1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
|
Network Working Group L. Sanchez
Request for Comments: 3139 Megisto
Category: Informational K. McCloghrie
Cisco
J. Saperia
JDS Consultant
June 2001
Requirements for Configuration Management of IP-based Networks
Status of this Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (2001). All Rights Reserved.
Abstract
This memo discusses different approaches to configure networks and
identifies a set of configuration management requirements for IP-
based networks.
Table of Contents
1.0 Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1 Motivation, Scope and Goals of this document . . . . . . . 2
1.2 Requirements Terminology . . . . . . . . . . . . . . . . . 3
1.3 Audience . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.4 Definition of Technical Terms. . . . . . . . . . . . . . . 3
2.0 Statement of the Problem . . . . . . . . . . . . . . . . . . 4
3.0 Requirements for an IP-based Configuration Management System . 7
4.0 Security Considerations . . . . . . . . . . . . . . . . . . . 9
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 9
References. . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Authors' Addresses. . . . . . . . . . . . . . . . . . . . . . . . 10
Full Copyright Statement. . . . . . . . . . . . . . . . . . . . . 11
Sanchez, et al. Informational [Page 1]
^L
RFC 3139 Requirements for Configuration Management June 2001
1.0 Introduction
1.1 Motivation, Scope and Goals of this document
A number of IETF working groups have introduced new technologies
which offer integrated and differentiated services. To support these
new technologies, working group members found that they had new
requirements for configuration of these technologies. One of these
new requirements was for the provisioning (configuration) of behavior
at the network level.
An example of this type of configuration would be instructing all
routers in a network to provide 'gold' service to a particular set of
customers. Depending on the specific network equipment and
definition of 'gold' service, this configuration request might
translate to different configuration parameters on different vendors
equipment and many individual configuration commands at the router.
This higher level of configuration management has come to commonly be
known as policy based management.
Working groups associated with these new technologies believed that
the existing SNMP based management framework, while adequate for
fault, configuration management at the individual instance (e.g.,
interface) level, performance and other management functions commonly
associated with it, was not able to meet these new needs. As a
result they began working on new solutions and approaches.
COPS [COPS] for RSVP [RSVP] provides routers with the opportunity to
ask their Policy Server for an admit/reject decision for a particular
RSVP session. This model allows routers to outsource their resource
allocation decisions to some other entity. However, this model does
not work with DiffServ [DSARCH] where there is no signalling
protocol. Therefore, the policies that affect resource allocation
decisions must be provisioned to the routers. It became evident that
there was a need for coordinating both RSVP-based and DiffServ-based
policies to provide end2end QoS. Working groups began to extend and
leverage approaches such as COPS for RSVP to support Diffserv
policies. This gave birth to COPS-PR [COPS-PR].
These extensions caused concern that the IETF was about to develop a
set of fragmented solutions which were locally optimized for specific
technologies and not well integrated in the existing Internet
Management Framework. The concern prompted some of the Area
Directors associated with the Operations and Management, Transport
and General areas, and some IAB members to organize a two day meeting
in mid September 1999. The primary purpose of the meeting was to
examine the requirements for configuration management and evaluate
the COPS/PIB and SNMP/MIB approaches in light of these requirements.
Sanchez, et al. Informational [Page 2]
^L
RFC 3139 Requirements for Configuration Management June 2001
At the end of the two day meeting there was no consensus on several
issues and as a result a number of 'design teams' were created. This
document is the output of the design team chartered with the
identification of a global set of configuration management
requirements. This document has benefited from feedback received
during the Configuration Management BOF that took place on November
11, 1999 during the 46th IETF in Washington DC, USA. The document
has also benefited from comments sent to the confmgt@ops.ietf.org
mailing list.
1.2 Requirements Terminology
Keywords "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT" and
"MAY" that appear in this document are to be interpreted as described
in RFC 2119 [Bra97].
1.3 Audience
The target audience for this document includes system designers,
implementers of network configuration and management technology and
others interested in gaining a general background understanding of
the issues related to configuration management in general, and in the
Internet in particular along with associated requirements. This
document assumes that the reader is familiar with the Internet
Protocol, related networking technology, and general network
management terms and concepts.
1.4 Definition of Terms
Device-Local Configuration
Configuration data that is specific to a particular network device.
This is the finest level of granularity for configuring network
devices.
Network-Wide Configuration
Configuration data that is not specific to any particular network
device and from which multiple device-local configurations can be
derived. Network-wide configuration provides a level of abstraction
above device-local configurations.
Configuration Data Translator
A function that transforms Configuration Management Data (high-level
policies) or Network-wide configuration data (middle-level policies)
into device local configurations (low-level policies) based on the
Sanchez, et al. Informational [Page 3]
^L
RFC 3139 Requirements for Configuration Management June 2001
generic capabilities of network devices. This function can be
performed either by devices themselves or by some intermediate
entity.
2.0 Statement of the Problem
Configuring large networks is becoming an increasingly difficult
task. The problem intensifies as networks increase their size, not
only in terms of number of devices, but also with a greater variety
of devices, with each device having increasing functionality and
complexity. That is, networks are getting more complex in multiple
dimensions simultaneously (number of devices, time scales for
configuration, etc.) making the task of configuring these more
complex.
In the past, configuring a network device has been a three step
process. The network operator, engineer or entity responsible for
the network created a model of the network and its expected behavior.
Next, this (model + expected behavior) was formalized and recorded in
the form of high-level policies. Finally, these policies were then
translated into device-local configurations and provisioned into each
network device for enforcement.
Any high-level policy changes (changes in the network topology and/or
its expected behavior) needed to be translated and provisioned to all
network devices affected by the change. Figure 1 depicts this model
and shows how high-level policies for a network could be translated
into four device-local configurations. In this model, network
operators or engineers functioned as configuration data translators;
they translated the high-level policies to device-local configuration
data.
A configuration data translator could take the topology independent
behavior description such as high-level policies (first input source)
combine it with topology information (second input source) as well as
status/performance/monitoring information (third input source) to
derive device-local configurations. Note that there could be several
configuration data translators operating in tandem on a set of
devices. However, there could be only one configuration data
translator operating at a particular device at any given instance.
Sanchez, et al. Informational [Page 4]
^L
RFC 3139 Requirements for Configuration Management June 2001
Configuration Management
Data (High-level Policies)
|
|
|
|
Network V Network
Topology -----> Configuration <---- Status/performance
Information Data Translator(s) Information
|
|
|
|
-------------------------------------------------
| | | |
Device Device Device Device
Local Local Local Local
Conf(1) Conf(2) Conf(3) Conf(4)
Figure 1. Current model for configuring network devices.
Historically, network operators and engineers used protocols and
mechanisms such as SNMP and CLI applications to provision or
configure network devices. In their current versions, these
mechanisms have proven to be difficult to use because of their low-
level of granularity and their device-specific nature. This problem
is worse when provisioning multiple network devices requiring large
amounts of configuration data.
It is evident that network administrators and existing configuration
management software can not keep up with the growth in complexity of
networks and that an efficient, integrated configuration management
solution is needed. Several IETF Working Groups working on this
problem converged into adding a layer of abstraction to the
traditional configuration management process described in figure 1.
Figure 2 depicts this process after the layer of abstraction is
added. As in the previous figure, first the network operator,
engineer or entity responsible for the network creates a model of the
network and its expected behavior. This is formalized and recorded
in the form of high-level policies.
These policies are combined with topology information as well as
status/performance information to generate network-wide configuration
data. These middle level-policies are simpler to manage and
represent behaviors shared by multiple network devices.
Sanchez, et al. Informational [Page 5]
^L
RFC 3139 Requirements for Configuration Management June 2001
Configuration Management
Data (High-level Policies)
|
|
|
|
Network V Network
Topology -----> Network-Wide <---- Status/performance
Information Configuration Information
Data
|
|
|
|
V
Configuration
Data Translator(s)
|
|
|
|
-------------------------------------------------
| | | |
Device Device Device Device
Local Local Local Local
Conf(1) Conf(2) Conf(3) Conf(4)
Figure 2. Proposed model for configuring network devices.
Device local configurations are generated by automated configuration
data translators and are supplied to each network device for
enforcement. Note how this model only describes the function of the
configuration data translators and it does not dictate its functional
location. This is to say that translators may reside outside of the
devices (as it was the case in figure 1 since they were humans) or
may be possibly collocated with each device.
As in the previous model, any high-level policy changes (changes in
the network topology and/or its expected behavior) needs to be
propagated to all network devices affected by the change. However,
in the configuration model depicted in figure 2 network operators and
engineers can specify the behavior of the network in a simplified
manner reducing the amount of device specific knowledge needed.
One should keep in mind that in some cases per instance device local
configuration is needed in network devices. An integrated solution
MUST allow room for this. Also, the introduction of automated
configuration data translators assumes that all information needed to
Sanchez, et al. Informational [Page 6]
^L
RFC 3139 Requirements for Configuration Management June 2001
make an error free conversion of network-wide configuration data into
device-local configuration data is available. In the event that such
data is not available the solution MUST detect this and act
accordingly.
3.0 Requirements for an IP-based Configuration Management System
All IETF WGs active in this area agrees upon the following
requirements for configuration management. An integrated
configuration management solution MUST:
1) provide means by which the behavior of the network can be
specified at a level of abstraction (network-wide
configuration) higher than a set of configuration information
specific to individual devices,
2) be capable of translating network-wide configurations into
device-local configuration. The identification of the relevant
subset of the network-wide policies to be down-loaded is
according to the capabilities of each device,
3) be able to interpret device-local configuration, status and
monitoring information within the context of network-wide
configurations,
4) be capable of provisioning (e.g., adding, modifying, deleting,
dumping, restoring) complete or partial configuration data to
network devices simultaneously or in a synchronized fashion as
necessary,
4a) be able to provision multiple device-local configurations
to support fast switch-overs without the need to down-
load potentially large configuration changes to many
devices,
5) provide means by which network devices can send feedback
information (configuration data confirmation, network status
and monitoring information, specific events, etc.) to the
management system,
6) be capable of provisioning complete or partial configuration
data to network devices dynamically as a result of network
specific or network-wide events,
7) provide efficient and reliable means compared to current
versions of today's mechanisms (CLI, SNMP) to provision large
amounts of configuration data,
Sanchez, et al. Informational [Page 7]
^L
RFC 3139 Requirements for Configuration Management June 2001
8) provide secure means to provision configuration data. The
system must provide support for access control, authentication,
integrity-checking, replay- protection and/or privacy security
services. The minimum level of granularity for access control
and authentication is host based. The system SHOULD support
user/role based access control and authentication for users in
different roles with different access privileges,
9) provide expiration time and effective time capabilities to
configuration data. It is required that some configuration
data items be set to expire, and other items be set to never
expire,
10) provide error detection (including data-specific errors) and
failure recovery mechanisms (including prevention of
inappropriately partial configurations when needed) for the
provisioning of configuration data,
11) eliminate the potential for mis-configuration occurring through
concurrent shared write access to the device's configuration
data,
12) provide facilities (with host and user-based authentication
granularity) to help in tracing back configuration changes,
13) allow for the use of redundant components, both network
elements and configuration application platforms, and for the
configuration of redundant network elements.
14) be flexible and extensible to accommodate future needs.
Configuration management data models are not fixed for all time
and are subject to evolution like any other management data
model. It is therefore necessary to anticipate that changes
will be needed, but it is not possible to anticipate what those
changes might be. Such changes could be to the configuration
data model, supporting message types, data types, etc., and to
provide mechanisms that can deal with these changes effectively
without causing inter-operability problems or having to
replace/update large amounts of fielded networking devices,
15) leverage knowledge of the existing SNMP management
infrastructure. The system MUST leverage knowledge of and
experience with MIBs and SMI.
Sanchez, et al. Informational [Page 8]
^L
RFC 3139 Requirements for Configuration Management June 2001
Security Considerations
This document reflects the current requirements that the IETF
believes configuration management systems MUST have to properly
support IP-based networks. The authors believe that a configuration
management system MUST provide mechanisms by which one can ascertain
the integrity and authenticity of the configuration data at all
times. In some cases the privacy of the data is important therefore
configuration management system MUST provide facilities to support
this services as required not only while the data is stored but also
during provisioning or reception. Requirements eight and twelve
capture the required security services.
Acknowledgments
The authors thank Juergen Schoenwaelder for his contributions to this
document. The authors also thank Walter Weiss and Andrew Smith for
providing feedback to early versions of this document. Finally, the
authors thank the IESG for motivating and supporting this work.
References
[Bra97] Bradner, S., "Key Words for use in RFCs to indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[COPS] Boyle, J., Cohen, R., Durham, D., Herzog, S., Rajan, R.
and A. Sastry, "The COPS (Common Open Policy Service)
Protocol", RFC 2748, August 1999.
[RSVP] Braden, R., Editor, et al., "Resource ReSerVation
Protocol (RSVP) Version 1 - Functional Specification",
RFC 2205, September 1997.
[COPS-RSVP] Boyle, J., Cohen, R., Durham, D., Herzog, S., Rajan, R.
and A. Sastry, "COPS usage for RSVP", RFC 2749, June
1999.
[COPS-PROV] Chan, K., Seligson, J., Durham, D., Gai, S., McCloghrie,
K., Herzog, S., Reichmeyer, F., Yavatkar, R. and A.
Smith, "COPS Usage for Policy Provisioning (COPS-PR)",
RFC 3084, March 2001.
Sanchez, et al. Informational [Page 9]
^L
RFC 3139 Requirements for Configuration Management June 2001
Authors' Addresses
Keith McCloghrie
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
Phone: +1 (408) 526-5260
EMail: kzm@cisco.com
Luis A. Sanchez
Megisto Systems
20251 Century Boulevard
Germantown, MD 02138
USA
Phone: +1 (301) 444-1747
EMail: lsanchez@megisto.com
Jon Saperia
JDS Consulting, Inc.
174 Chapman Street
Watertown, MA 02472
USA
Phone: +1 (617) 744-1079
EMail: saperia@jdscons.com
Sanchez, et al. Informational [Page 10]
^L
RFC 3139 Requirements for Configuration Management June 2001
Full Copyright Statement
Copyright (C) The Internet Society (2001). All Rights Reserved.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it
or assist in its implementation may be prepared, copied, published
and distributed, in whole or in part, without restriction of any
kind, provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of
developing Internet standards in which case the procedures for
copyrights defined in the Internet Standards process must be
followed, or as required to translate it into languages other than
English.
The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns.
This document and the information contained herein is provided on an
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Acknowledgement
Funding for the RFC Editor function is currently provided by the
Internet Society.
Sanchez, et al. Informational [Page 11]
^L
|