not available in SNMP or COPS-PR. + +   +  The MOF format allows representation of instances in a common +      format.  No such common format exists for SNMP or COPS-PR.  It is +      of course possible to store instances in the form of BER encoded +      ASN.1 sequences, but this is generally not suitable for human +      readability. + +   +  There is support for a query facility which allows the locating of +      CIM objects.  However, the query language itself is not yet +      specified as part of the CIM standards.  Implementations currently +      use proprietary query languages, such as the Windows Management +      Instrumentation Query Language (WQL). + +   +  The information modeling work in CIM is done by using Unified +      Modeling Language (UML) as a graphical notation.  This attracts +      people with a computer science background who have learned to use +      UML as part of their education. + +   o  The main practical use of CIM schemas today seems to be the +      definition of data structures used internally by management +      systems. + +   -  The CIM schemas have rather complex interrelationships that must +      be understood before one can reasonably extend the set of existing +      schemas. + +   -  Interoperability between CIM implementations seems to be +      problematic compared to the number of interoperable SNMP +      implementations available today. + +   -  So far, CIM schemas have seen limited implementation and usage as +      an interface between management systems and network devices. + +2.4 CLI / TELNET / SSH + +   Most devices have a builtin command line interface (CLI) for +   configuration and troubleshooting purposes.  Network access to the +   CLI has traditionally been through the TELNET protocol, while the SSH +   protocol is gaining momentum to address security issues associated +   with TELNET.  In the following, only CLIs that actually parse and +   execute commands are considered.  (Menu-oriented interfaces are +   difficult for automation and thus not relevant here.) + +   +  Command line interfaces are generally task-oriented, which make +      them easier to use for human operators. + + + +Schoenwaelder                Informational                      [Page 7] + +RFC 3535            IAB Network Management Workshop             May 2003 + + +   +  A saved sequence of textual commands can easily be replayed. +      Simple substitutions can be made with arbitrary text processing +      tools. + +   +  It is usually necessary to learn at least parts of the command +      line interface of new devices in order to create the initial +      configuration.  Once people have learned (parts of) the command +      line interface, it is natural for them to use the same interface +      and abstractions for automating configuration changes. + +   +  A command line interface does not require any special purpose +      applications (telnet and ssh are readily available on most systems +      today). + +   +  Most command line interfaces provide context sensitive help that +      reduces the learning curve. + +   -  Some command line interfaces lack a common data model.  It is very +      well possible that the same command on different devices, even +      from the same vendor, behaves differently. + +   -  The command line interface is primarily targeted to humans which +      can adapt to minor syntax and format changes easily.  Using +      command line interfaces as a programmatic interface is troublesome +      because of parsing complexities. + +   -  Command line interfaces often lack proper version control for the +      syntax and the semantics.  It is therefore time consuming and +      error prone to maintain programs or scripts that interface with +      different versions of a command line interface. + +   -  Since command line interfaces are proprietary, they can not be +      used efficiently to automate processes in an environment with a +      heterogenous set of devices. + +   -  The access control facilities, if present at all, are often ad-hoc +      and sometimes insufficient. + +2.5 HTTP / HTML + +   Many devices have an embedded web server which can be used to +   configure the device and to obtain status information.  The commonly +   used protocol is HTTP, and information is rendered in HTML.  Some +   devices also expect that clients have facilities such as Java or Java +   Script. + +   +  Embedded web servers for configuration are end-user friendly and +      solution oriented. + + + +Schoenwaelder                Informational                      [Page 8] + +RFC 3535            IAB Network Management Workshop             May 2003 + + +   +  Embedded web servers are suitable for configuring consumer devices +      by inexperienced users. + +   +  Web server configuration is widely deployed, especially in boxes +      targeted to the consumer market. + +   +  There is no need for specialized applications to use embedded web +      servers since web browsers are commonly available today. + +   -  Embedded web servers are management application hostile.  Parsing +      HTML pages to extract useful information is extremely painful. + +   -  Replay of configuration is often problematic, either because the +      web pages rely on some active content or because different +      versions of the same device use different ways to interact with +      the user. + +   -  The access control facilities, if present at all, are often ad-hoc +      and sometimes insufficient. + +2.6 XML + +   In the late 1990's, some vendors started to use the Extensible Markup +   Language (XML) [XML] for describing device configurations and for +   protocols that can be used to retrieve and manipulate XML formatted +   configurations. + +   +  XML is a machine readable format which is easy to process and +      there are many good off the shelf tools available. + +   +  XML allows the description of structured data of almost arbitrary +      complexity. + +   +  The basic syntax rules behind XML are relatively easy to learn. + +   +  XML provides a document-oriented view of configuration data +      (similar to many proprietary configuration file formats). + +   +  XML has a robust schema language XSD [XSD] for which many good off +      the shelf tools exist. + +   o  XML alone is just syntax.  XML schemas must be carefully designed +      to make XML truly useful as a data exchange format. + + + + + + + + +Schoenwaelder                Informational                      [Page 9] + +RFC 3535            IAB Network Management Workshop             May 2003 + + +   -  XML is rather verbose.  This either increases the bandwidth +      required to move management information around (which is an issue +      in e.g., wireless or asymmetric cable networks) or it requires +      that the systems involved have the processing power to do on the +      fly compression/decompression. + +   -  There is a lack of commonly accepted standardized management +      specific XML schemas. + +3. Operator Requirements + +   During the breakout session, the operators were asked to identify +   needs that have not been sufficiently addressed.  The results +   produced during the breakout session were later discussed and +   resulted in the following list of operator requirements. + +   1.  Ease of use is a key requirement for any network management +       technology from the operators point of view. + +   2.  It is necessary to make a clear distinction between configuration +       data, data that describes operational state and statistics.  Some +       devices make it very hard to determine which parameters were +       administratively configured and which were obtained via other +       mechanisms such as routing protocols. + +   3.  It is required to be able to fetch separately configuration data, +       operational state data, and statistics from devices, and to be +       able to compare these between devices. + +   4.  It is necessary to enable operators to concentrate on the +       configuration of the network as a whole rather than individual +       devices. + +   5.  Support for configuration transactions across a number of devices +       would significantly simplify network configuration management. + +   6.  Given configuration A and configuration B, it should be possible +       to generate the operations necessary to get from A to B with +       minimal state changes and effects on network and systems.  It is +       important to minimize the impact caused by configuration changes. + +   7.  A mechanism to dump and restore configurations is a primitive +       operation needed by operators.  Standards for pulling and pushing +       configurations from/to devices are desirable. + + + + + + + +Schoenwaelder                Informational                     [Page 10] + +RFC 3535            IAB Network Management Workshop             May 2003 + + +   8.  It must be easy to do consistency checks of configurations over +       time and between the ends of a link in order to determine the +       changes between two configurations and whether those +       configurations are consistent. + +   9.  Network wide configurations are typically stored in central +       master databases and transformed into formats that can be pushed +       to devices, either by generating sequences of CLI commands or +       complete configuration files that are pushed to devices.  There +       is no common database schema for network configuration, although +       the models used by various operators are probably very similar. +       It is desirable to extract, document, and standardize the common +       parts of these network wide configuration database schemas. + +   10. It is highly desirable that text processing tools such as diff, +       and version management tools such as RCS or CVS, can be used to +       process configurations, which implies that devices should not +       arbitrarily reorder data such as access control lists. + +   11. The granularity of access control needed on management interfaces +       needs to match operational needs.  Typical requirements are a +       role-based access control model and the principle of least +       privilege, where a user can be given only the minimum access +       necessary to perform a required task. + +   12. It must be possible to do consistency checks of access control +       lists across devices. + +   13. It is important to distinguish between the distribution of +       configurations and the activation of a certain configuration. +       Devices should be able to hold multiple configurations. + +   14. SNMP access control is data-oriented, while CLI access control is +       usually command (task) oriented.  Depending on the management +       function, sometimes data-oriented or task-oriented access control +       makes more sense.  As such, it is a requirement to support both +       data-oriented and task-oriented access control. + +   So far, there is no published document that clearly defines the +   requirements of the operators. + + + + + + + + + + + +Schoenwaelder                Informational                     [Page 11] + +RFC 3535            IAB Network Management Workshop             May 2003 + + +4. SNMP Framework Discussions + +   During the discussions, many properties of the SNMP framework were +   identified. + +   1.  It is usually not possible to retrieve complete device +       configurations via SNMP so that they can be compared with +       previous configurations or checked for consistency across +       devices.  There is usually only incomplete coverage of device +       features via the SNMP interface, and there is a lack of +       differentiation between configuration data and operational state +       data for many features. + +   2.  The quality of SNMP instrumentations is sometimes disappointing. +       SNMP access sometimes crashes systems or returns wrong data. + +   3.  MIB modules and their implementations are not available in a +       timely manner (sometimes MIB modules lag years behind) which +       forces users to use the CLI. + +   4.  Operators view current SNMP programming/scripting interfaces as +       being too low-level and thus too time consuming and inconvenient +       for practical use. + +   5.  Lexicographic ordering is sometimes artificial with regard to +       internal data structures and causes either significant runtime +       overhead, or increases implementation costs or implementation +       delay or both. + +   6.  Poor performance for bulk data transfers.  The typical examples +       are routing tables. + +   7.  Poor performance on query operations that were not anticipated +       during the MIB design.  A typical example is the following query: +       Which outgoing interface is being used for a specific destination +       address? + +   8.  The SNMP credentials and key management are considered complex, +       especially since they do not integrate well with other existing +       credential and key management systems. + +   9.  The SMI language is hard to deal with and not very practical. + +   10. MIB modules are often over-engineered in the sense that they +       contain lots of variables that operators do not look at. + + + + + + +Schoenwaelder                Informational                     [Page 12] + +RFC 3535            IAB Network Management Workshop             May 2003 + + +   11. SNMP traps are used to track state changes but often syslog +       messages are considered more useful since they usually contain +       more information to describe the problem.  SNMP traps usually +       require subsequent get operations to figure out what the trap +       really means. + +   12. Device manufacturers find SNMP instrumentations inherently +       difficult to implement, especially with complex table indexing +       schemes and table interrelationships. + +   13. MIB modules often lack a description of how the various objects +       can be used to achieve certain management functions.  (MIB +       modules can often be characterized as a list of ingredients +       without a recipe.) + +   14. The lack of structured types and various RPC interactions +       (methods) make MIB modules much more complex to design and +       implement. + +   15. The lack of query and aggregation capabilities (reduction of +       data) causes efficiency and scalability problems. + +   16. The SNMP protocol was simplified in terms of the number of +       protocol operations and resource requirements on managed devices. +       It was not simplified in terms of usability by network operators +       or instrumentation implementors. + +   17. There is a semantic mismatch between the low-level data-oriented +       abstraction level of MIB modules and the task-oriented +       abstraction level desired by network operators.  Bridging the gap +       with tools is in principle possible, but in general it is +       expensive as it requires some serious development and programming +       efforts. + +   18. SNMP seems to work reasonably well for small devices which have a +       limited number of managed objects and where end-user management +       applications are shipped by the vendor.  For more complex +       devices, SNMP becomes too expensive and too hard to use. + +   19. There is a disincentive for vendors to implement SNMP equivalent +       MIB modules for all their CLI commands because they do not see a +       valued proposition.  This undermines the value of third party +       standard SNMP solutions. + +   20. Rapid feature development is in general not compatible with the +       standardization of the configuration interface. + + + + + +Schoenwaelder                Informational                     [Page 13] + +RFC 3535            IAB Network Management Workshop             May 2003 + + +5. Consolidated Observations + +   1.  Programmatic interfaces have to provide full coverage otherwise +       they will not be used by network operators since they have to +       revert to CLIs anyway. + +   2.  Operators perceive that equipment vendors do not implement MIB +       modules in a timely manner.  Neither read-only nor read-write MIB +       modules are available on time today. + +   3.  The attendees perceive that right now it is too hard to implement +       useful MIB modules within network equipment. + +   4.  Because of the previous items, SNMP is not widely used today for +       network device configuration, although there are notable +       exceptions. + +   5.  It is necessary to clearly distinguish between configuration data +       and operational data. + +   6.  It would be nice to have a single data definition language for +       all programmatic interfaces (in case there happen to be multiple +       programmatic interfaces). + +   7.  In general, there is a lack of input from the enterprise network +       space.  Those enterprises who provided input tend to operate +       their networks like network operators. + +   8.  It is required to be able to dump and reload a device +       configuration in a textual format in a standard manner across +       multiple vendors and device types. + +   9.  It is desirable to have a mechanism to distribute configurations +       to devices under transactional constraints. + +   10. Eliminating SNMP altogether is not an option. + +   11. Robust access control is needed.  In addition, it is desirable to +       be able to enable/disable individual MIB modules actually +       implemented on a device. + +   12. Textual configuration files should be able to contain +       international characters.  Human-readable strings should utilize +       the least-bad internationalized character set and encoding, which +       this year almost certainly means UTF-8.  Protocol elements should +       be in case insensitive ASCII. + + + + + +Schoenwaelder                Informational                     [Page 14] + +RFC 3535            IAB Network Management Workshop             May 2003 + + +   13. The deployed tools for event/alarm correlation, root cause +       analysis and logging are not sufficient. + +   14. There is a need to support a human interface and a programmatic +       interface. + +   15. The internal method routines for both interfaces should be the +       same to ensure that data exchanged between these two interfaces +       is always consistent. + +   16. The implementation costs have to be low on devices. + +   17. The implementation costs have to be low on managers. + +   18. The specification costs for data models have to be low. + +   19. Standardization costs for data models have to be low. + +   20. There should be a single data modeling language with a human +       friendly syntax. + +   21. The data modeling language must support compound data types. + +   22. There is a need for data aggregation capabilities on the devices. + +   23. There should be a common data interchange format for instance +       data that allows easy post-processing and analysis. + +   24. There is a need for a common data exchange format with single and +       multi-system transactions (which implies rollback across devices +       in error situations). + +   25. There is a need to reduce the semantic mismatch between current +       data models and the primitives used by operators. + +   26. It should be possible to perform operations on selected subsets +       of management data. + +   27. It is necessary to discover the capabilities of devices. + +   28. There is a need for a secure transport, authentication, identity, +       and access control which integrates well with existing key and +       credential management infrastructure. + +   29. It must be possible to define task oriented views and access +       control rules. + + + + + +Schoenwaelder                Informational                     [Page 15] + +RFC 3535            IAB Network Management Workshop             May 2003 + + +   30. The complete configuration of a device should be doable with a +       single protocol. + +   31. A configuration protocol must be efficient and reliable and it +       must scale in the number of transactions and devices. + +   32. Devices must be able to support minimally interruptive +       configuration deltas. + +   33. A solution must support function call semantics (methods) to +       implement functions, such as a longest prefix match on a routing +       table. + +6. Recommendations + +   1.  The workshop recommends that the IETF stop forcing working groups +       to provide writable MIB modules.  It should be the decision of +       the working group whether they want to provide writable objects +       or not. + +   2.  The workshop recommends that a group be formed to investigate why +       current MIB modules do not contain all the objects needed by +       operators to monitor their networks. + +   3.  The workshop recommends that a group be formed to investigate why +       the current SNMP protocol does not satisfy all the monitoring +       requirements of operators. + +   4.  The workshop recommends, with strong consensus from both protocol +       developers and operators, that the IETF focus resources on the +       standardization of configuration management mechanisms. + +   5.  The workshop recommends, with strong consensus from the operators +       and rough consensus from the protocol developers, that the +       IETF/IRTF should spend resources on the development and +       standardization of XML-based device configuration and management +       technologies (such as common XML configuration schemas, exchange +       protocols and so on). + +   6.  The workshop recommends, with strong consensus from the operators +       and rough consensus from the protocol developers, that the +       IETF/IRTF should not spend resources on developing HTML-based or +       HTTP-based methods for configuration management. + + + + + + + + +Schoenwaelder                Informational                     [Page 16] + +RFC 3535            IAB Network Management Workshop             May 2003 + + +   7.  The workshop recommends, with rough consensus from the operators +       and strong consensus from the protocol developers, that the IETF +       should continue to spend resources on the evolution of the +       SMI/SPPI data definition languages as being done in the SMIng +       working group. + +   8.  The workshop recommends, with split consensus from the operators +       and rough consensus from the protocol developers, that the IETF +       should spend resources on fixing the MIB development and +       standardization process. + +   The workshop also discussed the following items and achieved rough +   consensus, but did not make a recommendation. + +   1.  The workshop had split consensus from the operators and rough +       consensus from the protocol developers, that the IETF should not +       focus resources on CIM extensions. + +   2.  The workshop had rough consensus from the protocol developers +       that the IETF should not spend resources on COPS-PR development. +       So far, the operators have only very limited experience with +       COPS-PR.  In general, however, they felt that further development +       of COPS-PR might be a waste of resources as they assume that +       COPS-PR does not really address their requirements. + +   3.  The workshop had rough consensus from the protocol developers +       that the IETF should not spend resources on SPPI PIB definitions. +       The operators had rough consensus that they do not care about +       SPPI PIBs. + +7. Security Considerations + +   This document is a report of an IAB Network Management workshop.  As +   such, it does not have any direct security implications for the +   Internet. + +8. Acknowledgments + +   The editor would like to thank Dave Durham, Simon Leinen and John +   Schnizlein for taking detailed minutes during the workshop. + + + + + + + + + + + +Schoenwaelder                Informational                     [Page 17] + +RFC 3535            IAB Network Management Workshop             May 2003 + + +Normative References + +   [RFC3410]  Case, J., Mundy, R., Partain, D. and B. Stewart, +              "Introduction and Applicability Statements for Internet- +              Standard Management Framework", RFC 3410, December 2002. + +   [CIM]      Distributed Management Task Force, "Common Information +              Model (CIM) Specification Version 2.2", DSP 0004, June +              1999. + +   [RFC3060]  Moore, B., Ellesson, E., Strassner, J. and A. Westerinen, +              "Policy Core Information Model -- Version 1 +              Specification", RFC 3060, February 2001. + +   [RFC2748]  Durham, D., Boyle, J., Cohen, R., Herzog, S., Rajan, R. +              and A. Sastry, "The COPS (Common Open Policy Service) +              Protocol", RFC 2748, January 2000. + +   [RFC3084]  Chan, K., Seligson, J., Durham, D., Gai, S., McCloghrie, +              K., Herzog, S., Reichmeyer, F., Yavatkar, R. and A. Smith, +              "COPS Usage for Policy Provisioning (COPS-PR)", RFC 3084, +              March 2001. + +   [XML]      Bray, T., Paoli, J. and C. Sperberg-McQueen, "Extensible +              Markup Language (XML) 1.0", W3C Recommendation, February +              1998. + +Informative References + +   [RFC2863]  McCloghrie, K. and F. Kastenholz, "The Interfaces Group +              MIB", RFC 2863, June 2000. + +   [XSD]      David, D., "XML Schema Part 0: Primer", W3C +              Recommendation, May 2001. + + + + + + + + + + + + + + + + + +Schoenwaelder                Informational                     [Page 18] + +RFC 3535            IAB Network Management Workshop             May 2003 + + +Appendix - Participants + +   Ran Atkinson          Extreme Networks +   Rob Austein           InterNetShare +   Andy Bierman          Cisco Systems +   Steve Bellovin        AT&T +   Randy Bush            AT&T +   Leslie Daigle         VeriSign +   David Durham          Intel +   Vijay Gill +   Wes Hardaker          Network Associates Laboratories +   Ed Kern +   Simon Leinen          Switch +   Ken Lindahl           University of California Berkeley +   David Partain         Ericsson +   Andrew Partan         UUnet/Verio/MFN +   Vern Paxson           ICIR +   Aiko Pras             Univeristy of Twente +   Randy Presuhn         BMC Software +   Juergen Schoenwaelder University of Osnabrueck +   John Schnizlein       Cisco Systems +   Mike St. Johns +   Ruediger Volk         Deutsche Telekom +   Steve Waldbusser +   Margaret Wassermann   Windriver +   Glen Waters           Nortel Networks +   Bert Wijnen           Lucent + +Author's Address + +   Comments should be submitted to the <nm-ws@ops.ietf.org> mailing +   list. + +   Juergen Schoenwaelder +   International University Bremen +   P.O. Box 750 561 +   28725 Bremen +   Germany + +   Phone: +49 421 200 3587 +   EMail: j.schoenwaelder@iu-bremen.de + + + + + + + + + + +Schoenwaelder                Informational                     [Page 19] + +RFC 3535            IAB Network Management Workshop             May 2003 + + +Full Copyright Statement + +   Copyright (C) The Internet Society (2003).  All Rights Reserved. + +   This document and translations of it may be copied and furnished to +   others, and derivative works that comment on or otherwise explain it +   or assist in its implementation may be prepared, copied, published +   and distributed, in whole or in part, without restriction of any +   kind, provided that the above copyright notice and this paragraph are +   included on all such copies and derivative works.  However, this +   document itself may not be modified in any way, such as by removing +   the copyright notice or references to the Internet Society or other +   Internet organizations, except as needed for the purpose of +   developing Internet standards in which case the procedures for +   copyrights defined in the Internet Standards process must be +   followed, or as required to translate it into languages other than +   English. + +   The limited permissions granted above are perpetual and will not be +   revoked by the Internet Society or its successors or assignees. + +   This document and the information contained herein is provided on an +   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING +   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING +   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION +   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF +   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Acknowledgement + +   Funding for the RFC Editor function is currently provided by the +   Internet Society. + + + + + + + + + + + + + + + + + + + +Schoenwaelder                Informational                     [Page 20] +  |