1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
|
Network Working Group E. Boschi
Request for Comments: 5153 Hitachi Europe
Category: Informational L. Mark
Fraunhofer FOKUS
J. Quittek
M. Stiemerling
NEC
P. Aitken
Cisco Systems, Inc.
April 2008
IP Flow Information Export (IPFIX) Implementation Guidelines
Status of This Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
Abstract
The IP Flow Information Export (IPFIX) protocol defines how IP Flow
information can be exported from routers, measurement probes, or
other devices. This document provides guidelines for the
implementation and use of the IPFIX protocol. Several sets of
guidelines address Template management, transport-specific issues,
implementation of Exporting and Collecting Processes, and IPFIX
implementation on middleboxes (such as firewalls, network address
translators, tunnel endpoints, packet classifiers, etc.).
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. IPFIX Documents Overview . . . . . . . . . . . . . . . . . 3
1.2. Overview of the IPFIX Protocol . . . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4
3. Template Management Guidelines . . . . . . . . . . . . . . . . 4
3.1. Template Management . . . . . . . . . . . . . . . . . . . 4
3.2. Template Records versus Options Template Records . . . . . 5
3.3. Using Scopes . . . . . . . . . . . . . . . . . . . . . . . 6
3.4. Multiple Information Elements of the Same Type . . . . . . 6
3.5. Selecting Message Size . . . . . . . . . . . . . . . . . . 6
4. Exporting Process Guidelines . . . . . . . . . . . . . . . . . 7
4.1. Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.2. Information Element Coding . . . . . . . . . . . . . . . . 7
4.3. Using Counters . . . . . . . . . . . . . . . . . . . . . . 8
4.4. Padding . . . . . . . . . . . . . . . . . . . . . . . . . 8
Boschi, et al. Informational [Page 1]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
4.4.1. Alignment of Information Elements within a Data
Record . . . . . . . . . . . . . . . . . . . . . . . . 9
4.4.2. Alignment of Information Element Specifiers within
a Template Record . . . . . . . . . . . . . . . . . . 9
4.4.3. Alignment of Records within a Set . . . . . . . . . . 9
4.4.4. Alignment of Sets within an IPFIX Message . . . . . . 9
4.5. Time Issues . . . . . . . . . . . . . . . . . . . . . . . 10
4.6. IPFIX Message Header Export Time and Data Record Time . . 10
4.7. Devices without an Absolute Clock . . . . . . . . . . . . 11
5. Collecting Process Guidelines . . . . . . . . . . . . . . . . 11
5.1. Information Element (De)Coding . . . . . . . . . . . . . . 11
5.2. Reduced-Size Encoding of Information Elements . . . . . . 12
5.3. Template Management . . . . . . . . . . . . . . . . . . . 12
6. Transport-Specific Guidelines . . . . . . . . . . . . . . . . 12
6.1. SCTP . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
6.2. UDP . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
6.3. TCP . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
7. Guidelines for Implementation on Middleboxes . . . . . . . . . 18
7.1. Traffic Flow Scenarios at Middleboxes . . . . . . . . . . 20
7.2. Location of the Observation Point . . . . . . . . . . . . 21
7.3. Reporting Flow-Related Middlebox Internals . . . . . . . . 22
7.3.1. Packet Dropping Middleboxes . . . . . . . . . . . . . 23
7.3.2. Middleboxes Changing the DSCP . . . . . . . . . . . . 23
7.3.3. Middleboxes Changing IP Addresses and Port Numbers . . 24
8. Security Guidelines . . . . . . . . . . . . . . . . . . . . . 25
8.1. Introduction to TLS and DTLS for IPFIX Implementers . . . 25
8.2. X.509-Based Identity Verification for IPFIX over TLS
or DTLS . . . . . . . . . . . . . . . . . . . . . . . . . 25
8.3. Implementing IPFIX over TLS over TCP . . . . . . . . . . . 26
8.4. Implementing IPFIX over DTLS over UDP . . . . . . . . . . 26
8.5. Implementing IPFIX over DTLS over SCTP . . . . . . . . . . 27
9. Extending the Information Model . . . . . . . . . . . . . . . 27
9.1. Adding New IETF-Specified Information Elements . . . . . . 27
9.2. Adding Enterprise-Specific Information Elements . . . . . 28
10. Common Implementation Mistakes . . . . . . . . . . . . . . . . 28
10.1. IPFIX and NetFlow Version 9 . . . . . . . . . . . . . . . 28
10.2. Padding of the Data Set . . . . . . . . . . . . . . . . . 29
10.3. Field ID Numbers . . . . . . . . . . . . . . . . . . . . . 30
10.4. Template ID Numbers . . . . . . . . . . . . . . . . . . . 30
11. Security Considerations . . . . . . . . . . . . . . . . . . . 30
12. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 31
13. References . . . . . . . . . . . . . . . . . . . . . . . . . . 31
13.1. Normative References . . . . . . . . . . . . . . . . . . . 31
13.2. Informative References . . . . . . . . . . . . . . . . . . 31
Boschi, et al. Informational [Page 2]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
1. Introduction
The IPFIX protocol [RFC5101] defines how IP Flow information can be
exported from routers, measurement probes, or other devices. In this
document, we provide guidelines for its implementation.
The guidelines are split into seven main sets. These sets address
implementation aspects for Template management, Exporting Process,
Collecting Process, transport, implementation on middleboxes,
security, and extending the information model.
Finally, this document contains a list of common mistakes related to
issues that had been misinterpreted in the first IPFIX
implementations and that created (and still might create)
interoperability problems.
1.1. IPFIX Documents Overview
The IPFIX protocol [RFC5101] provides network administrators with
access to IP Flow information. The architecture for the export of
measured IP Flow information out of an IPFIX Exporting Process to a
Collecting Process is defined in the IPFIX architecture [IPFIX-ARCH],
per the requirements defined in [RFC3917].
The IPFIX architecture [IPFIX-ARCH] specifies how IPFIX Data Records
and Templates are carried via a congestion-aware transport protocol
from IPFIX Exporting Processes to IPFIX Collecting Processes.
IPFIX has a formal description of IPFIX Information Elements, their
name, type, and additional semantic information, as specified in the
IPFIX information model [RFC5102].
Finally, the IPFIX applicability statement [IPFIX-AS] describes what
type of applications can use the IPFIX protocol and how they can use
the information provided. It furthermore shows how the IPFIX
framework relates to other architectures and frameworks.
1.2. Overview of the IPFIX Protocol
In the IPFIX protocol, { type, length, value } tuples are expressed
in Templates containing { type, length } pairs, specifying which
{ value } fields are present in Data Records conforming to the
Template, giving great flexibility as to what data is transmitted.
Since Templates are sent very infrequently compared with Data
Records, this results in significant bandwidth savings.
Boschi, et al. Informational [Page 3]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
Different Data Records may be transmitted simply by sending new
Templates specifying the { type, length } pairs for the new data
format. See [RFC5101] for more information.
The IPFIX information model [RFC5102] defines a large number of
standard Information Elements that provide the necessary
{ type } information for Templates.
The use of standard elements enables interoperability among different
vendors' implementations. The list of standard elements may be
extended in the future through the process defined in Section 9,
below. Additionally, non-standard enterprise-specific elements may
be defined for private use.
2. Terminology
The terminology used in this document is fully aligned with the
terminology defined in [RFC5101]. Therefore, the terms defined in
the IPFIX terminology are capitalized in this document, as in other
IPFIX documents ([RFC5101], [RFC5102], [IPFIX-ARCH]).
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
This document is Informational. It does not specify a protocol and
does not use RFC 2119 key words [RFC2119] such as "MUST" and
"SHOULD", except in quotations and restatements from the IPFIX
standards documents. The normative specification of the protocol is
given in the IPFIX protocol [RFC5101] and information model [RFC5102]
documents.
3. Template Management Guidelines
3.1. Template Management
The Exporting Process should always endeavor to send Template Records
before the related Data Records. However, since the Template Record
may not arrive before the corresponding Data Records, the Collecting
Process MAY store Data Records with an unknown Template ID pending
the arrival of the corresponding Template (see Section 9 of
[RFC5101]). If no Template becomes available, we recommend logging
the event and discarding the corresponding Data Records, and for SCTP
and TCP we recommend resetting the Transport Session. The amount of
time the Collecting Process waits for a Template before resetting
should be configurable. We recommend a default of 30 minutes. Note
Boschi, et al. Informational [Page 4]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
that when using UDP as the transport protocol, this delay should be
bound, when possible, by the Template Retransmit and the Template
Expiry times (see Section 6.2).
The Exporting Process must be able to resend active Templates.
Templates must be resent in the case of a Stream Control Transport
Protocol (SCTP) association restart, a User Datagram Protocol (UDP)
template refresh, or a Transmission Control Protocol (TCP) connection
restart.
The Exporting Process is responsible for the management of Template
IDs. Should an insufficient number of Template IDs be available, the
Exporting Process must send a Template Withdrawal Message in order to
free up the allocation of unused Template IDs. Note that UDP doesn't
use the Template Withdrawal Message, and the Template lifetime on the
Collecting Process relies on timeout.
3.2. Template Records versus Options Template Records
The IPFIX protocol [RFC5101] defines and specifies the use of
Templates and Options Templates. Templates define the layout of Data
Records, which represent Flow data. Options Templates additionally
specify scope Information Elements, which can be used to define
scoped Data Records. Scoped Data Records generally export control
plane data (such as metadata about processes in the IPFIX collection
architecture) or data otherwise applicable to multiple Flow Data
Records (such as common properties as in [IPFIX-REDUCING]).
Aside from Section 4 of [RFC5101], which defines specific Options
Templates to use for reporting Metering Process and Exporting Process
statistics and configuration information, the choice to use Options
Templates is left up to the implementer. Indeed, there is a trade-
off between bandwidth efficiency and complexity in the use of Options
Templates and scoped Data Records.
For example, control plane information about an Observation Point
could be exported with every Flow Record measured at that Observation
Point, or in a single Data Record described by an Options Template,
scoped to the Observation Point identifier. In the former case,
simplicity of decoding the data is gained in exchange for redundant
export of the same data with every applicable Flow Record. The
latter case is more bandwidth-efficient, but at the expense of
requiring the Collecting Process to maintain the relationship between
each applicable Flow Record and the Observation Point.
A generalized method of using Options Templates to increase bandwidth
efficiency is fully described in [IPFIX-REDUCING].
Boschi, et al. Informational [Page 5]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
3.3. Using Scopes
The root scope for all IPFIX Messages is the Observation Domain,
which appears in the Message Header. In other words, all Data
Records within a message implicitly belong to the Observation Domain.
All Data Records described by Options Templates (and only those) must
be restricted to an additional scope within the Observation Domain,
as defined by the scope Information Elements in the Options Template
Record.
In IPFIX, any Information Element can be used for scope. However,
Information Elements such as counters, timestamps, padding elements,
Flow properties like timeout, Flow end reason, duration, or Min/Max
Flow properties [RFC5102] may not be appropriate.
Note that it is sometimes necessary to export information about
entities that exist outside any Observation Domain, or within
multiple Observation Domains (e.g., information about Metering
Processes scoped to meteringProcessID). Such information SHOULD be
exported in an IPFIX Message with Observation Domain ID 0 (see
[RFC5101], Section 3.1).
3.4. Multiple Information Elements of the Same Type
The Exporting Process and Collecting Process MUST support the use of
multiple Information Elements of the same type in a single Template
[RFC5101]. This was first required by Packet Sampling (PSAMP)
[PSAMP-PROTO] for the export of multiple Selector IDs. Note that the
IPFIX protocol recommends that Metering Processes SHOULD use packet
treatment order when exporting multiple Information Elements of the
same type in the same record ([RFC5101] Section 8). This implies
that ordering is important, and changes to the order of multiple
identical Information Elements could cause information loss.
Therefore, we strongly recommend preservation of the order of
multiple Information Elements of the same type by Exporting and
Collecting Processes for correct processing and storage.
3.5. Selecting Message Size
Section 10.3.3 of the IPFIX protocol defines the maximum message size
for IPFIX Messages transported over UDP to be constrained by the path
MTU, or if the path MTU is not available, 512 bytes, which is the
minimum datagram size all IP implementations must support (see also
Section 8.4). However, no maximum message size is imposed on other
transport protocols, beyond the 65535-byte limit imposed by the 16-
bit Message Length field in the IPFIX Message Header specified in
Section 3.1 of [RFC5101].
Boschi, et al. Informational [Page 6]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
An IPFIX Exporting Process operating over SCTP or TCP may export
IPFIX Messages up to this 64-kB limit, and an IPFIX Collecting
Process must accept any IPFIX Message up to that size.
4. Exporting Process Guidelines
4.1. Sets
A Set is identified by a Set ID [RFC5101]. A Set ID has an integral
data type and its value is in the range of 0-65535. The Set ID
values of 0 and 1 are not used for historical reasons [RFC3954]. A
value of 2 identifies a Template Set. A value of 3 identifies an
Options Template Set. Values from 4 to 255 are reserved for future
use. Values above 255 are used for Data Sets. In this case, the Set
ID corresponds to the Template ID of the used Template.
A Data Set received with an unknown Set ID may be stored pending the
arrival of the corresponding Template (see Section 9 of [RFC5101]).
If no Template becomes available, we recommend logging the event and
discarding the corresponding Data Records, and for SCTP and TCP we
recommend resetting the Transport Session. The amount of time the
Collecting Process waits for a Template before resetting should be
configurable. We recommend a default of 30 minutes. Note that when
using UDP as the transport protocol, this delay should be bound, when
possible, by the Template Retransmit and the Template Expiry times
(see Section 6.2).
The arrival of a Set with a reserved Set ID should be logged, and the
Collector must ignore the Set.
4.2. Information Element Coding
[IPFIX-ARCH] does not specify which entities are responsible for the
encoding and decoding of Information Elements transferred via IPFIX.
An IPFIX device can do the encoding either within the Metering
Process or within the Exporting Process. The decoding of the
Information Elements can be done by the Collecting Process or by the
data processing application.
If an IPFIX node simply relays IPFIX Records (like a proxy), then no
decoding or encoding of Information Elements is needed. In this
case, the Exporting Process may export unknown Information Elements,
i.e., Information Elements with an unknown Information Element
identifier.
Boschi, et al. Informational [Page 7]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
4.3. Using Counters
IPFIX offers both Delta and Total counters (e.g., octetDeltaCount,
octetTotalCount). If information about a Flow is only ever exported
once, then it's not important whether Delta or Total counters are
used. However, if further information about additional packets in a
Flow is exported after the first export, then either:
o the metering system must reset its counters to zero after the
first export and report the new counter values using Delta
counters, or
o the metering system must carefully maintain its counters and
report the running total using Total counters.
At first, reporting the running total may seem to be the obvious
choice. However, this requires that the system accurately maintains
information about the Flow over a long time without any loss or
error, because when reported to a Collecting Process, the previous
total values will be replaced with the new information.
Delta counters offer some advantages: information about Flows doesn't
have to be permanently maintained, and any loss of information has
only a small impact on the total stored at the Collecting Process.
Finally, Deltas may be exported in fewer bytes than Total counters
using the IPFIX "Reduced Size Encoding" scheme [RFC5101].
Note that Delta counters have an origin of zero and that a Collecting
Process receiving Delta counters for a Flow that is new to the
Collecting Process must assume the Deltas are from zero.
4.4. Padding
The IPFIX information model defines an Information Element for
padding called paddingOctets [RFC5102]. It is of type octetArray,
and the IPFIX protocol allows encoding it as a fixed-length array as
well as a variable-length array.
The padding Information Element can be used to align Information
Elements within Data Records, Records within Sets, and Sets within
IPFIX Messages, as described below.
Boschi, et al. Informational [Page 8]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
4.4.1. Alignment of Information Elements within a Data Record
The padding Information Element gives flexible means for aligning
Information Elements within a Data Record. Aligning within a Data
Record can be useful, because internal data structures can be easily
converted into Flow Records at the Exporter and vice versa at the
Collecting Process.
Alignment of Information Elements within a Data Record is achieved by
inserting an instance of the paddingOctets Information Element with
appropriate length before each unaligned Information Element. This
insertion is explicitly specified within the Template Record or
Options Template Record, respectively, that corresponds to the Data
Record.
4.4.2. Alignment of Information Element Specifiers within a Template
Record
There is no means for aligning Information Element specifiers within
Template Records. However, there is limited need for such a method,
as Information Element specifiers are always 32-bit aligned, and 32-
bit alignment is generally sufficient.
4.4.3. Alignment of Records within a Set
There is no means for aligning Template Records within a Set.
However, there is limited need for such a method, as Information
Element specifiers are always 32-bit aligned, and 32-bit alignment is
generally sufficient.
Data Records can be aligned within a Set by appending instances of
the paddingOctets Information Element at the end of the Record.
Since all Data Records within a Set have the same structure and size,
aligning one Data Record implies aligning all the Data Records within
a single Set.
4.4.4. Alignment of Sets within an IPFIX Message
If Records are already aligned within a Set by using paddingOctets
Information Elements, then this alignment will already be achieved.
But for aligning Sets within an IPFIX Message, padding Information
Elements can be used at the end of the Set so that the subsequent Set
starts at an aligned boundary. This padding mechanism is described
in Section 3.3.1 of [RFC5101] and can be applied even if the Records
within the Set are not aligned. However, it should be noted that
this method is limited by the constraint that "the padding length
MUST be shorter than any allowable Record in the Set", to prevent the
padding from being misinterpreted as an additional Data Record.
Boschi, et al. Informational [Page 9]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
4.5. Time Issues
IPFIX Messages contain the export time in the Message Header. In
addition, there is a series of Information Elements defined to
transfer time values. [RFC5102] defines four abstract data types to
transfer time values in second, millisecond, microsecond, and
nanosecond resolution.
The accuracy and precision of these values depend on the accuracy and
the precision of the Metering Process clock. The accuracy and
precision of the Exporting Process clock, and the synchronization of
the Metering Process and Exporting Process clocks, are also important
when using the delta timestamp Information Elements. To ensure
accuracy, the clocks should be synchronized to a UTC time source.
Normally, it would be sufficient to derive the time from a remote
time server using the Network Time Protocol (NTP) [RFC1305]. IPFIX
Devices operating with time values of microsecond or nanosecond
resolution need direct access to a time source, for example, to a GPS
(Global Positioning System) unit.
The most important consideration in selecting timestamp Information
Elements is to use a precision appropriate for the timestamps as
generated from the Metering Process. Specifically, an IPFIX Device
should not export timestamp Information Elements of higher precision
than the timestamps used by the Metering Process (e.g., millisecond-
precision Flows should not be exported with flowStartMicroseconds and
flowEndMicroseconds).
4.6. IPFIX Message Header Export Time and Data Record Time
Section 5 of [RFC5101] defines a method for optimized export of time-
related Information Elements based upon the Export Time field of the
IPFIX Message Header. The architectural separation of the Metering
Process and Exporting Process in [IPFIX-ARCH] raises some
difficulties with this method, of which implementers should be aware.
Since the Metering Process has no information about the export time
of the IPFIX Message (that is, when the message leaves the Exporting
Process), it cannot properly use the delta time Information Elements;
it must store absolute timestamps and transmit these to the Exporting
Process. The Exporting Process must then convert these to delta
timestamps once the export time is known. This increases the
processing burden on the Exporting Process. Note also that the
absolute timestamps require more storage than their delta timestamp
counterparts. However, this method can result in reduced export
bandwidth.
Boschi, et al. Informational [Page 10]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
Alternatively, the Exporting Process may simply export absolute
timestamp Information Elements. This simplifies the Exporting
Process' job and reduces processing burden, but increases export
bandwidth requirements.
4.7. Devices without an Absolute Clock
Exporting just relative times in a device without an absolute clock
is often not sufficient. For instance, observed traffic could be
retained in the device's cache for some time before being exported
(e.g., if the Exporter runs once per minute), or stuck in an Inter
Process Communication (IPC) queue, or stuck in the export stack, or
delayed in the network between the Exporter and Collector.
For these reasons, it can be difficult for the Collecting Process to
convert the relative times exported using the flowStartSysUpTime and
flowEndSysUpTime Information Elements to absolute times with any sort
of accuracy without knowing the systemInitTimeMilliseconds.
Therefore, the sending of the flowStartSysUpTime and flowEndSysUpTime
Information Elements without also sending the
systemInitTimeMilliseconds Information Element is not recommended.
5. Collecting Process Guidelines
5.1. Information Element (De)Coding
Section 9 of [RFC5101] specifies: "The Collecting Process MUST note
the Information Element identifier of any Information Element that it
does not understand and MAY discard that Information Element from the
Flow Record". The Collecting Process may accept Templates with
Information Elements of unknown types. In this case, the value
received for these Information Elements should be decoded as an octet
array.
Alternatively, the Collecting Process may ignore Templates and
subsequent Data Sets that contain Information Elements of unknown
types.
It is recommended that Collecting Processes provide means to flexibly
add types of new Information Elements to their knowledge base. An
example is a configuration file that is read by the Collecting
Process and that contains a list of Information Element identifiers
and their corresponding types. Particularly for adding enterprise-
specific Information Elements, such a feature can be very useful.
Boschi, et al. Informational [Page 11]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
5.2. Reduced-Size Encoding of Information Elements
Since a Collector may receive data from the same device and
Observation Domain in two Templates using different reduced-size
encodings, it is recommended that the data be stored using full-size
encoding, to ensure that the values can be stored or even aggregated
together.
5.3. Template Management
Template IDs are generated dynamically by the Exporting Process.
They are unique per Transport Session and Observation Domain.
Therefore, for each Transport Session, the Collecting Process has to
maintain a list of Observation Domains. For each Observation Domain,
the Collecting Process has to maintain a list of current Template IDs
in order to decode subsequent Data Records.
Note that a restart of the Transport Session may lead to a Template
ID renumbering.
6. Transport-Specific Guidelines
IPFIX can use SCTP, TCP, or UDP as a transport protocol. IPFIX
implementations MUST support SCTP with partial reliability extensions
(PR-SCTP), and MAY support TCP and/or UDP (see [RFC5101], Section
10.1). In the IPFIX documents, the terms SCTP and PR-SCTP are often
used interchangeably to mean SCTP with partial reliability
extensions.
6.1. SCTP
PR-SCTP is the preferred transport protocol for IPFIX because it is
congestion-aware, reducing total bandwidth usage in the case of
congestion, but with a simpler state machine than TCP. This saves
resources on lightweight probes and router line cards.
SCTP, as specified in [RFC4960] with the PR-SCTP extension defined in
[RFC3758], provides several features not available in TCP or UDP.
The two of these most universally applicable to IPFIX
implementations, and which IPFIX implementers need to know about, are
multiple streams and per-message partial reliability.
An SCTP association may contain multiple streams. Streams are useful
for avoiding head-of-line blocking, thereby minimizing end-to-end
delay from the Exporting Process to the Collecting Process. Example
Boschi, et al. Informational [Page 12]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
applications for this feature would be using one SCTP stream per
Observation Domain, one stream per type of data (or Template ID), or
one stream for Flow data and one for metadata.
An Exporting Process may request any number of streams, and may send
IPFIX Messages containing any type of Set (Data Set, Template Set,
etc.) on any stream. A Collecting Process MUST be able to process
any Message received on any stream.
Stream negotiation is a feature of the SCTP protocol. Note, however,
that the IPFIX protocol doesn't provide any mechanism for the
Exporter to convey any information about which streams are in use to
the Collector. Therefore, stream configuration must be done out of
band.
One extra advantage of the PR-SCTP association is its ability to send
messages with different levels of reliability, selected according to
the application. For example, billing or security applications might
require reliable delivery of all their IPFIX Messages, while capacity
planning applications might be more tolerant of message loss. SCTP
allows IPFIX Messages for all these applications to be transported
over the same association with the appropriate level of reliability.
IPFIX Messages may be sent with full or partial reliability, on a
per-message basis. Fully reliable delivery guarantees that the IPFIX
Message will be received at the Collecting Process or that that SCTP
association will be reset, as with TCP. Partially reliable delivery
does not guarantee the receipt of the IPFIX Message at the Collecting
Process. This feature may be used to allow Messages to be dropped
during network congestion, i.e., while observing a Denial of Service
attack.
[RFC3758] defines the concept of a Partial Reliability policy, which
specifies the interface used to control partially reliable delivery.
It also defines a single example Partial Reliability policy called
"timed reliability", which uses a single parameter: lifetime. The
lifetime is specified per message in milliseconds, and after it
expires, no further attempt will be made to transmit the message.
Longer lifetimes specify more retransmission attempts per message and
therefore higher reliability; however, it should be noted that the
absolute reliability provided by a given lifetime is highly dependent
on network conditions, so an Exporting Process using the timed
reliability service should provide a mechanism for configuring the
lifetime of exported IPFIX Messages. Another possible Partial
Reliability policy could be limited retransmission, which guarantees
a specified number of retransmissions for each message. It is up to
the implementer to decide which Partial Reliability policy is most
appropriate for its application.
Boschi, et al. Informational [Page 13]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
There is an additional service provided by SCTP and useful in
conjunction with PR-SCTP: unordered delivery. This also works on a
per-message basis by declaring that a given message should be
delivered to the receiver as soon as it is queued rather than kept in
sequence; however, it should be noted that unless explicitly
requested by the sender, even messages sent partially reliably will
still be delivered in order. Unordered delivery should not be used
when the order of IPFIX Messages may matter: e.g., a Template or
Options Template. Unordered delivery should not be used when Total
counters are used, as reordering could result in the counter value
decreasing at the Collecting Process and even being left with a stale
value if the last message processed is stale.
By convention, when the IPFIX documents state a requirement for
reliable delivery (as, for example, the IPFIX protocol document does
for Template Sets, Options Template Sets, and Template Withdrawal
Messages), an IPFIX Exporting Process must not use partially reliable
delivery for those Messages. By default, and explicitly if the IPFIX
documents call for "partially reliable" or "unreliable" delivery, an
IPFIX Exporting Process may use partially reliable delivery if the
other requirements of the application allow.
The Collecting Process may check whether IPFIX Messages are lost by
checking the Sequence Number in the IPFIX header. The Collecting
Process should use the Sequence Number in the IPFIX Message Header to
determine whether any messages are lost when sent with partial
reliability. Sequence Numbers should be tracked independently for
each stream.
The following may be done to mitigate message loss:
o Increase the SCTP buffer size on the Exporter.
o Increase the bandwidth available for communicating the exported
Data Records.
o Use sampling, filtering, or aggregation in the Metering Process to
reduce the amount of exported data (see [RFC5101], Section
10.4.2.3).
o If partial reliability is used, switch to fully reliable delivery
on the Exporting Process or increase the level of partial
reliability (e.g., when using timed reliability, by specifying a
longer lifetime for exported IPFIX Messages).
Boschi, et al. Informational [Page 14]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
If the SCTP association is brought down because the IFPIX Messages
can't be exported reliably, the options are:
o Increase the SCTP buffer size on the Exporter.
o Increase the bandwidth available for communicating the exported
Data Records.
o Use sampling, filtering, or aggregation in the Metering Process to
reduce the amount of exported data.
Note that Templates must not be resent when using SCTP, without an
intervening Template Withdrawal or SCTP association reset. Note also
that since Template Sets and Template Withdrawal Messages may be sent
on any SCTP stream, a Template Withdrawal Message may withdraw a
Template sent on a different stream, and a Template Set may reuse a
Template ID withdrawn by a Template Withdrawal Message sent on a
different stream. Therefore, an Exporting Process sending Template
Withdrawal Messages should ensure to the extent possible that the
Template Withdrawal Messages and subsequent Template Sets reusing the
withdrawn Template IDs are received and processed at the Collecting
Process in proper order. The Exporting Process can achieve this by
one of two possible methods: 1. by sending a Template Withdrawal
Message reliably, in order, and on the same stream as the subsequent
Template Set reusing its ID; or 2. by waiting an appropriate amount
of time (on the scale of one minute) after sending a Template
Withdrawal Message before attempting to reuse the withdrawn Template
ID.
6.2. UDP
UDP is useful in simple systems where an SCTP stack is not available,
and where there is insufficient memory for TCP buffering.
However, UDP is not a reliable transport protocol, and IPFIX Messages
sent over UDP might be lost as with partially reliable SCTP streams.
UDP is not the recommended protocol for IPFIX and is intended for use
in cases in which IPFIX is replacing an existing NetFlow
infrastructure, with the following properties:
o A dedicated network,
o within a single administrative domain,
o where SCTP is not available due to implementation constraints, and
o the Collector is as topologically close as possible to the
Exporter.
Boschi, et al. Informational [Page 15]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
Note that because UDP itself provides no congestion control
mechanisms, it is recommended that UDP transport be used only on
managed networks, where the network path has been explicitly
provisioned for IPFIX traffic through traffic engineering mechanisms,
such as rate limiting or capacity reservations.
An important example of an explicitly provisioned, managed network
for IPFIX is the use of IPFIX to replace a functioning NetFlow
implementation on a dedicated network. In this situation, the
dedicated network should be provisioned in accordance with the
NetFlow deployment experience that Flow export traffic generated by
monitoring an interface will amount to 2-5% of the monitored
interface's bandwidth.
As recommended in [TSVWG-UDP], an application should not send UDP
messages that result in IP packets that exceed the MTU of the path to
the destination and should enable UDP checksums (see Sections 3.2 and
3.4 of [TSVWG-UDP], respectively).
Since IPFIX assumes reliable transport of Templates over SCTP, this
necessitates some changes for IPFIX Template management over UDP.
Templates sent from the Exporting Process to the Collecting Process
over UDP MUST be resent at regular time intervals; these intervals
MUST be configurable (see Section 10.3 of [RFC5101]).
We recommend a default Template-resend time of 10 minutes,
configurable between 1 minute and 1 day.
Note that this could become an interoperability problem; e.g., if an
Exporter resends Templates once per day, while a Collector expires
Templates hourly, then they may both be IPFIX-compatible, but not be
interoperable.
Retransmission time intervals that are too short waste bandwidth on
unnecessary Template retransmissions. On the other hand, time
intervals that are too long introduce additional costs or risk of
data loss by potentially requiring the Collector to cache more data
without having the Templates available to decode it.
To increase reliability and limit the amount of potentially lost
data, the Exporting Process may resend additional Templates using a
packet-based schedule. In this case, Templates are resent depending
on the number of data packets sent. Similarly to the time interval,
resending a Template every few packets introduces additional
overhead, while resending after a large amount of packets have
already been sent means high costs due to the data caching and
potential data loss.
Boschi, et al. Informational [Page 16]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
We recommend a default Template-resend interval of 20 packets,
configurable between 1 and 1000 data packets.
Note that a sufficiently small resend time or packet interval may
cause a system to become stuck, continually resending Templates or
Options Data. For example, if the resend packet interval is 2 (i.e.,
Templates or Options Data are to be sent in every other packet) but
more than two packets are required to send all the information, then
the resend interval will have expired by the time the information has
been sent, and Templates or Options Data will be sent continuously --
possibly preventing any data from being sent at all. Therefore, the
resend intervals should be considered from the last data packet, and
should not be tied to specific Sequence Numbers.
The Collecting Process should use the Sequence Number in the IPFIX
Message Header to determine whether any messages are lost.
The following may be done to mitigate message loss:
o Move the Collector topologically closer to the Exporter.
o Increase the bandwidth of the links through which the Data Records
are exported.
o Use sampling, filtering, or aggregation in the Metering Process to
reduce the amount of exported data.
o Increase the buffer size at the Collector and/or the Exporter.
Before using a Template for the first time, the Exporter may send it
in several different IPFIX Messages spaced out over a period of
packets in order to increase the likelihood that the Collector has
received the Template.
Template Withdrawal Messages MUST NOT be sent over UDP (per Section
10.3.6 of [RFC5101]). The Exporter must rely on expiration at the
Collector to expire old Templates or to reuse Template IDs.
We recommend that the Collector implements a Template Expiry of three
times the Exporter refresh rate.
However, since the IPFIX protocol doesn't provide any mechanism for
the Exporter to convey any information about the Template Expiry time
to the Collector, configuration must be done out of band.
Boschi, et al. Informational [Page 17]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
If no out-of-band configuration is made, we recommend to initially
set a Template Expiry time at the Collector of 60 minutes. The
Collecting Process may estimate each Exporting Process's resend time
and adapt the Expiry time for the corresponding Templates
accordingly.
6.3. TCP
TCP can be used as a transport protocol for IPFIX if one of the
endpoints has no support for SCTP, but a reliable transport is needed
and/or the network between the Exporter and the Collector has not
explicitly been provisioned for the IPFIX traffic. TCP is one of the
core protocols of the Internet and is widely supported.
The Exporting Process may resend Templates (per UDP, above), but it's
not required to do so, per Section 10.4.2.2 of [RFC5101]:
"A Collecting Process MUST record all Template and Options Template
Records for the duration of the connection, as an Exporting Process
is not required to re-export Template Records."
If the available bandwidth between Exporter and Collector is not
sufficient or the Metering Process generates more Data Records than
the Collector is capable of processing, then TCP congestion control
may cause the Exporter to block. Options in this case are:
o Increase the TCP buffer size on the Exporter.
o Increase the bandwidth of the links through which the Data Records
are exported.
o Use sampling, filtering, or aggregation in the Metering Process to
reduce the amount of exported data.
7. Guidelines for Implementation on Middleboxes
The term middlebox is defined in [RFC3234] as:
"any intermediary device performing functions other than the normal,
standard functions of an IP router on the datagram path between a
source host and destination host."
The list of middleboxes discussed in [RFC3234] contains:
1. Network Address Translation (NAT),
2. NAT-Protocol Translation (NAT-PT),
Boschi, et al. Informational [Page 18]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
3. SOCKS gateway,
4. IP tunnel endpoints,
5. packet classifiers, markers, schedulers,
6. transport relay,
7. TCP performance enhancing proxies,
8. load balancers that divert/munge packets,
9. IP firewalls,
10. application firewalls,
11. application-level gateways,
12. gatekeepers / session control boxes,
13. transcoders,
14. proxies,
15. caches,
16. modified DNS servers,
17. content and applications distribution boxes,
18. load balancers that divert/munge URLs,
19. application-level interceptors,
20. application-level multicast,
21. involuntary packet redirection,
22. anonymizers.
It is likely that since the publication of RFC 3234 new kinds of
middleboxes have been added.
While the IPFIX specifications [RFC5101] based the requirements on
the export protocol only (as the IPFIX name implies), these sections
cover the guidelines for the implementation of the Metering Process
by recommending which Information Elements to export for the
different middlebox considerations.
Boschi, et al. Informational [Page 19]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
7.1. Traffic Flow Scenarios at Middleboxes
Middleboxes may delay, reorder, drop, or multiply packets; they may
change packet header fields and change the payload. All these
actions have an impact on traffic Flow properties. In general, a
middlebox transforms a unidirectional original traffic Flow T that
arrives at the middlebox into a transformed traffic Flow T' that
leaves the middlebox.
+-----------+
T ---->| middlebox |----> T'
+-----------+
Figure 1: Unidirectional traffic Flow traversing a middlebox
Note that in an extreme case, T' may be an empty traffic Flow (a Flow
with no packets), for example, if the middlebox is a firewall and
blocks the Flow.
In case of a middlebox performing a multicast function, a single
original traffic Flow may be transformed into more than one
transformed traffic Flow.
+------> T'
|
+---------+-+
T ---->| middlebox |----> T''
+---------+-+
|
+------> T'''
Figure 2: Unidirectional traffic Flow traversing a middlebox with
multicast function
For bidirectional traffic Flows, we identify Flows on different sides
of the middlebox; say, T_l on the left side and T_r on the right
side.
+-----------+
T_l <--->| middlebox |<---> T_r
+-----------+
Figure 3: Bidirectional unicast traffic Flow traversing a middlebox
In case of a NAT, T_l might be a traffic Flow in a private address
realm and T_r the translated traffic Flow in the public address
realm. If the middlebox is a NAT-PT, then T_l may be an IPv4 traffic
Flow and T_r the translated IPv6 traffic Flow.
Boschi, et al. Informational [Page 20]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
At tunnel endpoints, Flows are multiplexed or demultiplexed. In
general, tunnel endpoints can deal with bidirectional traffic Flows.
+------> T_r1
v
+---------+-+
T_l <--->| middlebox |<---> T_r2
+---------+-+
^
+------> T_r3
Figure 4: Multiple data reduction
An example is a traffic Flow T_l of a tunnel and Flows T_rx that are
multiplexed into or demultiplexed out of a tunnel. According to the
IPFIX definition of traffic Flows in [RFC5101], T and T' or T_l and
T_rx, respectively, are different Flows in general.
However, from an application point of view, they might be considered
as closely related or even as the same Flow, for example, if the
payloads they carry are identical.
7.2. Location of the Observation Point
Middleboxes might be integrated with other devices. An example is a
router with a NAT or a firewall at a line card. If an IPFIX
Observation Point is located at the line card, then the properties of
measured traffic Flows may depend on the side of the integrated
middlebox at which packets were captured for traffic Flow
measurement.
Consequently, an Exporting Process reporting traffic Flows measured
at a device that hosts one or more middleboxes should clearly
indicate to Collecting Processes the location of the used Observation
Point(s) with respect to the middlebox(es). This can be done by
using Options with Observation Point as scope and elements like, for
instance, lineCardID or samplerID. Otherwise, processing the
measured Flow data could lead to wrong results.
At first glance, choosing an Observation Point that covers the entire
middlebox looks like an attractive choice. But this leads to
ambiguities for all kinds of middleboxes. Within the middlebox,
properties of packets are modified, and it should be clear at a
Collecting Process whether packets were observed and metered before
or after modification. For example, it must be clear whether a
reported source IP address was observed before or after a NAT changed
it or whether a reported packet count was measured before or after a
Boschi, et al. Informational [Page 21]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
firewall dropped packets. For this reason, [RFC5102] provides
Information Elements with prefix "post" for Flow properties that are
changed within a middlebox.
If an Observation Point is located inside a middlebox, the middlebox
must have well-defined and well-separated internal functions, for
example, a combined NAT and firewall, and the Observation Point
should be located on a boundary between middlebox functions rather
than within one of the functions.
7.3. Reporting Flow-Related Middlebox Internals
While this document recommends IPFIX implementations using
Observation Points outside of middlebox functions, there are a few
special cases where reporting Flow-related internals of a middlebox
is of interest.
For many applications that use traffic measurement results, it is
desirable to get more information than can be derived from just
observing packets on one side of a middlebox. If, for example,
packets are dropped by the middlebox acting as a firewall, NAT, or
traffic shaper, then information about how many observed packets are
dropped may be of high interest.
This section gives recommendations on middlebox internal information
that may be reported if the IPFIX Observation Point is co-located
with one or more middleboxes. Since the internal information to be
reported depends on the kind of middlebox, it is discussed per kind.
The recommendations cover middleboxes that act per packet and that do
not modify the application-level payload of the packet (except by
dropping the entire packet) and that do not insert additional packets
into an application-level or transport-level traffic stream.
Covered are the packet-level middleboxes of kinds 1, 2, 3, 5, 9, 10,
21, and 22 (according to the enumeration given at the beginning of
Section 7 of this document). Not covered are 4, 6-8 and 11-20. TCP
performance-enhancing proxies (7) are not covered because they may
add ACK packets to a TCP connection.
Still, if possible, IPFIX implementations co-located with uncovered
middleboxes (i.e., of type 7 or 11-20) should follow the
recommendations given in this section if they can be applied in a way
that reflects the intention of these recommendations.
Boschi, et al. Informational [Page 22]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
7.3.1. Packet Dropping Middleboxes
If an IPFIX Observation Point is co-located with one or more
middleboxes that potentially drop packets, then the corresponding
IPFIX Exporting Process should be able to report the number of
packets that were dropped per reported Flow.
Concerned kinds of middleboxes are NAT (1), NAT-PT (2), SOCKS gateway
(3), packet schedulers (5), IP firewalls (9) and application-level
firewalls (10).
7.3.2. Middleboxes Changing the DSCP
If an IPFIX Observation Point is co-located with one or more
middleboxes that potentially modify the Diffserv Code Point (DSCP,
see [RFC2474]) in the IP header, then the corresponding IPFIX
Exporting Process should be able to report both the observed incoming
DSCP value and also the DSCP value on the 'other' side of the
middlebox (if this is a constant value for the particular traffic
flow). The related Information Elements specified in [RFC5102] are:
IpClassOfService and postIpClassOfService.
Note that the current IPFIX information model only contains
Information Elements supporting packets observed before the DSCP
change, i.e. ipClassOfService and postIpClassOfService, where the
latter reports the value of the IP TOS field after the DSCP change.
We recommend, whenever possible, to move the Observation Point to the
point before the DSCP change and report the Observed and post-
values. If reporting the value of the IP TOS field before DSCP
change is required, "pre" values can be exported using enterprise-
specific Information Elements.
Note also that a classifier may change the same DSCP value of packets
from the same Flow to different values depending on the packet or
other conditions. Also, it is possible that packets of a single
unidirectional arriving Flow contain packets with different DSCP
values that are all set to the same value by the middlebox. In both
cases, there is a constant value for the DSCP field in the IP packet
header to be observed on one side of the middlebox, but on the other
side the value may vary. In such a case, reliable reporting of the
DSCP value on the 'other' side of the middlebox is not possible by
just reporting a single value. According to the IPFIX information
model [RFC5102], the first value observed for the DSCP is reported by
the IPFIX protocol in that case.
This recommendation applies to packet markers (5).
Boschi, et al. Informational [Page 23]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
7.3.3. Middleboxes Changing IP Addresses and Port Numbers
If an IPFIX Observation Point is co-located with one or more
middleboxes that potentially modify the:
o IP version field,
o IP source address header field,
o IP destination address header field,
o Source transport port number, or
o Destination transport port number
in one of the headers, then the corresponding IPFIX Exporting Process
should be able to report the 'translated' value of these fields, as
far as they have constant values for the particular traffic Flow, in
addition to the observed values of these fields.
If the changed values are not constant for the particular traffic
Flow but still reporting is desired, then it is recommended that the
general rule from [RFC5102] for Information Elements with changing
values is applied: the reported value is the one that applies to the
first packet observed for the reported Flow.
Note that the 'translated' value of the fields can be the values
before or after the translation depending on the Flow direction and
the location of the Observation Point with respect to the middlebox.
We always call the value that is not the one observed at the
Observation Point the translated value.
Note also that a middlebox may change the same port number value of
packets from the same Flow to different values depending on the
packet or other conditions. Also, it is possible that packets of
different unidirectional arriving Flows with different source/
destination port number pairs may be mapped to a single Flow with a
single source/destination port number pair by the middlebox. In both
cases, there is a constant value for the port number pair to be
observed on one side of the middlebox, but on the other side the
values may vary. In such a case, reliable reporting of the port
number pairs on the 'other' side of the middlebox is not possible.
According to the IPFIX information model [RFC5102], the first value
observed for each port number is reported by the IPFIX protocol in
that case.
Boschi, et al. Informational [Page 24]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
This recommendation applies to NAT (1), NAT-PT (2), SOCKS gateway (3)
and involuntary packet redirection (21) middleboxes. It may also be
applied to anonymizers (22), though it should be noted that this
carries the risk of losing the effect of anonymization.
8. Security Guidelines
8.1. Introduction to TLS and DTLS for IPFIX Implementers
Transport Layer Security (TLS) [RFC4346] and Datagram Transport Layer
Security (DTLS) [RFC4347] are the REQUIRED protocols for securing
network traffic exported with IPFIX (see Section 11 of [RFC5101]).
TLS requires a reliable transport channel and is selected as the
security mechanism for TCP. DTLS is a version of TLS capable of
securing datagram traffic and is selected for UDP, SCTP, and PR-SCTP.
When mapping TLS terminology used in [RFC4346] to IPFIX terminology,
keep in mind that the IPFIX Exporting Process, as it is the
connection initiator, corresponds to the TLS client, and the IPFIX
Collecting Process corresponds to the TLS server. These terms apply
only to the bidirectional TLS handshakes done at Transport Session
establishment and completion time; aside from TLS connection set up
between the Exporting Process and the Collecting Process, and
teardown at the end of the session, the unidirectional Flow of
messages from Exporting Process to Collecting Process operates over
TLS just as over any other transport layer for IPFIX.
8.2. X.509-Based Identity Verification for IPFIX over TLS or DTLS
When using TLS or DTLS to secure an IPFIX Transport Session, the
Collecting Process and Exporting Process must use strong mutual
authentication. In other words, each IPFIX endpoint must have its
own X.509 certificate [RFC3280] and private key, and the Collecting
Process, which acts as the TLS or DTLS server, must send a
Certificate Request to the Exporting Process during the TLS
handshake, and fail to establish a session if the Exporting Process
does not present a valid certificate.
Each Exporting Process and Collecting Process must verify the
identity of its peer against a set of authorized peers. This may be
done by configuring a set of authorized distinguished names and
comparing the peer certificate's subject distinguished name against
each name in the set. However, if a private certification authority
(CA) is used to sign the certificates identifying the Collecting
Processes and Exporting Processes, and the set of certificates signed
by that private CA may be restricted to those identifying peers
authorized to communicate with each other, it is sufficient to merely
verify that the peer's certificate is issued by this private CA.
Boschi, et al. Informational [Page 25]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
When verifying the identity of its peer, an IPFIX Exporting Process
or Collecting Process must verify that the peer certificate's subject
common name or subjectAltName extension dNSName matches the fully-
qualified domain name (FQDN) of the peer. This involves retrieving
the expected domain name from the peer certificate and the address of
the peer, then verifying that the two match via a DNS lookup. Such
verification should require both that forward lookups (FQDN to peer
address) and reverse lookups (peer address to FQDN) match. In
deployments without DNS infrastructure, it is acceptable to represent
the FQDN as an IPv4 dotted-quad or a textual IPv6 address as in
[RFC1924].
8.3. Implementing IPFIX over TLS over TCP
Of the security solutions specified for IPFIX, TLS over TCP is as of
this writing the most mature and widely implemented. Until stable
implementations of DTLS over SCTP are widely available (see
Section 8.5, below), it is recommended that applications requiring
secure transport for IPFIX Messages use TLS over TCP.
When using TLS over TCP, IPFIX Exporting Processes and Collecting
Processes should behave in all other aspects as if using TCP as the
transport protocol, especially as regards the handling of Templates
and Template withdrawals.
8.4. Implementing IPFIX over DTLS over UDP
An implementation of the DTLS protocol version 1, described in
[RFC4347] and required to secure IPFIX over UDP, is available in
OpenSSL [OPENSSL] as of version 0.9.8. However, DTLS support is as
of this writing under active development and certain implementations
might be unstable. We recommend extensive testing of DTLS-based
IPFIX implementations to build confidence in the DTLS stack over
which your implementation runs.
When using DTLS over UDP, IPFIX Exporting Processes and Collecting
Processes should behave in all other aspects as if using UDP as the
transport protocol, especially as regards the handling of Templates
and Template timeouts.
Note that the selection of IPFIX Message sizes for DTLS over UDP must
account for overhead per packet introduced by the DTLS layer.
Boschi, et al. Informational [Page 26]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
8.5. Implementing IPFIX over DTLS over SCTP
As of this writing, there is no publicly available implementation of
DTLS over SCTP as described in [RFC4347] and [TUEXEN].
When using DTLS over SCTP, IPFIX Exporting Processes and Collecting
Processes should behave in all other aspects as if using SCTP as the
transport protocol, especially as regards the handling of Templates
and the use of reliable transport for Template and scope information.
An implementation of the DTLS protocol version 1, described in
[RFC4347] and required to secure IPFIX over SCTP, is available in
OpenSSL [OPENSSL] as of version 0.9.8. However, DTLS support is as
of this writing under active development and certain implementations
might be unstable. We recommend extensive testing of DTLS-based
IPFIX implementations to build confidence in the DTLS stack over
which your implementation runs.
9. Extending the Information Model
IPFIX supports two sets of Information Elements: IANA-registered
Information Elements and enterprise-specific Information Elements.
New Information Elements can be added to both sets as described in
this section. If an Information Element is considered of general
interest, it should be added to the set of IETF-specified Information
Elements that is maintained by IANA.
Alternatively, private enterprises can define proprietary Information
Elements for internal purposes. There are several potential reasons
for doing so. For example, the Information Element might only relate
to proprietary features of a device or protocol of the enterprise.
Also, pre-standard product delivery or commercially sensitive product
features might cause the need for enterprise-specific Information
Elements.
The IPFIX information model [RFC5102] document contains an XML-based
specification of Template, abstract data types, and IPFIX Information
Elements, which may be used to create consistent machine-readable
extensions to the IPFIX information model. This description can be
used for automatically checking syntactic correctness of the
specification of IPFIX Information Elements and for generating code
that deals with processing IPFIX Information Elements.
9.1. Adding New IETF-Specified Information Elements
New IPFIX Information Elements that are considered to be of general
interest should be added to the set of IETF-specified Information
Elements that is maintained by IANA.
Boschi, et al. Informational [Page 27]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
The introduction of new Information Elements in the IANA registry is
subject to expert review. As described in Section 7.1 of [RFC5102],
an expert review is performed by one of a group of experts designated
by an IETF Operations and Management Area Director. The experts will
initially be drawn from the Working Group Chairs and document editors
of the IPFIX and PSAMP Working Groups. The group of experts must
double check the Information Elements definitions with already
defined Information Elements for completeness, accuracy, redundancy,
and correct naming following the naming conventions in [RFC5102],
Section 2.3.
The specification of new IPFIX Information Elements must use the
Template specified in [RFC5102], Section 2.1, and must be published
using a well-established and persistent publication medium.
9.2. Adding Enterprise-Specific Information Elements
Enterprises or other organizations holding a registered Structure of
Management Information (SMI) network management private enterprise
code number can specify enterprise-specific Information Elements.
Their identifiers can be chosen arbitrarily within the range of
1-32767 and have to be coupled with a Private Enterprise Identifier
[PEN]. Enterprise identifiers MUST be registered as SMI network
management private enterprise code numbers with IANA. The registry
can be found at http://www.iana.org/assignments/enterprise-numbers.
10. Common Implementation Mistakes
The issues listed in this section were identified during
implementation and interoperability testing. They do not stem from
insufficient clarity in the protocol, but each of these was an actual
mistake made in a tested IPFIX implementation. They are listed here
for the convenience of future implementers.
10.1. IPFIX and NetFlow Version 9
A large group of mistakes stems from the fact that many implementers
started implementing IPFIX from an existing version of NetFlow
version 9 [RFC3954]. Despite their similarity, the two protocols
differ in many aspects. We list here some of the most important
differences.
o Transport protocol: NetFlow version 9 initially ran over UDP,
while IPFIX must have a congestion-aware transport protocol.
IPFIX specifies PR-SCTP as its mandatory protocol, while TCP and
UDP are optional.
Boschi, et al. Informational [Page 28]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
o IPFIX differentiates between IANA-registered and enterprise-
specific Information Elements. Enterprise-specific Information
Elements can be specified by coupling a non-IANA-registered
Information Element identifier with an Enterprise ID
(corresponding to the vendor that defined the Information
Element).
o Options Templates: in IPFIX, an Options Template must have a
scope, and the scope is not allowed to be of length zero. The
NetFlow version 9 specifications [RFC3954] don't specify that the
scope must not be of length zero.
Message Header:
o Set ID: Even if the packet headers are different between IPFIX and
NetFlow version 9, similar fields are used in both of them. The
difference between the two protocols is in the values that these
fields can assume. A typical example is the Set ID values: the
Set ID values of 0 and 1 are used in NetFlow version 9, while they
are not used in IPFIX.
o Length field: in NetFlow version 9, this field (called count)
contains the number of Records. In IPFIX, it indicates the total
length of the IPFIX Message, measured in octets (including Message
Header and Set(s)).
o Timestamp: the NetFlow version 9 header has an additional
timestamp: sysUpTime. It indicates the time in milliseconds since
the last reboot of the Exporting Process.
o The version number is different. NetFlow version 9 uses the
version number 9, while IPFIX uses the version number 10.
10.2. Padding of the Data Set
[RFC5101] specifies that the Exporting Process MAY insert some octets
for set padding to align Data Sets within a Message. The padding
length must be shorter than any allowable Record in that set.
It is important to respect this limitation: if the padding length is
equal to or longer than the length of the shortest Record, it will be
interpreted as another Record.
An alternative is to use the paddingOctets Information Element in the
Template definition.
Boschi, et al. Informational [Page 29]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
10.3. Field ID Numbers
Information Element numbers in IPFIX have the range 0-32767
(0-0x7FFF). Information Element numbers outside this range (i.e.,
with the high bit set) are taken to be enterprise-specific
Information Elements, which have an additional four-byte Private
Enterprise Number following the Information Element number and
length. Inadvertently setting the high bit of the Information
Element number by selecting a number out of this range will therefore
cause Template scanning errors.
10.4. Template ID Numbers
Template IDs are generated as required by the Exporting Process.
When the same set of Information Elements is exported at different
times, the corresponding Template is usually identified by different
Template IDs. Similarly, if multiple co-existing Templates are
composed of the same set of Information Elements, they are also
identified by different Template IDs. The Collecting Process does
not know in advance which Template ID a particular Template will use.
11. Security Considerations
This document describes the implementation guidelines of IPFIX. The
security requirements for the IPFIX target applications are addressed
in the IPFIX requirements document [RFC3917]. These requirements are
considered for the specification of the IPFIX protocol [RFC5101], for
which a Security Considerations Section exists.
Section 7 of this document recommends that IPFIX Exporting Processes
report internals about middleboxes. These internals may be security-
relevant, and the reported information needs to be protected
appropriately for reasons given below.
Reporting of packets dropped by firewalls and other packet-dropping
middleboxes carries the risk that this information can be used by
attackers for analyzing the configuration of the middlebox and for
developing attacks against it. Address translation may be used for
hiding the network structure behind an address translator. If an
IPFIX Exporting Process reports the translations performed by an
address translator, then parts of the network structure may be
revealed. If an IPFIX Exporting Process reports the translations
performed by an anonymizer, the main function of the anonymizer may
be compromised.
Note that there exist vulnerabilities in DTLS over SCTP as specified
in the IPFIX protocol, such that a third party could cause messages
to be undetectably lost, or an SCTP association to shut down. These
Boschi, et al. Informational [Page 30]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
vulnerabilities are addressed by [TUEXEN]; however, it is unclear
whether initial OpenSSL-based implementations of DTLS over SCTP will
contain the required fixes. DTLS over SCTP should be used with
caution in production environments until these issues are completely
addressed.
12. Acknowledgments
We would like to thank the MoMe project for organizing two IPFIX
Interoperability Events in July 2005 and in March 2006, and
Fraunhofer Fokus for organizing the third one in November 2006. The
Interoperability Events provided us precious input for this document.
Thanks to Brian Trammell for his contributions to the SCTP section
and the security guidelines and for the multiple thorough reviews.
We would also like to thank Benoit Claise, Carsten Schmoll, and
Gerhard Muenz for the technical review and feedback, and Michael
Tuexen, Randall Stewart, and Peter Lei for reviewing the SCTP
section.
13. References
13.1. Normative References
[RFC5101] Claise, B., Ed., "Specification of the IP Flow
Information Export (IPFIX) Protocol for the
Exchange of IP Traffic Flow Information", RFC 5101,
January 2008.
[RFC5102] Quittek, J., Bryant, S., Claise, B., Aitken, P.,
and J. Meyer, "Information Model for IP Flow
Information Export", RFC 5102, January 2008.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
13.2. Informative References
[IPFIX-AS] Zseby, T., Boschi, E., Brownlee, N., and B. Claise,
"IPFIX Applicability", Work in Progress, July 2007.
[IPFIX-ARCH] Sadasivan, G., Brownlee, N., Claise, B., and J.
Quittek, "Architecture for IP Flow Information
Export", Work in Progress, September 2006.
[IPFIX-REDUCING] Boschi, E., Mark, L., and B. Claise, "Reducing
Redundancy in IP Flow Information Export (IPFIX)
and Packet Sampling (PSAMP) Reports", Work
in Progress, May 2007.
Boschi, et al. Informational [Page 31]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
[PSAMP-PROTO] Claise, B., Quittek, J., and A. Johnson, "Packet
Sampling (PSAMP) Protocol Specifications", Work
in Progress, December 2007.
[TUEXEN] Tuexen, M. and E. Rescorla, "Datagram Transport
Layer Security for Stream Control Transmission
Protocol", Work in Progress, November 2007.
[TSVWG-UDP] Eggert, L. and G. Fairhurst, "UDP Usage Guidelines
for Application Designers", Work in Progress,
February 2008.
[RFC1305] Mills, D., "Network Time Protocol (Version 3)
Specification, Implementation and Analysis",
RFC 1305, March 1992.
[RFC1924] Elz, R., "A Compact Representation of IPv6
Addresses", RFC 1924, April 1996.
[RFC2474] Nichols, K., Blake, S., Baker, F., and D. Black,
"Definition of the Differentiated Services Field
(DS Field) in the IPv4 and IPv6 Headers", RFC 2474,
December 1998.
[RFC3234] Carpenter, B. and S. Brim, "Middleboxes: Taxonomy
and Issues", RFC 3234, February 2002.
[RFC3280] Housley, R., Polk, W., Ford, W., and D. Solo,
"Internet X.509 Public Key Infrastructure
Certificate and Certificate Revocation List (CRL)
Profile", RFC 3280, April 2002.
[RFC3758] Stewart, R., Ramalho, M., Xie, Q., Tuexen, M., and
P. Conrad, "Stream Control Transmission Protocol
(SCTP) Partial Reliability Extension", RFC 3758,
May 2004.
[RFC3917] Quittek, J., Zseby, T., Claise, B., and S. Zander,
"Requirements for IP Flow Information Export
(IPFIX)", RFC 3917, October 2004.
[RFC3954] Claise, B., Ed., "Cisco Systems NetFlow Services
Export Version 9", RFC 3954, October 2004.
[RFC4346] Dierks, T. and E. Rescorla, "The Transport Layer
Security (TLS) Protocol Version 1.1", RFC 4346,
April 2006.
Boschi, et al. Informational [Page 32]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
[RFC4347] Rescorla, E. and N. Modadugu, "Datagram Transport
Layer Security", RFC 4347, April 2006.
[RFC4960] Stewart, R., Ed., "Stream Control Transmission
Protocol", RFC 4960, September 2007.
[OPENSSL] OpenSSL, "OpenSSL: The Open Source toolkit for SSL/
TLS", <http://www.openssl.org/>.
[PEN] IANA, "PRIVATE ENTERPRISE NUMBERS", <http://
www.iana.org/assignments/enterprise-numbers>.
Authors' Addresses
Elisa Boschi
Hitachi Europe
c/o ETH Zurich
Gloriastr. 35
8092 Zurich
Switzerland
Phone: +41 44 6327057
EMail: elisa.boschi@hitachi-eu.com
Lutz Mark
Fraunhofer FOKUS
Kaiserin Augusta Allee 31
10589 Berlin
Germany
Phone: +49 421 2246-206
EMail: lutz.mark@ifam.fraunhofer.de
Juergen Quittek
NEC Europe Ltd.
Kurfuersten-Anlage 36
69115 Heidelberg
Germany
Phone: +49 6221 4342-115
EMail: quittek@nw.neclab.eu
Boschi, et al. Informational [Page 33]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
Martin Stiemerling
NEC Europe Ltd.
Kurfuersten-Anlage 36
69115 Heidelberg
Germany
Phone: +49 6221 4342-113
EMail: stiemerling@nw.neclab.eu
Paul Aitken
Cisco Systems, Inc.
96 Commercial Quay
Edinburgh EH6 6LX
Scotland
Phone: +44 131 561 3616
EMail: paitken@cisco.com
Boschi, et al. Informational [Page 34]
^L
RFC 5153 IPFIX Implementation Guidelines April 2008
Full Copyright Statement
Copyright (C) The IETF Trust (2008).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Boschi, et al. Informational [Page 35]
^L
|