<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-opsawg-rfc5706bis-03" category="bcp" consensus="true" submissionType="IETF" obsoletes="5706" updates="2360" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Operations &amp; Management Considerations">Guidelines for Considering Operations and Management in IETF Specifications</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-rfc5706bis-03"/>
    <author fullname="Benoit Claise">
      <organization>Everything OPS</organization>
      <address>
        <email>benoit@everything-ops.net</email>
      </address>
    </author>
    <author fullname="Joe Clarke">
      <organization>Cisco</organization>
      <address>
        <email>jclarke@cisco.com</email>
      </address>
    </author>
    <author fullname="Adrian Farrel">
      <organization>Old Dog Consulting</organization>
      <address>
        <email>adrian@olddog.co.uk</email>
      </address>
    </author>
    <author fullname="Samier Barguil">
      <organization>Nokia</organization>
      <address>
        <email>samier.barguil_giraldo@nokia.com</email>
      </address>
    </author>
    <author fullname="Carlos Pignataro">
      <organization>Blue Fern Consulting</organization>
      <address>
        <email>carlos@bluefern.consulting</email>
        <email>cpignata@gmail.com</email>
        <uri>https://bluefern.consulting</uri>
      </address>
    </author>
    <author fullname="Ran Chen">
      <organization>ZTE</organization>
      <address>
        <email>chen.ran@zte.com.cn</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <area>Operations and Management</area>
    <keyword>management</keyword>
    <keyword>operations</keyword>
    <keyword>operations and management</keyword>
    <keyword>ops considerations</keyword>
    <abstract>
      <?line 86?>

<t>New Protocols and Protocol Extensions are best designed with due
   consideration of the functionality needed to operate and manage them.
   Retrofitting operations and management considerations is suboptimal.
   The purpose of this document is to provide guidance to authors and
   reviewers on what operational and management aspects should be
   addressed when writing documents in the IETF Stream that define New Protocols or Protocol Extensions.</t>
      <t>This document obsoletes RFC 5706, replacing it completely and updating
   it with new operational and management techniques and mechanisms. It also
   updates RFC 2360 to obsolete mandatory MIB creation. Finally, it introduces a
   requirement to include an "Operational Considerations" section in new RFCs in
   the IETF Stream that define New Protocols or Protocol Extensions or describe their use (including relevant YANG
   Models), while providing an escape clause if no new considerations are identified.</t>
    </abstract>
  </front>
  <middle>
    <?line 102?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Often, when New Protocols or Protocol Extensions are developed, not
   enough consideration is given to how they will be deployed,
   operated, and managed. Retrofitting operations and management
   mechanisms is often hard and architecturally unpleasant, and certain
   protocol design choices may make deployment, operations, and
   management particularly difficult or insecure.
   To ensure deployability, the operational environment and manageability
   must be considered during design.</t>
      <t>This document provides guidelines to help Protocol Designers and Working
   Groups (WGs) consider the operations and management functionality for
   their New Protocol or Protocol Extension at an early phase in the design
   process.</t>
      <t>This document obsoletes <xref target="RFC5706"/> and fully updates its content
   with new operational and management techniques and mechanisms. It also
   introduces a requirement to include an "Operational Considerations"
   section in new RFCs in the IETF Stream that define New Protocols or
   Protocol Extensions or describe their use (including relevant YANG
   Models). This section must cover both operational and management considerations.
   Additionally, this document updates Section <xref target="RFC2360" section="2.14" sectionFormat="bare"/> of RFC 2360 <xref target="BCP22"/> on "Guide for Internet Standards Writers"
   to obsolete references to mandatory MIBs and instead focus on documenting holistic manageability and operational
   considerations as described in <xref target="sec-doc-req-ietf-spec"/>. The update is provided in <xref target="sec-2360-update"/>.
   Further, this document removes outdated
   references and aligns with current practices, protocols, and
   technologies used in operating and managing devices, networks, and
   services. Refer to <xref target="sec-changes-since-5706"/> for more details.</t>
      <section anchor="sec-this-doc">
        <name>This Document</name>
        <t>This document provides a set of guidelines for considering
   operations and management in an IETF technical specification
   with an eye toward being flexible while also striving for
   interoperability.</t>
        <t>Entirely New Protocols may require significant consideration of expected
   operations and management, while Protocol Extensions to existing, widely
   deployed protocols may have established de facto operations and
   management practices that are already well understood. This document does
   not mandate a comprehensive inventory of all operational considerations.
   Instead, it guides authors to focus on key aspects that are essential for
   the technology's deployability, operation, and maintenance.</t>
        <t>Suitable operational and management approaches may vary for different areas, WGs,
   and protocols in the IETF. This document does not prescribe
   a fixed solution or format in dealing with operational and management
   aspects of IETF protocols. However, these aspects should be
   considered for any New Protocol or Protocol Extension.</t>
        <t>A WG may decide that its protocol does not need interoperable
   operational and management or a standardized Data Model, but this should be a
   deliberate and documented decision, not the result of omission. This document
   provides some guidelines for those considerations.</t>
        <t>This document recognizes a distinction between management and operational
   considerations, although the two are closely related. However, for New
   Protocols or Protocol Extensions only an "Operational Considerations" section is required.
   This section is intended to address both management and operational aspects.
   Operational considerations pertain to the deployment and functioning of protocols
   within a network, regardless of whether a management protocol is in active use.
   Management considerations focus on the use of management technologies, such as
   management protocols and the design of management Data Models. Both topics should
   be described within the "Operational Considerations" section.</t>
      </section>
      <section anchor="sec-audience">
        <name>Audience</name>
        <t>The guidelines are intended to be useful to authors
   writing protocol specifications.
   They outline what to consider for operations, management, and deployment, how to document
   those aspects, and how to present them in a consistent format.
    This document is intended to offer a flexible set of
   guiding principles applicable to various circumstances. It provides a framework for WGs
   to ensure that operational considerations are an integral part of the protocol design process, and
   its use should not be misinterpreted as imposing new hurdles on work in other areas.</t>
        <t>Protocol Designers should consider which operations and management
   needs are relevant to their protocol, document how those needs could
   be addressed, and suggest (preferably standard) management protocols
   and Data Models that could be used to address those needs. This is
   similar to a WG that considers which security threats are relevant to
   their protocol, documents (in the required Security Considerations section,
   per Guidelines for Writing RFC Text on Security Considerations <xref target="BCP72"/>)
   how threats should be mitigated, and then suggests appropriate standard
   protocols that could mitigate the threats.</t>
        <t>It is not the intention that a protocol specification document should
   be held up waiting for operations and management solutions to be
   developed.  This is particularly the case when a protocol extension
   is proposed, but the base protocol is missing operations or
   management solutions.  However, it is the intent that new documents
   should clearly articulate the operations and management of
   that new work to fill any operations and management gaps.</t>
        <t>A core principle of this document is to encourage early-on discussions rather than mandating any specific solution.
   It does not impose a specific management or operational solution,
   imply that a formal Data Model is needed, or imply that using a specific management
   protocol is mandatory. Specifically, this document does not require to develop solutions to accommodate
   identified operational considerations within the document that specifies
   a New Protocol or Protocol Extension itself.</t>
        <t>If Protocol Designers conclude that the technology can be
   managed solely by using Proprietary Interfaces or that it does
   not need any structured or standardized Data Model, this might be fine,
   but it is a decision that should be explicit in a operational considerations discussion
   -- that this is how the protocol will need to be operated and managed.
   Protocol Designers should avoid deferring operations and manageability to a later
   phase of the development of the specification.</t>
        <t>When a WG considers operations and management functionality for a
   protocol, the document should contain enough information for readers
   to understand how the protocol will be deployed, operated, and managed. The considerations
   do not need to be comprehensive and exhaustive; focus should be on key aspects. The WG
   should expect that considerations for operations and management may
   need to be updated in the future, after further operational
   experience has been gained.</t>
        <t>The Ops Directorate (OpsDir) can use this document to inform their reviews. A list of guidelines and a
   checklist of questions to consider, which a reviewer can use to evaluate whether the protocol and
   documentation address common operations and management needs, is provided in <xref target="CHECKLIST"/>.</t>
        <t>This document is also of interest to the broader community, who wants to understand, contribute to,
   and review Internet-Drafts, taking operational considerations into account.</t>
      </section>
    </section>
    <section anchor="sec-terms">
      <name>Terminology</name>
      <t>This document does not describe interoperability requirements. As such, it does not use the capitalized keywords defined in <xref target="BCP14"/>.</t>
      <t>This section defines key terms used throughout the document to ensure clarity and consistency. Some terms are drawn from existing RFCs and IETF Internet-Drafts, while others are defined here for the purposes of this document. Where appropriate, references are provided for further reading or authoritative definitions.</t>
      <ul spacing="normal">
        <li>
          <t>Cause: See <xref target="I-D.ietf-nmop-terminology"/>.</t>
        </li>
        <li>
          <t>CLI: Command Line Interface. A human-oriented interface, typically
a Proprietary Interface, to hardware or software devices
(e.g., hosts, routers, or operating systems). The commands, their syntax,
and the precise semantics of the parameters may vary considerably
between different vendors, between products from the same
vendor, and even between different versions or releases of a single
product. No attempt at standardizing CLIs has been made by the IETF.</t>
        </li>
        <li>
          <t>Data Model: A set of mechanisms for representing, organizing, storing,
and handling data within a particular type of data store or repository.
This usually comprises a collection of data structures such as lists, tables,
relations, etc., a collection of operations that can be applied to the
structures such as retrieval, update, summation, etc., and a collection of
integrity rules that define the legal states (set of values) or changes of
state (operations on values). A Data Model may be derived by mapping the
contents of an Information Model or may be developed ab initio. Further
discussion of Data Models can be found in <xref target="RFC3444"/>, <xref target="sec-interop"/>,
and <xref target="sec-mgmt-info"/>.</t>
        </li>
        <li>
          <t>Fault: See <xref target="I-D.ietf-nmop-terminology"/>.</t>
        </li>
        <li>
          <t>Fault Management: The process of interpreting fault notifications and other alerts
and alarms, isolating faults, correlating them, and deducing underlying
Causes. See <xref target="sec-fm-mgmt"/> for more information.</t>
        </li>
        <li>
          <t>Information Model: An abstraction and representation of the
entities in a managed environment, their properties, attributes
and operations, and the way that they relate to each other. The model is
independent of any specific software usage, protocol,
or platform <xref target="RFC3444"/>. See Sections <xref format="counter" target="sec-interop"/> and <xref format="counter" target="sec-im-design"/> for
further discussion of Information Models.</t>
        </li>
        <li>
          <t>New Protocol and Protocol Extension: These terms are used in this document
to identify entirely new protocols, new versions of existing
protocols, and extensions to protocols.</t>
        </li>
        <li>
          <t>OAM: Operations, Administration, and Maintenance <xref target="RFC6291"/>
            <xref target="I-D.ietf-opsawg-oam-characterization"/> is the term given to the
combination of:  </t>
          <ol spacing="normal" type="1"><li>
              <t>Operation activities that are undertaken to keep the
network running as intended. They include monitoring of the network.</t>
            </li>
            <li>
              <t>Administration activities that keep track of resources in the
network and how they are used. They include the bookkeeping necessary
to track networking resources.</t>
            </li>
            <li>
              <t>Maintenance activities focused on facilitating repairs and upgrades.
They also involve corrective and preventive measures to make the
managed network run more effectively.</t>
            </li>
          </ol>
        </li>
      </ul>
      <artwork><![CDATA[
 The broader concept of "operations and management" that is the
 subject of this document encompasses OAM, in addition to other
 management and provisioning tools and concepts. This is
 sometimes known as "OAM and Management" or "O&M" as
 explained in {{RFC6291}}.
]]></artwork>
      <ul spacing="normal">
        <li>
          <t>Probable Root Cause: See <xref target="I-D.ietf-nmop-network-incident-yang"/></t>
        </li>
        <li>
          <t>Problem: See <xref target="I-D.ietf-nmop-terminology"/>.</t>
        </li>
        <li>
          <t>Proprietary Interface: An interface to manage a network element
that is not standardized. As such, the user interface, syntax, and
semantics typically vary significantly between implementations.
Examples of proprietary interfaces include Command Line
Interface (CLI), management web portal and Browser User Interface (BUI),
Graphical User Interface (GUI), and vendor-specific application
programming interface (API).</t>
        </li>
        <li>
          <t>Protocol Designer: An individual, a group of
people, or an IETF WG involved in the development and specification
of New Protocols or Protocol Extensions.</t>
        </li>
        <li>
          <t>Technical Document:
This includes any document that describes the
design, specification, implementation, or deployment of a new Protocol or Protocol Extensions.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-doc-req-ietf-spec">
      <name>Documentation Requirements for IETF Specifications</name>
      <section anchor="sec-oper-manag-considerations">
        <name>"Operational Considerations" Section</name>
        <t>All Internet-Drafts that document a technical specification for a New Protocol
   or Protocol Extension or describe their use are required to include an "Operational Considerations" section
   if it is the intention that they will be advanced for publication as IETF RFCs.
   Internet-Drafts that do not document technical specifications, such as process, policy, or administrative
   Internet-Drafts, are not required to include such a section.</t>
        <t>After evaluating the operational (<xref target="sec-oper-consid"/>) and manageability (<xref target="sec-mgmt-consid"/>) aspects of a New
   Protocol, a Protocol Extension, or an architecture, the resulting practices and
   requirements should be documented
   in an "Operational Considerations" section within the
   specification. Since protocols are intended for operational deployment and
   management within real networks, it is expected that such considerations
   will be present.</t>
        <t>It is also recommended that operational and manageability considerations
   be addressed early in the protocol design process. Consequently, early
   revisions of Internet-Drafts are expected to include an "Operational
   Considerations" section.</t>
        <t>An "Operational Considerations" section should include a discussion of
   the management and operations topics raised in this document.
   When one or more of these topics is not relevant, it would be helpful
   to include a brief statement explaining why it is not
   relevant or applicable for the New Protocol or Protocol Extension.
   Of course, additional relevant operational and manageability topics
   should be included as well. A concise checklist of key questions is
   provided in <xref target="sec-checklist"/>.</t>
        <t>Data Models (e.g., YANG) and other schema artifacts (JSON schema, YAML, CDDL, etc.)
  may be consumed out of the RFCs that specify them. As such, it is recommended
  that operational aspects for a data model (and similar artifacts) are
  documented as part of the model itself. Such considerations should not be
  duplicated in the narrative part of a specification that includes such artifacts.</t>
        <ul empty="true">
          <li>
            <t>Readers may refer to the following non-exhaustive list for examples of specifications, covering various areas,
with adequate documentation of operational considerations, including manageability: <xref target="I-D.ietf-core-dns-over-coap"/>,
<xref target="I-D.ietf-suit-mti"/>, <xref target="RFC9937"/> <xref target="RFC7574"/>, <xref target="RFC9877"/>, and <xref target="RFC9552"/>. For example,
given the various available transport alternatives, <xref target="I-D.ietf-core-dns-over-coap"/> discusses co-existence with
those and clarifies some key deployment aspects such as redirection, forwarding loop prevention, and error handling.
Also, <xref target="I-D.ietf-ippm-ioam-integrity-yang"/> is an example of a document that follows
the above guidance by documenting operational aspects as part of the YANG module itself.</t>
          </li>
        </ul>
        <t>For architecture documents, the "Operational Considerations" section should focus on describing the intended deployment environment,
  assumptions about network operations, potential impacts on existing operational practices,
  and any high-level requirements that future protocol designs should address. It is not expected to detail specific
  configuration parameters or management interfaces unless they are integral to the architecture itself.
  If the architecture document itself does not introduce new operational considerations, the exemption statement in <xref target="sec-null-sec"/> can be used.</t>
      </section>
      <section anchor="sec-null-sec">
        <name>"Operational Considerations" Section Boilerplate When No New Considerations Exist</name>
        <t>After a Protocol Designer has considered the manageability
   requirements of a New Protocol or Protocol Extension, they may determine that no
   management functionality or operational best-practice clarifications are
   needed. It would be helpful to
   reviewers, those who may update or write extensions to the protocol in the
   future, and those deploying the protocol, to know the rationale
   for the decisions on the protocol's manageability at the
   time of its design.</t>
        <t>If there are no new manageability or deployment considerations, the "Operational Considerations" section
   must contain the following simple statement, followed by a brief explanation of
   why that is the case.</t>
        <artwork><![CDATA[
  "There are no new operations or manageability requirements introduced
    by this document.

    Explanation: [brief rationale goes here]"
]]></artwork>
        <t>The presence of such a
   section would indicate to the reader that due
   consideration has been given to manageability and operations.</t>
        <t>When the specification is a Protocol Extension, and the base protocol
   already addresses the relevant operational and manageability
   considerations, it is helpful to reference the considerations section
   of the base document.</t>
      </section>
      <section anchor="sec-placement-sec">
        <name>Placement of the "Operational Considerations" Section</name>
        <t>It is recommended that the section be
   placed immediately before the Security Considerations section.
   Reviewers interested in this section will find it easily, and this
   placement could simplify the development of tools to detect its
   presence.</t>
      </section>
      <section anchor="sec-2360-update">
        <name>Update to RFC 2360</name>
        <t>This document replaces this text from Section <xref target="RFC2360" section="2.14" sectionFormat="bare"/> of RFC 2360 <xref target="BCP22"/>:</t>
        <blockquote>
          <t>When relevant, each standard needs to discuss how to manage the
protocol being specified.  This management process should be
compatible with the current IETF Standard management protocol.  In
addition, a MIB must be defined within the standard or in a companion
document.  The MIB must be compatible with current Structure of
Management Information (SMI) and parseable using a tool such as
SMICng.  Where management or a MIB is not necessary this section of
the standard should explain the reason it is not relevant to the
protocol.</t>
        </blockquote>
        <t>with the following:</t>
        <blockquote>
          <t>When relevant, each standard needs to discuss how to manage the
protocol being specified. Refer to RFC XXXX for holistic manageability and operational
considerations.</t>
        </blockquote>
        <ul empty="true">
          <li>
            <t>Note to the RFC Editor: Please replace RFC XXXX with the RFC number to be assigned to this document.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-oper-consid">
      <name>How Will the New Protocol or Protocol Extension Fit into the Current Environment?</name>
      <t>Designers of a New Protocol or Protocol Extension should carefully consider the operational
   aspects of real-world deployments, which can directly
   impact its success. Such aspects include
   interactions with existing solutions, upgrade or deployment paths,
   the ability to debug problems, ease of configuration,
   and a state diagram that operations
   staff can understand. This exercise
   need not be reflected directly in their document, but could help visualize how
   to apply the protocol in the environments where it will be deployed.
   <xref target="RFC5218"/> provides a more detailed discussion on what makes for a successful protocol.</t>
      <ul empty="true">
        <li>
          <t>BGP flap damping <xref target="RFC2439"/> is an example.  It was designed to block
   high-frequency route flaps.  Some BGP implementations were memory-constrained
   so often elected not to support this function, others found a
   conflict where path exploration caused false flap damping resulting
   in loss of reachability.  As a result, flap damping was often not
   enabled network-wide, contrary to the intentions of the original
   designers.</t>
        </li>
      </ul>
      <section anchor="sec-install">
        <name>Installation and Initial Setup</name>
        <t>Anything that can be configured can be misconfigured. "Architectural
   Principles of the Internet" <xref target="RFC1958"/>, Section 3.8, states:</t>
        <blockquote>
          <t>Avoid
   options and parameters whenever possible. Any options and parameters
   should be configured or negotiated dynamically rather than manually.</t>
        </blockquote>
        <t>The New Protocol or Protocol Extension should be able to operate "out of the box".
   To simplify configuration, Protocol Designers should
   specify reasonable defaults, including default modes and
   parameters. For example, define
   default values for modes, timers, default state of logical control
   variables, default transports, and so on.</t>
        <t>Protocol Designers should explain the background of the chosen default
   values and provide the rationale.
   In many cases, as
   technology changes, the documented values might make less and less
   sense. It is helpful to understand whether defaults are based on
   best current practice and are expected to change as technologies
   advance, or whether they have a more universal value that should not
   be changed lightly. For example, the default interface speed might
   change over time as network speeds increase,
   and cryptographic algorithms might be expected to change
   over time as older algorithms are "broken".</t>
        <t>Default values should generally favor the conservative side over the
   "optimizing performance" side (e.g., the initial Round-Trip Time (RTT) and
   Round-Trip Time Variance (RTTVAR) values of a TCP connection <xref target="RFC6298"/>).</t>
        <t>For parameters that can vary (e.g., speed-dependent), instead of using a
   constant, set the default value as a function of the
   variable to reduce the
   risk of problems caused by technology advancement.</t>
        <ul empty="true">
          <li>
            <t>For example, where protocols involve cryptographic keys, Protocol Designers should
   consider not only key generation and validation mechanisms but also the
   format in which private keys are stored, transmitted, and restored.
   Designers should specify any expected consistency checks
   (e.g., recomputing an expanded key from the seed) that help verify
   correctness and integrity. Additionally, guidance should be given on
   data retention, restoration limits, and cryptographic module
   interoperability when importing/exporting private key material. Refer to <xref target="I-D.ietf-lamps-dilithium-certificates"/> for an example of how such considerations are incorporated.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-migration">
        <name>Migration Path</name>
        <t>If the New Protocol or Protocol Extension is a new version of an existing one, or if it is
   replacing another technology, the Protocol Designer should consider
   how deployments should transition to the New Protocol or Protocol
   Extension. This should include coexistence with previously deployed
   protocols and/or previous versions of the same protocol, management of
   incompatibilities between versions, translation between versions,
   and consideration of potential side effects. A key question is:
   Are older protocols or versions disabled, or do they coexist
   with the New Protocol or Protocol Extension in the network?</t>
        <t>Many protocols benefit from being incrementally deployable --
   operators may deploy some aspects of a protocol before deploying
   it fully, or may deploy to only some nodes in a network before applying to all nodes in the network. In those cases, the operational considerations should
   also specify whether the New Protocol or Protocol Extension requires any changes to
   the existing infrastructure, particularly the network.
   If so, the protocol specification should describe the nature of those
   changes, where they are required, and how they can be introduced in
   a manner that facilitates deployment.</t>
        <t>Incentivizing good security operation practices when migrating to the New Protocol or Protocol Extension should be encouraged. For example, patching is fundamental for security operations and can be incentivized if Protocol Designers consider supporting cheap and fast connection hand-offs and reconnections.</t>
        <t>When Protocol Designers are considering how deployments should transition to the New Protocol or Protocol Extension, impacts to current techniques employed by operators should be documented and mitigations included, where possible, so that consistent security operations and management can be achieved. Note that transitioning between security mechanisms can be challenging, but it is not desirable to take an easier approach if that leaves data in an open or less-protected
state during the transition.
   Refer to <xref target="RFC8170"/> for a detailed discussion on transition versus coexistence.</t>
      </section>
      <section anchor="sec-other">
        <name>Requirements on Other Protocols and Functional Components</name>
        <t>Protocol Designers should consider the requirements that the New
   Protocol might put on other protocols and functional components and
   should also document the requirements from other protocols and
   functional components that have been considered in designing the New
   Protocol.</t>
        <t>These considerations should generally remain illustrative to avoid
   creating restrictions or dependencies, or potentially impacting the
   behavior of existing protocols, or restricting the extensibility of
   other protocols, or assuming other protocols will not be extended in
   certain ways. If restrictions or dependencies exist, they should be
   stated.</t>
        <ul empty="true">
          <li>
            <t>For example, the design of the Resource ReSerVation Protocol (RSVP)
   <xref target="RFC2205"/> required each router to look at the RSVP PATH message and,
   if the router understood RSVP, add its own address to the message to
   enable automatic tunneling through non-RSVP routers. But in reality,
   routers cannot look at an otherwise normal IP packet and potentially
   take it off the fast path! The initial designers overlooked that a
   new "deep-packet inspection" requirement was being put on the
   functional components of a router. The "router alert" option
   (<xref target="RFC2113"/>, <xref target="RFC2711"/>) was finally developed to solve this problem,
   for RSVP and other protocols that require the router to take some
   packets off the fast-forwarding path. Yet, Router Alert has its own
   problems in impacting router performance and security. Refer to <xref target="RFC9805"/> for
   deprecation of the IPv6 Router Alert Option for New Protocols and
   Section <xref target="RFC7126" section="4.8" sectionFormat="bare"/> of RFC 7126 <xref target="BCP186"/> for threats and advice related to IPv4 Router Alert.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-impact">
        <name>Impact on Network Operation</name>
        <t>The introduction of a New Protocol or Protocol Extension may
   have an impact on the operation of existing networks. As discussed in <xref section="2.1" sectionFormat="of" target="RFC6709"/>
   major extensions may have characteristics leading to a risk of
   operational
   problems. Protocol
   Designers should outline such operational impacts (which may be positive),
   including scaling benefits or concerns, and interactions with other protocols.
   Protocol Designers should describe the scenarios in which the New
   Protocol or its extensions are expected to be applicable or
   beneficial. This includes any relevant deployment environments,
   network topologies, usage constraints such as limited domains
   <xref target="RFC8799"/>, or use cases that justify or constrain adoption.
   For example, a New Protocol or Protocol Extension that doubles the number of active,
   reachable addresses in a network might have implications for the
   scalability of interior gateway protocols, and such impacts should
   be evaluated accordingly. Per Section <xref target="RFC2360" section="2.15" sectionFormat="bare"/> of RFC 2360 <xref target="BCP22"/>, New Protocol or Protocol Extension specifications
   should establish the limitations on the scale of use and limits on the resources used.</t>
        <t>If the protocol specification requires changes to end hosts, it should
   also indicate whether safeguards exist to protect networks from
   potential overload. Moreover, Per Section <xref target="RFC2360" section="2.16" sectionFormat="bare"/> of RFC 2360 <xref target="BCP22"/>, New Protocol
   or Protocol Extension specifications should address any possible destabilizing events,
   and means by which the protocol resists or recovers from them. For instance, a congestion control algorithm must
   comply with <xref target="BCP133"/> to prevent congestion collapse and ensure
   network stability.</t>
        <t>A protocol could send active monitoring packets on the wire. Without careful
   consideration, active monitoring might achieve high accuracy at the cost of
   generating an excessive number of monitoring packets.</t>
        <t>Protocol Designers should consider the potential impact on the
   behavior of other protocols in the network and on the traffic levels
   and traffic patterns that might change, including specific types of
   traffic, such as multicast. Also, consider the need to install new
   components that are added to the network as a result of changes in
   the configuration, such as servers performing auto-configuration
   operations.</t>
        <t>Protocol Designers should also consider the impact on infrastructure
   applications such as the DNS <xref target="RFC1034"/>, the
   registries, or the size of routing tables.</t>
        <ul empty="true">
          <li>
            <t>For example, SMTP <xref target="RFC5321"/> servers use a reverse DNS lookup to filter
   out incoming connection requests: when Berkeley installed a new spam filter that used reverse DNS lookup,
   their mail server stopped functioning because of overload of the DNS
   cache resolver.</t>
          </li>
        </ul>
        <t>The impact of New Protocols or Protocol Extensions, and the results
of new OAM tools developed for them,
must be considered with respect to
traffic delivery performance and ongoing manageability. For
example, it must be noted whether the New Protocol, Protocol Extension,
or OAM tools cause increased delay or jitter in real-time traffic
applications, or increased response time in client-server
applications. Further, if the additional traffic caused by OAM tools
and data collection could result in the management plane becoming
overwhelmed, then this must be called out, and suitable mechanisms to
rate limit the OAM traffic must be considered. Potential options include: document the limitations, propose solution track(s), include an optional rate limiting feature in the specifications, or impose a rate limiting feature in the specifications.</t>
        <ul empty="true">
          <li>
            <t>Consider three examples: (1) In
Bidirectional Forwarding Detection for MPLS <xref target="RFC5884"/> it is
possible to configure very rapid BFD transmissions (of the order of
3ms) on a very large number of parallel Label Switched Paths (LSPs)
with the result that the management systems and end nodes may become
overwhelmed -- this can be protected by applying limits to
the number of LSPs that may be tested at once. (2) Notifications or logs
from systems (through YANG or other means) should be rate-limited so
that they do not flood the receiving management station. (3) The
application of sophisticated encryption or filtering rules needs to
be considered in the light of the additional processing they may
impose on the hardware forwarding path for traffic.</t>
          </li>
        </ul>
        <t>New metrics may be required to assess traffic performance. Protocol Designers may refer to <xref target="RFC6390"/> for guidelines for considering new performance metrics.</t>
        <t>It is important to minimize the impact caused by configuration
   changes. Given configuration A and configuration B, it should be
   possible to generate the operations necessary to get from A to B with
   minimal state changes and effects on network and systems.</t>
      </section>
      <section anchor="sec-impact-secops">
        <name>Impact on Security Operations</name>
        <t>Security Operations (SecOps) is a collaborative approach that combines security and operational teams to improve the ability of operators to protect and manage the network effectively and efficiently <xref target="SECOPS"/>. Security operators detect malicious activity and respond to threats and are a crucial part of defending against attacks alongside the management and operation of the network.</t>
        <t>Protocol Designers should consider the impacts of a New Protocol or Protocol Extension on Security Operations in networks that the protocol will be deployed in.</t>
        <t>Security operators extensively rely upon Indicators of Compromise (IoCs) <xref target="RFC9424"/>. The deployment of a New Protocol or Protocol Extension may change the type, locations, or availability of IoCs. Protocol Designers should outline such changes to ensure operators can manage and defend their network consistently.
Consider the operators' requirement for digital forensics from the network or endpoints with critical information found in logs. Logging events schema and guidance for operators should be considered when designing a New Protocol or Protocol Extension to ensure operators have the information they need. <xref target="I-D.ietf-quic-qlog-main-schema"/> is an example of extensible structured logging.</t>
        <t>Tooling required by security operators should be documented in the design and deployment of a New Protocol or Protocol Extension. Operators may require new tooling or methods for managing network traffic in response to protocol changes to ensure consistent availability and performance of networks. Similarly, updating and augmenting existing forensic tools such as protocol dissectors is expected when a New Protocol is deployed, but having to completely rebuild such tooling would greatly reduce the effectiveness of security operators, so protocol extensibility should be considered.</t>
      </section>
      <section anchor="sec-oper-verify">
        <name>Verifying Correct Operation</name>
        <t>An important function that should be provided is guidance on how to
   verify the correct operation of a protocol. A Protocol Designer
   may suggest testing techniques for qualifying and quantifying the impact of the protocol on
   the network before it is partially or fully deployed, as well as testing techniques for
   identifying the effects that the protocol might have on the network after being
   deployed.</t>
        <t>Protocol Designers should consider techniques for testing the
   effect the protocol has had on the infrastructure by sending data
   through it and observing its behavior (a.k.a., active
   monitoring). Protocol Designers should consider how the correct
   end-to-end operation of the New Protocol or Protocol Extension can be tested
   actively and passively, and how the correct data- or forwarding-plane
   function of each involved element can be verified to be working
   correctly with the New Protocol or Protocol Extension. Which metrics are of interest?</t>
        <t>Protocol Designers should consider how to test the correct end-to-end
   operation of the service or network, how to verify correct
   protocol behavior, and whether such verification is achieved by testing
   the service function and/or the forwarding function of
   each network element. This may be accomplished through the collection of status and
   statistical information gathered from devices.</t>
        <t>Having simple protocol status and health indicators on involved
   devices is a recommended means to check correct operation.</t>
      </section>
      <section anchor="sec-messages">
        <name>Message Formats</name>
        <t>Where protocol specifications result in messages (such as errors or warnings) being carried as text strings or output for consumption by human operators, consideration should be given to making it possible for implementations to be configured so that the messages can be viewed in the local language. In such cases, it may be helpful to transmit a specific message code (i.e., a number) along with the default English language message, so that implementations may easily map the code to a local text string.</t>
        <t>Further discussion of Internationalization issues may be found in <xref target="BCP166"/>.</t>
      </section>
    </section>
    <section anchor="sec-mgmt-consid">
      <name>How Will the Protocol Be Managed?</name>
      <t>The considerations of manageability should start from identifying the
   entities to be managed, as well as how the managed protocol is
   supposed to be installed, configured, and monitored.</t>
      <t>Considerations for management should describe what aspects of the system
   require management and the management functions that need to be
   supported. This includes identifying any assumptions or constraints
   relevant to management interactions, such as the types of interfaces or
   protocols required. These considerations should avoid dependence on a
   specific management deployment model and should remain applicable
   regardless of where management systems are located or how they are
   accessed.</t>
      <t>The management model should take into account factors such as:</t>
      <ul spacing="normal">
        <li>
          <t>What type of management entities will be involved (agents, network
management systems)?</t>
        </li>
        <li>
          <t>What is the possible architecture (client-server, manager-agent,
poll-driven or event-driven, auto-configuration, two-levels or
hierarchical)?</t>
        </li>
        <li>
          <t>What are the management operations (initial configuration, dynamic
configuration, alarm and exception reporting, logging, performance
monitoring, performance reporting, debugging)?</t>
        </li>
        <li>
          <t>How are these operations performed (locally, remotely, atomic
operation, scripts)? Are they performed immediately or are they
time scheduled, or event triggered?</t>
        </li>
      </ul>
      <t>Protocol Designers should consider how the New Protocol or Protocol Extension will be
   managed in different deployment scales. It might be sensible to use
   a local management interface to manage the New Protocol or Protocol Extension on a single
   device, but in a large network, remote management using a centralized
   server and/or using distributed management functionality might make
   more sense. Auto-configuration and default parameters might be
   possible for some New Protocols or Protocol Extensions.</t>
      <t>Management needs to be considered not only from the perspective of a
   device, but also from the perspective of network and service
   management. A service might be network and operational functionality
   derived from the implementation and deployment of a New Protocol or Protocol Extension.
   Often, an individual network element is unaware of the service being
   delivered.</t>
      <t>WGs should consider how to configure multiple related/co-operating
   devices and how to back off if one of those configurations fails or
   causes trouble. Network Configuration Protocol (NETCONF) <xref target="RFC6241"/>
   addresses this in a generic manner
   by allowing an operator to lock the configuration on multiple
   devices, perform the configuration settings/changes, check that they
   are OK (undo if not), and then unlock the devices.</t>
      <t>Techniques for debugging protocol interactions in a network must be
   part of the network management discussion. Implementation source
   code should be debugged before ever being added to a network, so
   asserts and memory dumps do not normally belong in management data
   models. However, debugging on-the-wire interactions is a protocol
   issue: while the messages can be seen by sniffing, it is enormously
   helpful if a protocol specification supports features that make
   debugging of network interactions and behaviors easier. There could
   be alerts issued when messages are received or when there are state
   transitions in the protocol state machine. However, the state
   machine is often not part of the on-the-wire protocol; the state
   machine explains how the protocol works so that an implementer can
   decide, in an implementation-specific manner, how to react to a
   received event.</t>
      <t>In a client/server protocol, it may be more important to instrument
   the server end of a protocol than the client end, since the
   performance of the server might impact more nodes than the
   performance of a specific client.</t>
      <section anchor="sec-mgmt-tech">
        <name>Available Management Technologies</name>
        <t>The IETF provides several standardized management protocols suitable for
   various operational purposes, for example as outlined in <xref target="RFC6632"/>.
   Note that SNMP is no longer recommended for configuration (read-write)
   operations.  Better programmatic alternatives are discussed
   further in Section <xref format="counter" target="sec-interop"/>. This  document formally deprecates the following recommendation from <xref target="BCP22"/>:</t>
        <blockquote>
          <t>a MIB must be defined within the standard or in a companion  document.</t>
        </blockquote>
        <t>Readers seeking more in-depth definitions or explanations should consult
   the referenced materials.</t>
      </section>
      <section anchor="sec-interop">
        <name>Interoperability</name>
        <t>Management interoperability is critical for enabling information exchange
   and operations across diverse network devices and management applications,
   regardless of vendor, model, or software release. It facilitates the use
   of third-party applications and outsourced management services.</t>
        <t>While individual device management via Proprietary Interfaces may
   suffice for small deployments, large-scale networks comprising equipment
   from multiple vendors necessitate consistent, automated management.
   Relying on vendor- and model-specific interfaces for extensive deployments,
   such as hundreds of branch offices, severely impedes scalability and automation
   of operational processes. The primary goal of management interoperability is to
   enable the scalable deployment and lifecycle management of new network functions
   and services, while ensuring a clear understanding of their operational impact
   and total cost of ownership.</t>
        <t>Achieving universal agreement on a single management syntax and protocol is
   challenging. However, the IETF has significantly evolved its approach to
   network management, moving beyond Structure of Management Information
   version 2 (SMIv2) and SNMP. Modern IETF management solutions primarily
   leverage YANG <xref target="RFC7950"/> for Data Modeling and NETCONF <xref target="RFC6241"/> or
   RESTful Configuration Protocol (RESTCONF) <xref target="RFC8040"/> for protocol
   interactions. This shift, as further elaborated in <xref target="RFC6632"/>, emphasizes
   structured Data Models and programmatic interfaces to enhance automation and
   interoperability. Other protocols, such as IP Flow Information Export
   (IPFIX) <xref target="RFC7011"/> for flow accounting and syslog (System Logging
   Protocol) <xref target="RFC5424"/> for logging, continue to play specific roles in
   comprehensive network management.</t>
        <t>Interoperability must address both syntactic and semantic aspects. While syntactic variations
   across implementations can often be handled through adaptive processing, semantic differences pose a
   greater challenge, as the meaning of data is intrinsically tied to the managed entity.</t>
        <t>Information Models (IMs) enable and provide the foundation for semantic interoperability. An IM defines the
   conceptual understanding of managed information, independent of specific protocols or vendor
   implementations. This allows for consistent interpretation and correlation of data across different
   data models (and hence management protocols), such as a YANG Data Model and IPFIX Information Elements concerning the same
   event. For instance, an IM can standardize how error conditions are counted, ensuring that a counter
   has the same meaning whether collected via NETCONF or exported via IPFIX.</t>
        <t>Protocol Designers should consider developing an IM, when multiple Data Model (DM)
   representations (e.g., YANG and/or IPFIX) are required, to ensure lossless
   semantic mapping. IMs are also beneficial for complex or numerous DMs. As illustrated in Figure 1, an
   IM serves as a conceptual blueprint for designers and operators, from which concrete DMs are derived
   for implementers. <xref target="RFC3444"/> provides further guidance on distinguishing IMs from DMs.</t>
        <figure anchor="fig-im-dm">
          <name>Information Models (IMs) and Data Models (DMs)</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="144" width="464" viewBox="0 0 464 144" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,64 L 8,80" fill="none" stroke="black"/>
                <path d="M 96,48 L 96,80" fill="none" stroke="black"/>
                <path d="M 176,64 L 176,80" fill="none" stroke="black"/>
                <path d="M 232,32 L 248,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 176,64" fill="none" stroke="black"/>
                <path d="M 232,96 L 248,96" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="256,96 244,90.4 244,101.6" fill="black" transform="rotate(0,248,96)"/>
                <polygon class="arrowhead" points="256,32 244,26.4 244,37.6" fill="black" transform="rotate(0,248,32)"/>
                <g class="text">
                  <text x="100" y="36">IM</text>
                  <text x="336" y="36">conceptual/abstract</text>
                  <text x="440" y="36">model</text>
                  <text x="272" y="52">for</text>
                  <text x="328" y="52">designers</text>
                  <text x="376" y="52">&amp;</text>
                  <text x="424" y="52">operators</text>
                  <text x="12" y="100">DM</text>
                  <text x="100" y="100">DM</text>
                  <text x="180" y="100">DM</text>
                  <text x="328" y="100">concrete/detailed</text>
                  <text x="424" y="100">model</text>
                  <text x="296" y="116">for</text>
                  <text x="364" y="116">implementers</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
           IM               --> conceptual/abstract model
           |                    for designers & operators
+----------+---------+
|          |         |
DM         DM        DM     --> concrete/detailed model
                                   for implementers

]]></artwork>
          </artset>
        </figure>
        <t>Protocol Designers must identify the essential operational, configuration, state, and statistical
   information required for effective monitoring, control, and troubleshooting of New Protocols or Protocol Extensions.
   This includes defining relevant parameters, performance metrics, error indicators,
   and contextual data crucial for diagnostics and lifecycle management.</t>
        <t>To ensure interoperability, management protocol and Data Model standards should incorporate clear
   compliance clauses, specifying the expected level of support.</t>
      </section>
      <section anchor="sec-mgmt-info">
        <name>Management Information</name>
        <t>Languages used to describe an Information Model can influence the
   nature of the model. Using a particular data modeling language, such
   as YANG, influences the model to use certain types of structures, for
   example, hierarchical trees, groupings, and reusable types.
   YANG, as described in <xref target="RFC6020"/> and <xref target="RFC7950"/>, provides advantages
   for expressing network information, including clear separation of
   configuration data and operational state, support for constraints and
   dependencies, and extensibility for evolving requirements. Its ability
   to represent relationships and dependencies in a structured and modular
   way makes it an effective choice for defining management information
   models.</t>
        <t>While an Information Model is typically described in English text
   (or sometimes UML) to define the conceptual management requirements,
   authors may choose to express it using YANG Data Structure Extensions <xref target="RFC8791"/>
   as described in <xref target="sec-im-design"/>.  Using YANG for the Information Model can make
   it easier to link abstract concepts to concrete data types in the corresponding Data Model,
   helping maintain consistency between high-level design and practical deployment.</t>
        <t>A management Information Model should include a discussion of what is
   manageable, which aspects of the protocol need to be configured, what
   types of operations are allowed, what protocol-specific events might
   occur, which events can be counted, and for which events an operator
   should be notified.</t>
        <t>When defining management information, it is important to categorize
   data into configuration, operational state, and statistics. Conflating
   these distinct types into a single element makes it difficult for operators
   to distinguish between administratively set values and the dynamic state of
   the protocol. The model should be structured to allow these categories to be
   handled independently.</t>
        <t>What is typically difficult to work through are relationships between
   abstract objects. Ideally, an Information Model would describe the
   relationships between the objects and concepts in the information
   model.</t>
        <t>Is there always just one instance of this object or can there be
   multiple instances? Does this object relate to exactly one other
   object, or may it relate to multiple? When is it possible to change a
   relationship?</t>
        <t>Do objects (such as instances in lists) share fate? For example, if an
   instance in list A must exist before a related instance in list B can be
   created, what happens to the instance in list B if the related instance in
   list A is deleted? Does the existence of relationships between
   objects have an impact on fate sharing? YANG's relationships and
   constraints can help express and enforce these relationships.</t>
        <section anchor="sec-im-design">
          <name>Information Model Design</name>
          <t>This document recommends keeping the Information Model as simple as
   possible by applying the following criteria:</t>
          <ol spacing="normal" type="1"><li>
              <t>Start with a small set of essential objects and make additions only as
further objects are needed with the objective of keeping the absolute number of objects as small as possible while still delivering the required function such that there is
no duplication between objects and where one piece of information can be derived from the other pieces of information, it is not itself represented as an object.</t>
            </li>
            <li>
              <t>Require that all objects be essential for management.</t>
            </li>
            <li>
              <t>Consider evidence of current use of the managed protocol, and the perceived utility of objects added to the Information Model.</t>
            </li>
            <li>
              <t>Exclude objects that can be derived from others in this or
other information models.</t>
            </li>
            <li>
              <t>Avoid causing critical sections to be heavily instrumented. A
guideline is one counter per critical section per layer.</t>
            </li>
            <li>
              <t>When expressing an Information Model using YANG Data Structure Extensions <xref target="RFC8791"/> (thereby keeping it abstract and implementation-agnostic per <xref target="RFC3444"/>), ensure that the Information Model remains simple, modular, and clear by following the authoring guidelines in <xref target="I-D.ietf-netmod-rfc8407bis"/>.</t>
            </li>
            <li>
              <t>When illustrating the abstract Information Model, use YANG Tree Diagrams <xref target="RFC8340"/> to provide a simple, standardized, and implementation-neutral model structure.</t>
            </li>
          </ol>
        </section>
        <section anchor="sec-yang-dm">
          <name>YANG Data Model Considerations</name>
          <t>When considering YANG Data Models for a new specification, there
  are multiple types of Data Models that may be applicable. The
  hierarchy and relationship between these types is described in
  <xref section="3.5.1" sectionFormat="of" target="I-D.ietf-netmod-rfc8407bis"/>. A new specification
  may require or benefit from one or more of these YANG Data Model types.</t>
          <ul spacing="normal">
            <li>
              <t>Device Models - Also called Network Element Models,
represent the configuration, operational state, and notifications of
individual devices. These models are designed to distinguish
between these types of data and support querying and updating
device-specific parameters. Consideration should be given to
how device-level models might fit with broader network and
service Data Models.</t>
            </li>
            <li>
              <t>Network Models - Also called Network Service Models, define abstractions
for managing the behavior and relationships of multiple devices
and device subsystems within a network. As described in <xref target="RFC8199"/>,
these models are used to manage network-wide. These abstractions are
useful to network operators and applications that interface with network
controllers. Examples of network models include the L3VPN Network Model
(L3NM) <xref target="RFC9182"/> and the L2VPN Network Model (L2VPN) <xref target="RFC9291"/>.</t>
            </li>
            <li>
              <t>Service Models - Also called Customer Service Models,
defined in <xref target="RFC8309"/>, are designed to abstract the customer interface
into a service. They consider customer-centric parameters such as
Service Level Agreement (SLA) and high-level policy (e.g., network intent).
Given that different operators and different customers may have widely-varying
business processes, these models should focus on common aspects of a service
with strong multi-party consensus. Examples of service models include
the L3VPN Service Model (L3SM) <xref target="RFC8299"/> and the L2VPN Service Model (L2SM)
<xref target="RFC8466"/>.</t>
            </li>
          </ul>
          <t>A common challenge in YANG Data Model development lies in defining the
  relationships between abstract service or network constructs and the
  underlying device models. Therefore, when designing Network and Service
  YANG modules, consider how the status and relationships of abstract or
  distributed constructs can be reflected based on parameters available
  in the network.</t>
          <t>For example, the status of a service may depend on the operational state
  of multiple network elements to which the service is attached. In such
  cases, the YANG Data Model (and its accompanying documentation) should
  clearly describe how service-level status is derived from underlying
  device-level information. Similarly, it is beneficial to define
  events (and relevant triggered notifications) that indicate changes in an underlying state,
  enabling reliable detection and correlation of service-affecting
  conditions. Including such mechanisms improves the robustness of
  integrations and helps ensure consistent behavior across
  implementations.</t>
          <t>Specific guidelines to consider when authoring any type of YANG
  modules are described in <xref target="I-D.ietf-netmod-rfc8407bis"/>.</t>
        </section>
      </section>
      <section anchor="sec-fm-mgmt">
        <name>Fault Management</name>
        <t>Protocol Designers should identify and document
   essential Faults, health indicators, alarms, and events that must be
   propagated to management applications or exposed through a Data
   Model. It is also recommended to describe how the Protocol Extension
   will affect the existing alarms and notification structure of the
   base Protocol, and to outline the potential impact of misconfigurations
   of the Protocol Extensions.</t>
        <t>Protocol Designers should consider how fault information will be
   propagated. Will it be done using asynchronous notifications or
   polling of health indicators?</t>
        <t>If notifications are used to alert operators to certain conditions,
   then Protocol Designers should discuss mechanisms to throttle
   notifications to prevent congestion and duplications of event
   notifications. Will there be a hierarchy of Faults, and will the
   Fault reporting be done by each Fault in the hierarchy, or will only
   the lowest Fault be reported and the higher levels be suppressed?
   Should there be aggregated status indicators based on concatenation
   of propagated Faults from a given domain or device?</t>
        <t>Notifications (e.g., SNMP traps and informs, syslog, or protocol-specific mechanisms) can alert an operator when an
   aspect of the New Protocol or Protocol Extension fails or encounters an error or failure
   condition.
   Should the event reporting provide guaranteed accurate delivery of
   the event information within a given (high) margin of confidence?
   Can we poll the latest events in the box?</t>
        <section anchor="sec-monitor">
          <name>Liveness Detection and Monitoring</name>
          <t>Protocol Designers should always build in basic testing features
   (e.g., ICMP echo, UDP
   or TCP echo services, and null Remote Procedure Calls
   (RPCs)) that can be used to test for liveness, with the option to
   enable or disable them.</t>
          <t>Mechanisms for monitoring the liveness of the protocol and for
   detecting Faults in protocol connectivity are usually built into
   protocols. In some cases, mechanisms already exist within other
   protocols responsible for maintaining lower-layer connectivity (e.g.,
   ICMP echo), but often new procedures are required to detect failures
   and to report rapidly, allowing remedial action to be taken.</t>
          <t>These liveness monitoring mechanisms do not typically require
   additional management capabilities. However, when a system detects a
   Fault, there is often a requirement to coordinate recovery action
   through management applications or at least to record the fact in an
   event log.</t>
        </section>
        <section anchor="sec-fault-determ">
          <name>Fault Determination</name>
          <t>It can be helpful to describe how Faults can be pinpointed using
   management information. For example, counters might record instances
   of error conditions. Some Faults might be able to be pinpointed by
   comparing the outputs of one device and the inputs of another device,
   looking for anomalies. Protocol Designers should consider what
   counters should count. If a single counter provided by vendor A
   counts three types of error conditions, while the corresponding
   counter provided by vendor B counts seven types of error conditions,
   these counters cannot be compared effectively -- they are not
   interoperable counters.</t>
          <t>How do you distinguish between faulty messages and good messages?</t>
          <t>Would some threshold-based mechanisms be usable to help determine
   error conditions? Are notifications for all events needed, or
   are there some "standard" notifications that could be used? Or can
   relevant counters be polled as needed?</t>
          <ul empty="true">
            <li>
              <t>Remote Monitoring (RMON) events/alarms is an example of threshold-based mechanism.</t>
            </li>
          </ul>
        </section>
        <section anchor="sec-cause-analysis">
          <name>Probable Root Cause Analysis</name>
          <t>Probable Root Cause analysis is about working out where the foundational
   Fault or Problem might be. Since one Fault may give rise to another Fault or
   Problem, a probable root cause is commonly meant to describe the original,
   source event or combination of circumstances that is the foundation of all
   related Faults.</t>
          <ul empty="true">
            <li>
              <t>For example, if end-to-end data delivery is failing (e.g., reported by a
   notification), Probable Root Cause analysis can help find the failed link
   or node, or mis-configuration, within the end-to-end path.</t>
            </li>
          </ul>
        </section>
        <section anchor="sec-fault-isol">
          <name>Fault Isolation</name>
          <t>It might be useful to isolate or quarantine Faults, such as isolating
   a device that emits malformed messages that are necessary to
   coordinate connections properly. This might be able to be done by
   configuring next-hop devices to drop the faulty messages to prevent
   them from entering the rest of the network.</t>
        </section>
      </section>
      <section anchor="sec-config-mgmt">
        <name>Configuration Management</name>
        <t>A Protocol Designer should document the basic configuration
   parameters that need to be instrumented for a New Protocol or Protocol Extensions, as well
   as default values and modes of operation.</t>
        <t>What information should be maintained across reboots of the device,
   or restarts of the management system?</t>
        <t>"Requirements for Configuration Management of IP-based Networks"{
    {?RFC3139}} discusses requirements for configuration management, including
    discussion of different levels of management, high-level policies,
    network-wide configuration data, and device-local configuration. Network
    configuration extends beyond simple multi-device push or pull operations.
    It also involves ensuring that the configurations being pushed are
    semantically compatible across devices and that the resulting behavior of
    all involved devices corresponds to the intended behavior. Is the
    attachment between them configured compatibly on both ends? Is the
    IS-IS metric the same?
    Answering those questions for a network with one thousand devices is not that easy.</t>
        <t>Several efforts have existed in the IETF to develop policy-based
   configuration management. "Terminology for Policy-Based Management"
   <xref target="RFC3198"/> was written to standardize the terminology across these
   efforts.</t>
        <t>Implementations should not arbitrarily modify configuration data. In
   some cases (such as Access Control Lists (ACLs)), the order of data
   items is significant and comprises part of the configured data. If a
   Protocol Designer defines mechanisms for configuration, it would be
   preferable to standardize the order of elements for consistency of
   configuration and of reporting across vendors and across releases
   from vendors.</t>
        <t>There are two parts to this:</t>
        <ol spacing="normal" type="1"><li>
            <t>A Network Management System (NMS) could optimize Access Control Lists (ACLs) for
performance reasons.</t>
          </li>
          <li>
            <t>Unless the device or NMS is configured with adequate rules and guided by administrators with extensive experience, reordering ACLs can introduce significant security risks.</t>
          </li>
        </ol>
        <t>Network-wide configurations may be stored in central databases
   and transformed into readable formats that can be pushed to devices, either by
   generating sequences of CLI commands or complete textual configuration files
   that are pushed to devices. There is no common database schema for
   network configuration, although the models used by various operators
   are probably very similar. It is operationally beneficial to
   extract, document, and standardize the common parts of these network-wide
   configuration database schemas. A Protocol Designer should
   consider how to standardize the common parts of configuring the New
   Protocol, while recognizing that vendors may also have proprietary
   aspects of their configurations.</t>
        <t>It is important to enable operators to concentrate on the
   configuration of the network or service as a whole, rather than individual
   devices. Support for configuration transactions across several
   devices could significantly simplify network configuration
   management. The ability to distribute configurations to multiple
   devices, or to modify candidate configurations on multiple devices,
   and then activate them in a near-simultaneous manner might help.
   Protocol Designers can consider how it would make sense for their
   protocol to be configured across multiple devices. Configuration
   templates might also be helpful.</t>
        <t>Consensus of the 2002 IAB Network Management Workshop <xref target="RFC3535"/> was that textual
   configuration files should be able to contain international
   characters. Human-readable strings should utilize UTF-8, and
   protocol elements should be in case-insensitive ASCII.</t>
        <t>A mechanism to dump-and-restore configurations is a primitive
   operation needed by operators. Standards for pulling and pushing
   configurations from/to devices are highly beneficial.</t>
        <t>Given configuration A and configuration B, it should be possible to
   generate the operations necessary to get from A to B with minimal
   state changes and effects on network and systems. It is important to
   minimize the impact caused by configuration changes.</t>
        <t>A Protocol Designer should consider the configurable items that exist
   for the control of function via the protocol elements described in
   the protocol specification. For example, sometimes the protocol
   requires that timers can be configured by the operator to ensure
   specific policy-based behavior by the implementation. These timers
   should have default values suggested in the protocol specification
   and may not need to be otherwise configurable.</t>
      </section>
      <section anchor="sec-acc-mgmt">
        <name>Accounting Management</name>
        <t>A Protocol Designer should consider whether it would be appropriate
   to collect usage information related to this protocol and, if so,
   what usage information would be appropriate to collect.</t>
        <t>"Introduction to Accounting Management" <xref target="RFC2975"/> discusses a number
   of factors relevant to monitoring usage of protocols for purposes of
   capacity and trend analysis, cost allocation, auditing, and billing.
   The document also discusses how some existing protocols can be used
   for these purposes. These factors should be considered when
   designing a protocol whose usage might need to be monitored or when
   recommending a protocol to do usage accounting.</t>
      </section>
      <section anchor="sec-perf-mgmt">
        <name>Performance Management</name>
        <t>From a manageability point of view, it is important to determine how
   well a network deploying the protocol or technology defined in the
   document is doing. In order to do this, the network operators need
   to consider information that would be useful to determine the
   performance characteristics of a deployed system using the target
   protocol.</t>
        <t>The IETF, via the Benchmarking Methodology WG (BMWG), has defined
   recommendations for the measurement of the performance
   characteristics of various internetworking technologies in a
   laboratory environment, including the systems or services that are
   built from these technologies. Each benchmarking recommendation
   describes the class of equipment, system, or service being addressed;
   discusses the performance characteristics that are pertinent to that
   class; clearly identifies a set of metrics that aid in the
   description of those characteristics; specifies the methodologies
   required to collect said metrics; and lastly, presents the
   requirements for the common, unambiguous reporting of benchmarking
   results. Search for "benchmark" in the RFC search tool.</t>
        <t>Performance metrics may be useful in multiple environments and for
   different protocols. The IETF, via the IP Performance Measurement
   (IPPM) WG, has developed a set of standard metrics that can be
   applied to the quality, performance, and reliability of Internet data
   delivery services. These metrics are designed such that they can be
   performed by network operators, end users, or independent testing
   groups. The existing metrics might be applicable to the new
   protocol. Search for "metric" in the RFC search tool. In some
   cases, new metrics need to be defined. It would be useful if the
   protocol documentation identified the need for such new metrics. For
   performance management, it is often more important to report the time
   spent in a state rather than just the current state. Snapshots alone
   are typically of less value.</t>
        <t>There are several parts of performance management to consider:
   protocol monitoring, device monitoring (the impact of new
   functionality/service activation on the device), network monitoring,
   and service monitoring (the impact of service activation on the
   network). Hence, if the implementation of the
   New Protocol or Protocol Extension has any hardware/software performance implications
   (e.g., increased CPU utilization, memory consumption, or forwarding
   performance degradation), the Protocol Designers should clearly
   describe these impacts in the specification, along with any
   conditions under which they may occur and possible mitigation
   strategies.</t>
        <section anchor="sec-monitor-proto">
          <name>Monitoring the Protocol</name>
          <t>Certain properties of protocols are useful to monitor. The number of
   protocol packets received, the number of packets sent, and the number
   of packets dropped are usually very helpful to operators.</t>
          <t>Packet drops should be reflected in counter variable(s) somewhere
   that can be inspected -- both from the security point of view and
   from the troubleshooting point of view.</t>
          <t>Counter definitions should be unambiguous about what is included in
   the count and what is not included in the count.</t>
          <t>Consider the expected behaviors for counters -- what is a reasonable
   maximum value for expected usage? Should they stop counting at the
   maximum value and retain it, or should they rollover?
   Guidance should explain how rollovers are detected, including multiple
   occurrences.</t>
          <t>Consider whether multiple management applications will share a
   counter; if so, then no one management application should be allowed
   to reset the value to zero since this will impact other applications.</t>
          <t>Could events, such as hot-swapping a blade in a chassis, cause
   discontinuities in counter? Does this make any difference in
   evaluating the performance of a protocol?</t>
          <t>The protocol specification should clearly define any inherent
   limitations and describe expected behavior when those limits
   are exceeded. These considerations should be made independently
   of any specific management protocol or data modeling language.
   In other words, focus on what makes sense for the protocol being
   managed, not the protocol used for management. If a constraint
   is not specific to a management protocol, then it should be left
   to Data Model designers of that protocol to determine how to handle it.</t>
          <ul empty="true">
            <li>
              <t>For example, VLAN identifiers (VLAN IDs) are defined by the standard to range from 1 to 4094.
   Therefore, a YANG "vlan-id" definition representing the
   12-bit VLAN ID used in the VLAN Tag header uses a range of "1..4094".</t>
            </li>
          </ul>
        </section>
        <section anchor="sec-monitor-dev">
          <name>Monitoring the Device</name>
          <t>Consider whether device performance will be affected by the number of
   protocol entities being instantiated on the device. Designers of an
   Information Model should include information, accessible at runtime,
   about the maximum number of instances an implementation can support,
   the current number of instances, and the expected behavior when the
   current instances exceed the capacity of the implementation or the
   capacity of the device.</t>
          <t>Designers of an Information Model should provide runtime information
   about the maximum supported instances, the current number of instances,
   and expected behavior when capacity is exceeded.</t>
        </section>
        <section anchor="sec-monitor-net">
          <name>Monitoring the Network</name>
          <t>Consider whether network performance will be affected by the number
   of protocol entities being deployed.</t>
          <t>Consider the capability of determining the operational activity, such
   as the number of messages in and the messages out, the number of
   received messages rejected due to format Problems, and the expected
   behaviors when a malformed message is received.</t>
          <t>What are the principal performance factors that need to be considered
   when measuring the operational performance of a network built using
   the protocol? Is it important to measure setup times, end-to-end
   connectivity, hop-by-hop connectivity, or network throughput?</t>
        </section>
        <section anchor="sec-monitor-svc">
          <name>Monitoring the Service</name>
          <t>What are the principal performance factors that need to be considered
   when measuring the performance of a service using the protocol? Is
   it important to measure application-specific throughput, client-server
   associations, end-to-end application quality, service interruptions,
   or user experience (UX)?</t>
          <t>Note that monitoring a service must consider the utility to the user.
   This includes responsiveness, smoothness (absence of jitter), throughput,
   and other "quality of experience" factors.</t>
        </section>
      </section>
      <section anchor="sec-security-mgmt">
        <name>Security Management</name>
        <t>Protocol Designers should consider how to monitor and manage security
   aspects and vulnerabilities of the New Protocol or Protocol Extension.
   Likewise, Protocol Designers should consider how some operations (e.g., logging)
   might include privacy-sensitive information, which ought to be controlled
   to avoid access by unauthorized entities.</t>
        <t>Should a system automatically notify operators of every event
   occurrence, or should an operator-defined threshold control when a
   notification is sent to an operator?</t>
        <t>Should certain statistics be collected about the operation of the New
   Protocol that might be useful for detecting attacks, such as the
   receipt of malformed messages, messages out of order, or messages
   with invalid timestamps? If such statistics are collected, is it
   important to count them separately for each sender to help identify
   the source of attacks?</t>
        <t>Security-oriented manageability topics may include risks of insufficient
   monitoring, regulatory issues with missing audit trails, log capacity
   limits, and security exposures in recommended management mechanisms.</t>
        <t>Consider security threats that may be introduced by management
   operations.</t>
        <ul empty="true">
          <li>
            <t>For example, Control and Provisioning of Wireless Access
   Points (CAPWAP) <xref target="RFC5415"/> breaks the structure of monolithic Access Points
   (APs) into Access Controllers and Wireless Termination Points (WTPs).
   By using a control protocol or management protocol, internal
   information that was previously not accessible is now exposed over
   the network and to management applications and may become a source of
   potential security threats.</t>
          </li>
        </ul>
        <t>The granularity of access control needed on management interfaces
   needs to match operational needs. Typical requirements are a role-based
   access control model and the principle of least privilege,
   where a user can be given only the minimum access necessary to
   perform a required task.</t>
        <t>Some operators wish to do consistency checks of ACLs
   across devices. Protocol Designers should consider Information
   Models to promote comparisons across devices and across vendors to
   permit checking the consistency of security configurations.</t>
        <t>Protocol Designers should consider how to provide a secure transport,
   authentication, identity, and access control that integrates well
   with existing key and credential management infrastructure. It is a
   good idea to start with defining the threat model for the protocol,
   and from that deducing what is required.</t>
        <t>Protocol Designers should consider how ACLs are
   maintained and updated.</t>
        <t>Notifications (e.g., syslog messages) might
   already exist, or can be defined, to alert operators to the
   conditions identified in the Security Considerations for the New
   Protocol or Protocol Extension. The syslog should also record events,
   such as failed logins, but it must be secured.</t>
        <ul empty="true">
          <li>
            <t>For example, you can log all the commands entered by the
   operator using syslog (giving you some degree of audit trail), or you
   can see who has logged on/off using the Secure Shell (SSH) Protocol <xref target="RFC4251"/>
   and from where; failed SSH logins can be logged using syslog, etc.</t>
          </li>
        </ul>
        <t>An analysis of existing counters might help operators recognize the
   conditions identified in the Security Considerations for the new
   protocol before they can impact the network.</t>
        <t>Different management protocols use different assumptions about
   message security and data-access controls. A Protocol Designer that
   recommends using different protocols should consider how security
   will be applied in a balanced manner across multiple management
   interfaces. SNMP authority levels and policy are data-oriented,
   while CLI authority levels and policy are usually command-oriented
   (i.e., task-oriented). Depending on the management function,
   sometimes data-oriented or task-oriented approaches make more sense.
   Protocol Designers should consider both data-oriented and task-oriented
   authority levels and policy. Refer also to <xref target="RFC8341"/> for more details on access control types and rules.</t>
      </section>
    </section>
    <section anchor="sec-oper-mgmt-tooling">
      <name>Operational and Management Tooling Considerations</name>
      <t>The operational community's ability to effectively adopt and
   use new specifications is significantly influenced by the availability
   and adaptability of appropriate tooling. In this context, "tools" refers
   to software systems or utilities used by network operators to deploy,
   configure, monitor, troubleshoot, and manage networks or network protocols
   in real-world operational environments. While the introduction of a new
   specification does not automatically mandate the development of entirely
   new tools, careful consideration must be given to how existing tools can be
   leveraged or extended to support the management and operation of these new
   specifications.</t>
      <t>The <xref target="NEMOPS"/> workshop highlighted a
   consistent theme applicable beyond network management protocols: the
   "ease of use" and adaptability of existing tools are critical factors
   for successful adoption. Therefore, a new specification should provide
   examples using existing, common tooling, or running code that demonstrate
   how to perform key operational tasks.</t>
      <t>Specifically, the following tooling-related aspects should be considered in the operational considerations section,
   prioritizing the adaptation of existing tools:</t>
      <ul spacing="normal">
        <li>
          <t>Leveraging Existing Tooling: Before considering new tools, assess whether
existing tooling, such as monitoring systems, logging platforms,
configuration management systems, and/or orchestration frameworks, can be
adapted to support the new specification. This may involve developing
plugins, modules, or drivers that enable these tools to interact with
the new specification.</t>
        </li>
        <li>
          <t>Extending Existing Tools: Identify areas where existing tools can be
extended to provide the necessary visibility and control over the new
specification. For example, if a new transport protocol is introduced,
consider whether existing network monitoring tools can be extended to
track its performance metrics or whether existing security tools can be
adapted to analyze its traffic patterns.</t>
        </li>
        <li>
          <t>New Tools: Only when existing tools are demonstrably
inadequate for managing and operating the elements of the new specification
should the development of new tools be considered. In such cases,
carefully define the specific requirements for these new tools, focusing
on the functionalities that cannot be achieved through adaptation or
extension of existing solutions.</t>
        </li>
        <li>
          <t>IETF Hackathons for Manageability Testing:
IETF Hackathons <xref target="IETF-HACKATHONS"/>
provide an opportunity to test the functionality, interoperability,
and manageability of New Protocols or Protocol Extensions. These events can be specifically
leveraged to assess the operational (including manageability) implications
of a New Protocol or Protocol Extension by focusing tasks on:  </t>
          <ul spacing="normal">
            <li>
              <t>Adapting existing tools to interact with the new specification.</t>
            </li>
            <li>
              <t>Developing example management scripts or modules for existing management
platforms.</t>
            </li>
            <li>
              <t>Testing the specification's behavior under various operational conditions.</t>
            </li>
            <li>
              <t>Identifying potential tooling gaps and areas for improvement.</t>
            </li>
            <li>
              <t>Creating example flows and use cases for manageability.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Open Source for Tooling: If new tools are deemed necessary, or if significant
adaptations to existing tools are required, prioritize open source development
with community involvement. Open source tools lower the barrier to entry,
encourage collaboration, and provide operators with the flexibility to customize
and extend the tools to meet their specific needs.</t>
        </li>
      </ul>
      <section anchor="sec-ai-tooling">
        <name>AI Tooling Considerations</name>
        <t>With the increasing adoption of Artificial Intelligence (AI)
   in network operations, Protocol Designers
   must consider the implication such functions may have on New Protocols
   and Protocol Extensions. AI
   models often require extensive and granular data for training and
   inference, requiring efficient, scalable, and secure mechanisms
   for telemetry, logging, and state information collection. Protocol Designers
   should anticipate that AI-powered management tools may generate
   frequent and potentially aggressive querying patterns on network
   devices and controllers. Therefore, protocols should be designed with Data
   Models and mechanisms intended to prevent overload from automated
   interactions, while also accounting for AI-specific security
   considerations such as data integrity and protection against
   adversarial attacks on management interfaces. These considerations
   are also relevant to Performance Management (Section <xref format="counter" target="sec-perf-mgmt"/>)
   and Security Management (Section <xref format="counter" target="sec-security-mgmt"/>).</t>
      </section>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not have any IANA actions required.</t>
    </section>
    <section anchor="sec-oper-mgmt-consid">
      <name>Operational Considerations</name>
      <t>Although this document focuses on operations and manageability guidance, it does not define a New Protocol, a Protocol Extension, or an architecture. As such, there are no new operations or manageability requirements introduced by this document.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>This document provides guidelines for
   considering manageability and operations. It introduces no new
   security concerns.</t>
      <t>The provision of a management portal to a network device provides a
   doorway through which an attack on the device may be launched.
   Making the protocol under development be manageable through a
   management protocol creates a vulnerability to a new source of
   attacks. Only management protocols with adequate security mechanisms,
   such as state-of-the-art encryption, mutual authentication, message-integrity protection, and
   authorization, should be used.</t>
      <t>The security implications of password-based authentication should be taken into
   account when designing a New Protocol or Protocol Extension. In particular, the
   authentication mechanisms recommended for new protocols or protocol extensions
   should provide adequate security; for instance, authentication based purely on
   passwords is unlikely to provide an adequate level of security.</t>
      <t>While a standard description of a protocol's manageable parameters facilitates
   legitimate operation, it may also inadvertently simplify an attacker's efforts
   to understand and manipulate the protocol.</t>
      <t>A well-designed protocol is usually more stable and secure. A
   protocol that can be managed and inspected offers the operator a
   better chance of spotting and quarantining any attacks. Conversely,
   making a protocol easy to inspect is a risk if the wrong person
   inspects it.</t>
      <t>If security events cause logs and/or notifications/alerts, a
   concerted attack might be able to be mounted by causing an excess of
   these events. In other words, the security-management mechanisms
   could constitute a security vulnerability. The management of
   security aspects is important (<xref target="sec-security-mgmt"/>).</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <referencegroup anchor="BCP22" target="https://www.rfc-editor.org/info/bcp22">
          <reference anchor="RFC2360" target="https://www.rfc-editor.org/info/rfc2360">
            <front>
              <title>Guide for Internet Standards Writers</title>
              <author fullname="G. Scott" initials="G." surname="Scott"/>
              <date month="June" year="1998"/>
              <abstract>
                <t>This document is a guide for Internet standard writers. It defines those characteristics that make standards coherent, unambiguous, and easy to interpret. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="22"/>
            <seriesInfo name="RFC" value="2360"/>
            <seriesInfo name="DOI" value="10.17487/RFC2360"/>
          </reference>
        </referencegroup>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="CHECKLIST" target="https://github.com/IETF-OPS-DIR/Review-Template/tree/main">
          <front>
            <title>Operations and Management Review Checklist</title>
            <author>
              <organization/>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="IETF-OPS-Dir" target="https://datatracker.ietf.org/group/opsdir/about/">
          <front>
            <title>Ops Directorate (opsdir)</title>
            <author>
              <organization/>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="IETF-HACKATHONS" target="https://www.ietf.org/meeting/hackathons/">
          <front>
            <title>IETF Hackathons</title>
            <author>
              <organization>IETF</organization>
            </author>
            <date year="2025" month="May" day="01"/>
          </front>
        </reference>
        <reference anchor="SECOPS" target="https://niccs.cisa.gov/resources/glossary">
          <front>
            <title>NICCS Glossary</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="August"/>
          </front>
        </reference>
        <referencegroup anchor="BCP186" target="https://www.rfc-editor.org/info/bcp186">
          <reference anchor="RFC7126" target="https://www.rfc-editor.org/info/rfc7126">
            <front>
              <title>Recommendations on Filtering of IPv4 Packets Containing IPv4 Options</title>
              <author fullname="F. Gont" initials="F." surname="Gont"/>
              <author fullname="R. Atkinson" initials="R." surname="Atkinson"/>
              <author fullname="C. Pignataro" initials="C." surname="Pignataro"/>
              <date month="February" year="2014"/>
              <abstract>
                <t>This document provides advice on the filtering of IPv4 packets based on the IPv4 options they contain. Additionally, it discusses the operational and interoperability implications of dropping packets based on the IP options they contain.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="186"/>
            <seriesInfo name="RFC" value="7126"/>
            <seriesInfo name="DOI" value="10.17487/RFC7126"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC5706">
          <front>
            <title>Guidelines for Considering Operations and Management of New Protocols and Protocol Extensions</title>
            <author fullname="D. Harrington" initials="D." surname="Harrington"/>
            <date month="November" year="2009"/>
            <abstract>
              <t>New protocols or protocol extensions are best designed with due consideration of the functionality needed to operate and manage the protocols. Retrofitting operations and management is sub-optimal. The purpose of this document is to provide guidance to authors and reviewers of documents that define new protocols or protocol extensions regarding aspects of operations and management that should be considered. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5706"/>
          <seriesInfo name="DOI" value="10.17487/RFC5706"/>
        </reference>
        <referencegroup anchor="BCP72" target="https://www.rfc-editor.org/info/bcp72">
          <reference anchor="RFC3552" target="https://www.rfc-editor.org/info/rfc3552">
            <front>
              <title>Guidelines for Writing RFC Text on Security Considerations</title>
              <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
              <author fullname="B. Korver" initials="B." surname="Korver"/>
              <date month="July" year="2003"/>
              <abstract>
                <t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak. This document provides guidelines to RFC authors on how to write a good Security Considerations section. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="72"/>
            <seriesInfo name="RFC" value="3552"/>
            <seriesInfo name="DOI" value="10.17487/RFC3552"/>
          </reference>
          <reference anchor="RFC9416" target="https://www.rfc-editor.org/info/rfc9416">
            <front>
              <title>Security Considerations for Transient Numeric Identifiers Employed in Network Protocols</title>
              <author fullname="F. Gont" initials="F." surname="Gont"/>
              <author fullname="I. Arce" initials="I." surname="Arce"/>
              <date month="July" year="2023"/>
              <abstract>
                <t>Poor selection of transient numerical identifiers in protocols such as the TCP/IP suite has historically led to a number of attacks on implementations, ranging from Denial of Service (DoS) or data injection to information leakages that can be exploited by pervasive monitoring. Due diligence in the specification of transient numeric identifiers is required even when cryptographic techniques are employed, since these techniques might not mitigate all the associated issues. This document formally updates RFC 3552, incorporating requirements for transient numeric identifiers, to prevent flaws in future protocols and implementations.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="72"/>
            <seriesInfo name="RFC" value="9416"/>
            <seriesInfo name="DOI" value="10.17487/RFC9416"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="BCP14" target="https://www.rfc-editor.org/info/bcp14">
          <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
            <front>
              <title>Key words for use in RFCs to Indicate Requirement Levels</title>
              <author fullname="S. Bradner" initials="S." surname="Bradner"/>
              <date month="March" year="1997"/>
              <abstract>
                <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="14"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
          </reference>
          <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
            <front>
              <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
              <author fullname="B. Leiba" initials="B." surname="Leiba"/>
              <date month="May" year="2017"/>
              <abstract>
                <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="14"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
          </reference>
        </referencegroup>
        <reference anchor="I-D.ietf-nmop-terminology">
          <front>
            <title>Some Key Terms for Network Fault and Problem Management</title>
            <author fullname="Nigel Davis" initials="N." surname="Davis">
              <organization>Ciena</organization>
            </author>
            <author fullname="Adrian Farrel" initials="A." surname="Farrel">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="18" month="August" year="2025"/>
            <abstract>
              <t>   This document sets out some terms that are fundamental to a common
   understanding of network fault and problem management within the
   IETF.

   The purpose of this document is to bring clarity to discussions and
   other work related to network fault and problem management, in
   particular to YANG data models and management protocols that report,
   make visible, or manage network faults and problems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-terminology-23"/>
        </reference>
        <reference anchor="RFC3444">
          <front>
            <title>On the Difference between Information Models and Data Models</title>
            <author fullname="A. Pras" initials="A." surname="Pras"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <date month="January" year="2003"/>
            <abstract>
              <t>There has been ongoing confusion about the differences between Information Models and Data Models for defining managed objects in network management. This document explains the differences between these terms by analyzing how existing network management model specifications (from the IETF and other bodies such as the International Telecommunication Union (ITU) or the Distributed Management Task Force (DMTF)) fit into the universe of Information Models and Data Models. This memo documents the main results of the 8th workshop of the Network Management Research Group (NMRG) of the Internet Research Task Force (IRTF) hosted by the University of Texas at Austin. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3444"/>
          <seriesInfo name="DOI" value="10.17487/RFC3444"/>
        </reference>
        <reference anchor="RFC6291">
          <front>
            <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <author fullname="S. Mansfield" initials="S." surname="Mansfield"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>At first glance, the acronym "OAM" seems to be well-known and well-understood. Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
              <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM. There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="161"/>
          <seriesInfo name="RFC" value="6291"/>
          <seriesInfo name="DOI" value="10.17487/RFC6291"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-oam-characterization">
          <front>
            <title>Guidelines for Characterizing the Term "OAM"</title>
            <author fullname="Carlos Pignataro" initials="C." surname="Pignataro">
              <organization>Blue Fern
      Consulting</organization>
            </author>
            <author fullname="Adrian Farrel" initials="A." surname="Farrel">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Tal Mizrahi" initials="T." surname="Mizrahi">
              <organization>Huawei</organization>
            </author>
            <date day="28" month="January" year="2026"/>
            <abstract>
              <t>   As the IETF continues to produce and standardize different
   Operations, Administration, and Maintenance (OAM) protocols and
   technologies, various qualifiers and modifiers are prepended to the
   OAM abbreviation.  While, at first glance, the most used appear to be
   well understood, the same qualifier may be interpreted differently in
   different contexts.  A case in point is the qualifiers "in-band" and
   "out-of-band" which have their origins in the radio lexicon, and
   which have been extrapolated into other communication networks.  This
   document recommends not to use these two terms when referring to OAM.

   This document considers some common qualifiers and modifiers that are
   prepended, within the context of packet networks, to the OAM
   abbreviation and lays out guidelines for their use in IETF documents.

   This document extends RFC 6291 by adding to the guidelines for the
   use of the term "OAM" with qualifiers.  It does not modify any part
   of RFC 6291.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-oam-characterization-17"/>
        </reference>
        <reference anchor="I-D.ietf-nmop-network-incident-yang">
          <front>
            <title>A YANG Data Model for Network Incident Management</title>
            <author fullname="Tong Hu" initials="T." surname="Hu">
              <organization>CMCC</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Nigel Davis" initials="N." surname="Davis">
              <organization>Ciena</organization>
            </author>
            <author fullname="Chong Feng" initials="C." surname="Feng">
         </author>
            <date day="13" month="February" year="2026"/>
            <abstract>
              <t>   This document defines a YANG Module for the network incident
   lifecycle management.  This YANG module is meant to provide a
   standard way to report, diagnose, and help reduce troubleshooting
   tickets and resolve network incidents for the sake of network service
   health and probable cause analysis.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-network-incident-yang-08"/>
        </reference>
        <reference anchor="I-D.ietf-core-dns-over-coap">
          <front>
            <title>DNS over CoAP (DoC)</title>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Cenk Gündoğan" initials="C." surname="Gündoğan">
              <organization>NeuralAgent GmbH</organization>
            </author>
            <author fullname="Thomas C. Schmidt" initials="T. C." surname="Schmidt">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
            </author>
            <date day="16" month="September" year="2025"/>
            <abstract>
              <t>   This document defines a protocol for exchanging DNS queries (OPCODE
   0) over the Constrained Application Protocol (CoAP).  These CoAP
   messages can be protected by (D)TLS-Secured CoAP (CoAPS) or Object
   Security for Constrained RESTful Environments (OSCORE) to provide
   encrypted DNS message exchange for constrained devices in the
   Internet of Things (IoT).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-dns-over-coap-20"/>
        </reference>
        <reference anchor="I-D.ietf-suit-mti">
          <front>
            <title>Cryptographic Algorithms for Internet of Things (IoT) Devices</title>
            <author fullname="Brendan Moran" initials="B." surname="Moran">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Øyvind Rønningstad" initials="O." surname="Rønningstad">
              <organization>Nordic Semiconductor</organization>
            </author>
            <author fullname="Akira Tsukamoto" initials="A." surname="Tsukamoto">
              <organization>Openchip &amp; Software Technologies, S.L.</organization>
            </author>
            <date day="22" month="July" year="2025"/>
            <abstract>
              <t>   The SUIT manifest, as defined in "A Manifest Information Model for
   Firmware Updates in Internet of Things (IoT) Devices" (RFC 9124),
   provides a flexible and extensible format for describing how firmware
   and software updates are to be fetched, verified, decrypted, and
   installed on resource-constrained devices.  To ensure the security of
   these update processes, the manifest relies on cryptographic
   algorithms for functions such as digital signature verification,
   integrity checking, and confidentiality.

   This document defines cryptographic algorithm profiles for use with
   the Software Updates for Internet of Things (SUIT) manifest.  These
   profiles specify sets of algorithms to promote interoperability
   across implementations.

   Given the diversity of IoT deployments and the evolving cryptographic
   landscape, algorithm agility is essential.  This document groups
   algorithms into named profiles to accommodate varying levels of
   device capabilities and security requirements.  These profiles
   support the use cases laid out in the SUIT architecture, published in
   "A Firmware Update Architecture for Internet of Things" (RFC 9019).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-suit-mti-23"/>
        </reference>
        <reference anchor="RFC9937">
          <front>
            <title>Proportional Rate Reduction (PRR)</title>
            <author fullname="M. Mathis" initials="M." surname="Mathis"/>
            <author fullname="N. Cardwell" initials="N." surname="Cardwell"/>
            <author fullname="Y. Cheng" initials="Y." surname="Cheng"/>
            <author fullname="N. Dukkipati" initials="N." surname="Dukkipati"/>
            <date month="December" year="2025"/>
            <abstract>
              <t>This document specifies a Standards Track version of the Proportional Rate Reduction (PRR) algorithm that obsoletes the Experimental version described in RFC 6937. PRR regulates the amount of data sent by TCP or other transport protocols during fast recovery. PRR accurately regulates the actual flight size through recovery such that at the end of recovery it will be as close as possible to the slow start threshold (ssthresh), as determined by the congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9937"/>
          <seriesInfo name="DOI" value="10.17487/RFC9937"/>
        </reference>
        <reference anchor="RFC7574">
          <front>
            <title>Peer-to-Peer Streaming Peer Protocol (PPSPP)</title>
            <author fullname="A. Bakker" initials="A." surname="Bakker"/>
            <author fullname="R. Petrocco" initials="R." surname="Petrocco"/>
            <author fullname="V. Grishchenko" initials="V." surname="Grishchenko"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>The Peer-to-Peer Streaming Peer Protocol (PPSPP) is a protocol for disseminating the same content to a group of interested parties in a streaming fashion. PPSPP supports streaming of both prerecorded (on- demand) and live audio/video content. It is based on the peer-to- peer paradigm, where clients consuming the content are put on equal footing with the servers initially providing the content, to create a system where everyone can potentially provide upload bandwidth. It has been designed to provide short time-till-playback for the end user and to prevent disruption of the streams by malicious peers. PPSPP has also been designed to be flexible and extensible. It can use different mechanisms to optimize peer uploading, prevent freeriding, and work with different peer discovery schemes (centralized trackers or Distributed Hash Tables). It supports multiple methods for content integrity protection and chunk addressing. Designed as a generic protocol that can run on top of various transport protocols, it currently runs on top of UDP using Low Extra Delay Background Transport (LEDBAT) for congestion control.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7574"/>
          <seriesInfo name="DOI" value="10.17487/RFC7574"/>
        </reference>
        <reference anchor="RFC9877">
          <front>
            <title>Registration Data Access Protocol (RDAP) Extension for Geofeed Data</title>
            <author fullname="J. Singh" initials="J." surname="Singh"/>
            <author fullname="T. Harrison" initials="T." surname="Harrison"/>
            <date month="October" year="2025"/>
            <abstract>
              <t>This document defines a new Registration Data Access Protocol (RDAP) extension, "geofeed1", for indicating that an RDAP server hosts geofeed URLs for its IP network objects. It also defines a new media type and a new link relation type for the associated link objects included in responses.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9877"/>
          <seriesInfo name="DOI" value="10.17487/RFC9877"/>
        </reference>
        <reference anchor="RFC9552">
          <front>
            <title>Distribution of Link-State and Traffic Engineering Information Using BGP</title>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <date month="December" year="2023"/>
            <abstract>
              <t>In many environments, a component external to a network is called upon to perform computations based on the network topology and the current state of the connections within the network, including Traffic Engineering (TE) information. This is information typically distributed by IGP routing protocols within the network.</t>
              <t>This document describes a mechanism by which link-state and TE information can be collected from networks and shared with external components using the BGP routing protocol. This is achieved using a BGP Network Layer Reachability Information (NLRI) encoding format. The mechanism applies to physical and virtual (e.g., tunnel) IGP links. The mechanism described is subject to policy control.</t>
              <t>Applications of this technique include Application-Layer Traffic Optimization (ALTO) servers and Path Computation Elements (PCEs).</t>
              <t>This document obsoletes RFC 7752 by completely replacing that document. It makes some small changes and clarifications to the previous specification. This document also obsoletes RFC 9029 by incorporating the updates that it made to RFC 7752.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9552"/>
          <seriesInfo name="DOI" value="10.17487/RFC9552"/>
        </reference>
        <reference anchor="I-D.ietf-ippm-ioam-integrity-yang">
          <front>
            <title>A YANG Data Model for In Situ Operations, Administration, and Maintenance (IOAM) Integrity Protected Options</title>
            <author fullname="Justin Iurman" initials="J." surname="Iurman">
              <organization>University of Liege</organization>
            </author>
            <author fullname="Tianran Zhou" initials="T." surname="Zhou">
              <organization>Huawei</organization>
            </author>
            <date day="12" month="January" year="2026"/>
            <abstract>
              <t>   In Situ Operations, Administration, and Maintenance (IOAM) is an
   example of an on-path hybrid measurement method to collect
   operational and telemetry information.  The collected data may then
   be exported to systems that will use it to, e.g., monitor, measure,
   or (re)configure the network.  Integrity Protection of In Situ
   Operations, Administration, and Maintenance (IOAM) Data Fields (RFC
   YYYY) defines IOAM Options with integrity protection, also called
   Integrity Protected Options.  This document defines a YANG module for
   the management of these Integrity Protected Options.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ippm-ioam-integrity-yang-05"/>
        </reference>
        <reference anchor="RFC5218">
          <front>
            <title>What Makes for a Successful Protocol?</title>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <date month="July" year="2008"/>
            <abstract>
              <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success. It is hoped that these observations can serve as guidance for future protocol work. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5218"/>
          <seriesInfo name="DOI" value="10.17487/RFC5218"/>
        </reference>
        <reference anchor="RFC2439">
          <front>
            <title>BGP Route Flap Damping</title>
            <author fullname="C. Villamizar" initials="C." surname="Villamizar"/>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="R. Govindan" initials="R." surname="Govindan"/>
            <date month="November" year="1998"/>
            <abstract>
              <t>A usage of the BGP routing protocol is described which is capable of reducing the routing traffic passed on to routing peers and therefore the load on these peers without adversely affecting route convergence time for relatively stable routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2439"/>
          <seriesInfo name="DOI" value="10.17487/RFC2439"/>
        </reference>
        <reference anchor="RFC1958">
          <front>
            <title>Architectural Principles of the Internet</title>
            <author fullname="B. Carpenter" initials="B." role="editor" surname="Carpenter"/>
            <date month="June" year="1996"/>
            <abstract>
              <t>The Internet and its architecture have grown in evolutionary fashion from modest beginnings, rather than from a Grand Plan. While this process of evolution is one of the main reasons for the technology's success, it nevertheless seems useful to record a snapshot of the current principles of the Internet architecture. This is intended for general guidance and general interest, and is in no way intended to be a formal or invariant reference model. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1958"/>
          <seriesInfo name="DOI" value="10.17487/RFC1958"/>
        </reference>
        <reference anchor="RFC6298">
          <front>
            <title>Computing TCP's Retransmission Timer</title>
            <author fullname="V. Paxson" initials="V." surname="Paxson"/>
            <author fullname="M. Allman" initials="M." surname="Allman"/>
            <author fullname="J. Chu" initials="J." surname="Chu"/>
            <author fullname="M. Sargent" initials="M." surname="Sargent"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document defines the standard algorithm that Transmission Control Protocol (TCP) senders are required to use to compute and manage their retransmission timer. It expands on the discussion in Section 4.2.3.1 of RFC 1122 and upgrades the requirement of supporting the algorithm from a SHOULD to a MUST. This document obsoletes RFC 2988. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6298"/>
          <seriesInfo name="DOI" value="10.17487/RFC6298"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-13"/>
        </reference>
        <reference anchor="RFC8170">
          <front>
            <title>Planning for Protocol Adoption and Subsequent Transitions</title>
            <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>Over the many years since the introduction of the Internet Protocol, we have seen a number of transitions throughout the protocol stack, such as deploying a new protocol, or updating or replacing an existing protocol. Many protocols and technologies were not designed to enable smooth transition to alternatives or to easily deploy extensions; thus, some transitions, such as the introduction of IPv6, have been difficult. This document attempts to summarize some basic principles to enable future transitions, and it also summarizes what makes for a good transition plan.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8170"/>
          <seriesInfo name="DOI" value="10.17487/RFC8170"/>
        </reference>
        <reference anchor="RFC2205">
          <front>
            <title>Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
            <author fullname="L. Zhang" initials="L." surname="Zhang"/>
            <author fullname="S. Berson" initials="S." surname="Berson"/>
            <author fullname="S. Herzog" initials="S." surname="Herzog"/>
            <author fullname="S. Jamin" initials="S." surname="Jamin"/>
            <date month="September" year="1997"/>
            <abstract>
              <t>This memo describes version 1 of RSVP, a resource reservation setup protocol designed for an integrated services Internet. RSVP provides receiver-initiated setup of resource reservations for multicast or unicast data flows, with good scaling and robustness properties. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2205"/>
          <seriesInfo name="DOI" value="10.17487/RFC2205"/>
        </reference>
        <reference anchor="RFC2113">
          <front>
            <title>IP Router Alert Option</title>
            <author fullname="D. Katz" initials="D." surname="Katz"/>
            <date month="February" year="1997"/>
            <abstract>
              <t>This memo describes a new IP Option type that alerts transit routers to more closely examine the contents of an IP packet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2113"/>
          <seriesInfo name="DOI" value="10.17487/RFC2113"/>
        </reference>
        <reference anchor="RFC2711">
          <front>
            <title>IPv6 Router Alert Option</title>
            <author fullname="C. Partridge" initials="C." surname="Partridge"/>
            <author fullname="A. Jackson" initials="A." surname="Jackson"/>
            <date month="October" year="1999"/>
            <abstract>
              <t>This memo describes a new IPv6 Hop-by-Hop Option type that alerts transit routers to more closely examine the contents of an IP datagram. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2711"/>
          <seriesInfo name="DOI" value="10.17487/RFC2711"/>
        </reference>
        <reference anchor="RFC9805">
          <front>
            <title>Deprecation of the IPv6 Router Alert Option for New Protocols</title>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>This document deprecates the IPv6 Router Alert option. Protocols that use the IPv6 Router Alert option may continue to do so, even in future versions. However, new protocols that are standardized in the future must not use the IPv6 Router Alert option.</t>
              <t>This document updates RFC 2711.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9805"/>
          <seriesInfo name="DOI" value="10.17487/RFC9805"/>
        </reference>
        <reference anchor="RFC6709">
          <front>
            <title>Design Considerations for Protocol Extensions</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="B. Aboba" initials="B." role="editor" surname="Aboba"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <date month="September" year="2012"/>
            <abstract>
              <t>This document discusses architectural issues related to the extensibility of Internet protocols, with a focus on design considerations. It is intended to assist designers of both base protocols and extensions. Case studies are included. A companion document, RFC 4775 (BCP 125), discusses procedures relating to the extensibility of IETF protocols. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6709"/>
          <seriesInfo name="DOI" value="10.17487/RFC6709"/>
        </reference>
        <reference anchor="RFC8799">
          <front>
            <title>Limited Domains and Internet Protocols</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="B. Liu" initials="B." surname="Liu"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>There is a noticeable trend towards network behaviors and semantics that are specific to a particular set of requirements applied within a limited region of the Internet. Policies, default parameters, the options supported, the style of network management, and security requirements may vary between such limited regions. This document reviews examples of such limited domains (also known as controlled environments), notes emerging solutions, and includes a related taxonomy. It then briefly discusses the standardization of protocols for limited domains. Finally, it shows the need for a precise definition of "limited domain membership" and for mechanisms to allow nodes to join a domain securely and to find other members, including boundary nodes.</t>
              <t>This document is the product of the research of the authors. It has been produced through discussions and consultation within the IETF but is not the product of IETF consensus.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8799"/>
          <seriesInfo name="DOI" value="10.17487/RFC8799"/>
        </reference>
        <referencegroup anchor="BCP133" target="https://www.rfc-editor.org/info/bcp133">
          <reference anchor="RFC9743" target="https://www.rfc-editor.org/info/rfc9743">
            <front>
              <title>Specifying New Congestion Control Algorithms</title>
              <author fullname="M. Duke" initials="M." role="editor" surname="Duke"/>
              <author fullname="G. Fairhurst" initials="G." role="editor" surname="Fairhurst"/>
              <date month="March" year="2025"/>
              <abstract>
                <t>RFC 5033 discusses the principles and guidelines for standardizing new congestion control algorithms. This document obsoletes RFC 5033 to reflect changes in the congestion control landscape by providing a framework for the development and assessment of congestion control mechanisms, promoting stability across diverse network paths. This document seeks to ensure that proposed congestion control algorithms operate efficiently and without harm when used in the global Internet. It emphasizes the need for comprehensive testing and validation to prevent adverse interactions with existing flows.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="133"/>
            <seriesInfo name="RFC" value="9743"/>
            <seriesInfo name="DOI" value="10.17487/RFC9743"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC1034">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="RFC5321">
          <front>
            <title>Simple Mail Transfer Protocol</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <date month="October" year="2008"/>
            <abstract>
              <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5321"/>
          <seriesInfo name="DOI" value="10.17487/RFC5321"/>
        </reference>
        <reference anchor="RFC5884">
          <front>
            <title>Bidirectional Forwarding Detection (BFD) for MPLS Label Switched Paths (LSPs)</title>
            <author fullname="R. Aggarwal" initials="R." surname="Aggarwal"/>
            <author fullname="K. Kompella" initials="K." surname="Kompella"/>
            <author fullname="T. Nadeau" initials="T." surname="Nadeau"/>
            <author fullname="G. Swallow" initials="G." surname="Swallow"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>One desirable application of Bidirectional Forwarding Detection (BFD) is to detect a Multiprotocol Label Switching (MPLS) Label Switched Path (LSP) data plane failure. LSP Ping is an existing mechanism for detecting MPLS data plane failures and for verifying the MPLS LSP data plane against the control plane. BFD can be used for the former, but not for the latter. However, the control plane processing required for BFD Control packets is relatively smaller than the processing required for LSP Ping messages. A combination of LSP Ping and BFD can be used to provide faster data plane failure detection and/or make it possible to provide such detection on a greater number of LSPs. This document describes the applicability of BFD in relation to LSP Ping for this application. It also describes procedures for using BFD in this environment. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5884"/>
          <seriesInfo name="DOI" value="10.17487/RFC5884"/>
        </reference>
        <reference anchor="RFC6390">
          <front>
            <title>Guidelines for Considering New Performance Metric Development</title>
            <author fullname="A. Clark" initials="A." surname="Clark"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <date month="October" year="2011"/>
            <abstract>
              <t>This document describes a framework and a process for developing Performance Metrics of protocols and applications transported over IETF-specified protocols. These metrics can be used to characterize traffic on live networks and services. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="170"/>
          <seriesInfo name="RFC" value="6390"/>
          <seriesInfo name="DOI" value="10.17487/RFC6390"/>
        </reference>
        <reference anchor="RFC9424">
          <front>
            <title>Indicators of Compromise (IoCs) and Their Role in Attack Defence</title>
            <author fullname="K. Paine" initials="K." surname="Paine"/>
            <author fullname="O. Whitehouse" initials="O." surname="Whitehouse"/>
            <author fullname="J. Sellwood" initials="J." surname="Sellwood"/>
            <author fullname="A. Shaw" initials="A." surname="Shaw"/>
            <date month="August" year="2023"/>
            <abstract>
              <t>Cyber defenders frequently rely on Indicators of Compromise (IoCs) to identify, trace, and block malicious activity in networks or on endpoints. This document reviews the fundamentals, opportunities, operational limitations, and recommendations for IoC use. It highlights the need for IoCs to be detectable in implementations of Internet protocols, tools, and technologies -- both for the IoCs' initial discovery and their use in detection -- and provides a foundation for approaches to operational challenges in network security.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9424"/>
          <seriesInfo name="DOI" value="10.17487/RFC9424"/>
        </reference>
        <reference anchor="I-D.ietf-quic-qlog-main-schema">
          <front>
            <title>qlog: Structured Logging for Network Protocols</title>
            <author fullname="Robin Marx" initials="R." surname="Marx">
              <organization>Akamai</organization>
            </author>
            <author fullname="Luca Niccolini" initials="L." surname="Niccolini">
              <organization>Meta</organization>
            </author>
            <author fullname="Marten Seemann" initials="M." surname="Seemann">
         </author>
            <author fullname="Lucas Pardue" initials="L." surname="Pardue">
              <organization>Cloudflare</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   qlog provides extensible structured logging for network protocols,
   allowing for easy sharing of data that benefits common debug and
   analysis methods and tooling.  This document describes key concepts
   of qlog: formats, files, traces, events, and extension points.  This
   definition includes the high-level log file schemas, and generic
   event schemas.  Requirements and guidelines for creating protocol-
   specific event schemas are also presented.  All schemas are defined
   independent of serialization format, allowing logs to be represented
   in various ways such as JSON, CSV, or protobuf.

Note to Readers

      Note to RFC editor: Please remove this section before publication.

   Feedback and discussion are welcome at https://github.com/quicwg/qlog
   (https://github.com/quicwg/qlog).  Readers are advised to refer to
   the "editor's draft" at that URL for an up-to-date version of this
   document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-quic-qlog-main-schema-13"/>
        </reference>
        <referencegroup anchor="BCP166" target="https://www.rfc-editor.org/info/bcp166">
          <reference anchor="RFC6365" target="https://www.rfc-editor.org/info/rfc6365">
            <front>
              <title>Terminology Used in Internationalization in the IETF</title>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <author fullname="J. Klensin" initials="J." surname="Klensin"/>
              <date month="September" year="2011"/>
              <abstract>
                <t>This document provides a list of terms used in the IETF when discussing internationalization. The purpose is to help frame discussions of internationalization in the various areas of the IETF and to help introduce the main concepts to IETF participants. This memo documents an Internet Best Current Practice.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="166"/>
            <seriesInfo name="RFC" value="6365"/>
            <seriesInfo name="DOI" value="10.17487/RFC6365"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC6632">
          <front>
            <title>An Overview of the IETF Network Management Standards</title>
            <author fullname="M. Ersue" initials="M." role="editor" surname="Ersue"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <date month="June" year="2012"/>
            <abstract>
              <t>This document gives an overview of the IETF network management standards and summarizes existing and ongoing development of IETF Standards Track network management protocols and data models. The document refers to other overview documents, where they exist and classifies the standards for easy orientation. The purpose of this document is, on the one hand, to help system developers and users to select appropriate standard management protocols and data models to address relevant management needs. On the other hand, the document can be used as an overview and guideline by other Standard Development Organizations or bodies planning to use IETF management technologies and data models. This document does not cover Operations, Administration, and Maintenance (OAM) technologies on the data-path, e.g., OAM of tunnels, MPLS Transport Profile (MPLS-TP) OAM, and pseudowire as well as the corresponding management models. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6632"/>
          <seriesInfo name="DOI" value="10.17487/RFC6632"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC7011">
          <front>
            <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
            <author fullname="P. Aitken" initials="P." surname="Aitken"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network. In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required. This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process. This document obsoletes RFC 5101.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="77"/>
          <seriesInfo name="RFC" value="7011"/>
          <seriesInfo name="DOI" value="10.17487/RFC7011"/>
        </reference>
        <reference anchor="RFC5424">
          <front>
            <title>The Syslog Protocol</title>
            <author fullname="R. Gerhards" initials="R." surname="Gerhards"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document describes the syslog protocol, which is used to convey event notification messages. This protocol utilizes a layered architecture, which allows the use of any number of transport protocols for transmission of syslog messages. It also provides a message format that allows vendor-specific extensions to be provided in a structured way.</t>
              <t>This document has been written with the original design goals for traditional syslog in mind. The need for a new layered specification has arisen because standardization efforts for reliable and secure syslog extensions suffer from the lack of a Standards-Track and transport-independent RFC. Without this document, each other standard needs to define its own syslog packet format and transport mechanism, which over time will introduce subtle compatibility issues. This document tries to provide a foundation that syslog extensions can build on. This layered architecture approach also provides a solid basis that allows code to be written once for each syslog feature rather than once for each transport. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5424"/>
          <seriesInfo name="DOI" value="10.17487/RFC5424"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC8791">
          <front>
            <title>YANG Data Structure Extensions</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Björklund" initials="M." surname="Björklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document describes YANG mechanisms for defining abstract data structures with YANG.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8791"/>
          <seriesInfo name="DOI" value="10.17487/RFC8791"/>
        </reference>
        <reference anchor="I-D.ietf-netmod-rfc8407bis">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="Andy Bierman" initials="A." surname="Bierman">
              <organization>YumaWorks</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <date day="5" month="June" year="2025"/>
            <abstract>
              <t>   This document provides guidelines for authors and reviewers of
   specifications containing YANG data models, including IANA-maintained
   modules.  Recommendations and procedures are defined, which are
   intended to increase interoperability and usability of Network
   Configuration Protocol (NETCONF) and RESTCONF Protocol
   implementations that utilize YANG modules.  This document obsoletes
   RFC 8407.

   Also, this document updates RFC 8126 by providing additional
   guidelines for writing the IANA considerations for RFCs that specify
   IANA-maintained modules.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-rfc8407bis-28"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC8199">
          <front>
            <title>YANG Module Classification</title>
            <author fullname="D. Bogdanovic" initials="D." surname="Bogdanovic"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="C. Moberg" initials="C." surname="Moberg"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>The YANG data modeling language is currently being considered for a wide variety of applications throughout the networking industry at large. Many standards development organizations (SDOs), open-source software projects, vendors, and users are using YANG to develop and publish YANG modules for a wide variety of applications. At the same time, there is currently no well-known terminology to categorize various types of YANG modules.</t>
              <t>A consistent terminology would help with the categorization of YANG modules, assist in the analysis of the YANG data modeling efforts in the IETF and other organizations, and bring clarity to the YANG- related discussions between the different groups.</t>
              <t>This document describes a set of concepts and associated terms to support consistent classification of YANG modules.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8199"/>
          <seriesInfo name="DOI" value="10.17487/RFC8199"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC8309">
          <front>
            <title>Service Models Explained</title>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
              <t>A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
              <t>This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture. Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8309"/>
          <seriesInfo name="DOI" value="10.17487/RFC8309"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC3198">
          <front>
            <title>Terminology for Policy-Based Management</title>
            <author fullname="A. Westerinen" initials="A." surname="Westerinen"/>
            <author fullname="J. Schnizlein" initials="J." surname="Schnizlein"/>
            <author fullname="J. Strassner" initials="J." surname="Strassner"/>
            <author fullname="M. Scherling" initials="M." surname="Scherling"/>
            <author fullname="B. Quinn" initials="B." surname="Quinn"/>
            <author fullname="S. Herzog" initials="S." surname="Herzog"/>
            <author fullname="A. Huynh" initials="A." surname="Huynh"/>
            <author fullname="M. Carlson" initials="M." surname="Carlson"/>
            <author fullname="J. Perry" initials="J." surname="Perry"/>
            <author fullname="S. Waldbusser" initials="S." surname="Waldbusser"/>
            <date month="November" year="2001"/>
            <abstract>
              <t>This document is a glossary of policy-related terms. It provides abbreviations, explanations, and recommendations for use of these terms. The intent is to improve the comprehensibility and consistency of writing that deals with network policy, particularly Internet Standards documents (ISDs). This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3198"/>
          <seriesInfo name="DOI" value="10.17487/RFC3198"/>
        </reference>
        <reference anchor="RFC3535">
          <front>
            <title>Overview of the 2002 IAB Network Management Workshop</title>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <date month="May" year="2003"/>
            <abstract>
              <t>This document provides an overview of a workshop held by the Internet Architecture Board (IAB) on Network Management. The workshop was hosted by CNRI in Reston, VA, USA on June 4 thru June 6, 2002. The goal of the workshop was to continue the important dialog started between network operators and protocol developers, and to guide the IETFs focus on future work regarding network management. This report summarizes the discussions and lists the conclusions and recommendations to the Internet Engineering Task Force (IETF) community. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3535"/>
          <seriesInfo name="DOI" value="10.17487/RFC3535"/>
        </reference>
        <reference anchor="RFC2975">
          <front>
            <title>Introduction to Accounting Management</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="D. Harrington" initials="D." surname="Harrington"/>
            <date month="October" year="2000"/>
            <abstract>
              <t>This document describes and discusses the issues involved in the design of the modern accounting systems. The field of Accounting Management is concerned with the collection the collection of resource consumption data for the purposes of capacity and trend analysis, cost allocation, auditing, and billing. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2975"/>
          <seriesInfo name="DOI" value="10.17487/RFC2975"/>
        </reference>
        <reference anchor="RFC5415">
          <front>
            <title>Control And Provisioning of Wireless Access Points (CAPWAP) Protocol Specification</title>
            <author fullname="P. Calhoun" initials="P." role="editor" surname="Calhoun"/>
            <author fullname="M. Montemurro" initials="M." role="editor" surname="Montemurro"/>
            <author fullname="D. Stanley" initials="D." role="editor" surname="Stanley"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This specification defines the Control And Provisioning of Wireless Access Points (CAPWAP) Protocol, meeting the objectives defined by the CAPWAP Working Group in RFC 4564. The CAPWAP protocol is designed to be flexible, allowing it to be used for a variety of wireless technologies. This document describes the base CAPWAP protocol, while separate binding extensions will enable its use with additional wireless technologies. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5415"/>
          <seriesInfo name="DOI" value="10.17487/RFC5415"/>
        </reference>
        <reference anchor="RFC4251">
          <front>
            <title>The Secure Shell (SSH) Protocol Architecture</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell (SSH) Protocol is a protocol for secure remote login and other secure network services over an insecure network. This document describes the architecture of the SSH protocol, as well as the notation and terminology used in SSH protocol documents. It also discusses the SSH algorithm naming system that allows local extensions. The SSH protocol consists of three major components: The Transport Layer Protocol provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User Authentication Protocol authenticates the client to the server. The Connection Protocol multiplexes the encrypted tunnel into several logical channels. Details of these protocols are described in separate documents. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4251"/>
          <seriesInfo name="DOI" value="10.17487/RFC4251"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="NEMOPS">
          <front>
            <title>Report from the IAB Workshop on the Next Era of Network Management Operations (NEMOPS)</title>
            <author fullname="Wes Hardaker" initials="W." surname="Hardaker">
         </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
         </author>
            <date day="29" month="August" year="2025"/>
            <abstract>
              <t>   The "Next Era of Network Management Operations (NEMOPS)" workshop was
   convened by the Internet Architecture Board (IAB) from December 3-5,
   2024, as a three-day online meeting.  It builds on a previous 2002
   workshop, the outcome of which was documented in RFC 3535,
   identifying 14 operator requirements for consideration in future
   network management protocol design and related data models, along
   with some recommendations for the IETF.  Much has changed in the
   Internet’s operation and technological foundations since then.  The
   NEMOPS workshop reviewed the past outcomes and discussed any
   operational barriers that prevented these technologies from being
   widely implemented.  With the industry, network operators and
   protocol engineers working in collaboration, the workshop developed a
   suggested plan of action and network management recommendations for
   the IETF and IRTF.  Building on RFC 3535, this document provides the
   report of the follow-up IAB workshop on Network Management.

   Note that this document is a report on the proceedings of the
   workshop.  The views and positions documented in this report are
   those of the workshop participants and do not necessarily reflect IAB
   views and positions.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-iab-nemops-workshop-report-04"/>
        </reference>
      </references>
    </references>
    <?line 1498?>

<section anchor="sec-checklist">
      <name>Operational Considerations Checklist</name>
      <t>This appendix provides a concise checklist of key questions that Protocol Designers should address in the "Operational Considerations" section of their specifications. Each item references the relevant section of this document for detailed guidance.</t>
      <t>This checklist is intended for use by document authors and the working groups that develop protocol documents. A separate list
of guidelines and a checklist of questions to consider when reviewing a document to evaluate whether the document address common
operations and management needs is provided in <xref target="CHECKLIST"/>.</t>
      <t>The decision to incorporate all or part of these items into their work remains with Protocol Designers and WGs themselves.</t>
      <section anchor="documentation-requirements">
        <name>Documentation Requirements</name>
        <ul spacing="normal">
          <li>
            <t>Does the specification include an "Operational Considerations" section? (<xref target="sec-oper-manag-considerations"/>)</t>
          </li>
          <li>
            <t>Is this section placed immediately before the Security Considerations section? (<xref target="sec-placement-sec"/>)</t>
          </li>
          <li>
            <t>If there are no new considerations, does the section include the appropriate boilerplate with explanation? (<xref target="sec-null-sec"/>)</t>
          </li>
        </ul>
      </section>
      <section anchor="operational-fit">
        <name>Operational Fit</name>
        <ul spacing="normal">
          <li>
            <t>How does this protocol operate "out of the box"? (<xref target="sec-install"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What are the default values, modes, timers, and states? (<xref target="sec-install"/>)</t>
              </li>
              <li>
                <t>What is the rationale for chosen default values, especially if they affect operations or are expected to change over time? (<xref target="sec-install"/>)</t>
              </li>
            </ul>
          </li>
          <li>
            <t>What is the migration path for existing deployments? (<xref target="sec-migration"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>How will deployments transition from older versions or technologies? (<xref target="sec-migration"/>)</t>
              </li>
              <li>
                <t>Does the protocol require infrastructure changes, and how can these be introduced? (<xref target="sec-migration"/>)</t>
              </li>
            </ul>
          </li>
          <li>
            <t>What are the requirements or dependencies on other protocols and functional components? (<xref target="sec-other"/>)</t>
          </li>
          <li>
            <t>What is the impact on network operation? (<xref target="sec-impact"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What are the scaling implications and interactions with other protocols? (<xref target="sec-impact"/>)</t>
              </li>
              <li>
                <t>What are the impacts on traffic patterns or performance (e.g., delay, jitter)? (<xref target="sec-impact"/>)</t>
              </li>
            </ul>
          </li>
          <li>
            <t>What is the impact on Security Operations? (<xref target="sec-impact-secops"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>How does deployment affect Indicators of Compromise or their availability? (<xref target="sec-impact-secops"/>)</t>
              </li>
              <li>
                <t>What logging is needed for digital forensics? (<xref target="sec-impact-secops"/>)</t>
              </li>
            </ul>
          </li>
          <li>
            <t>How can correct operation be verified? (<xref target="sec-oper-verify"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What status and health indicators does the protocol provide? (<xref target="sec-oper-verify"/>)</t>
              </li>
            </ul>
          </li>
          <li>
            <t>How are human-readable messages handled? (<xref target="sec-messages"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>Do messages contain codes that enable local language mapping for internationalization? (<xref target="sec-messages"/>)</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="management-information">
        <name>Management Information</name>
        <ul spacing="normal">
          <li>
            <t>What needs to be managed? (<xref target="sec-mgmt-consid"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What are the manageable entities (e.g., protocol endpoints, network elements, services)? (<xref target="sec-mgmt-consid"/>)</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Which standardized management technologies are applicable? (<xref target="sec-mgmt-tech"/>)</t>
          </li>
          <li>
            <t>What essential information is required? (<xref target="sec-interop"/>, <xref target="sec-mgmt-info"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What operational, configuration, state, and statistical information is needed? (<xref target="sec-interop"/>)</t>
              </li>
              <li>
                <t>Is an Information Model needed, especially if multiple Data Model representations are required? (<xref target="sec-interop"/>)</t>
              </li>
              <li>
                <t>What is manageable, what needs configuration, and what protocol-specific events might occur? (<xref target="sec-mgmt-info"/>)</t>
              </li>
              <li>
                <t>How are configuration data, operational state, and statistics distinguished? (<xref target="sec-mgmt-info"/>)</t>
              </li>
            </ul>
          </li>
          <li>
            <t>If YANG Data Models are defined, what type is appropriate? (<xref target="sec-yang-dm"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>Should Device Models, Network Models, or Service Models be specified? (<xref target="sec-yang-dm"/>)</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="fault-management">
        <name>Fault Management</name>
        <ul spacing="normal">
          <li>
            <t>What faults and events should be reported? (<xref target="sec-fm-mgmt"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What essential faults, health indicators, alarms, and events should be exposed? (<xref target="sec-fm-mgmt"/>)</t>
              </li>
              <li>
                <t>How will fault information be propagated? (<xref target="sec-fm-mgmt"/>)</t>
              </li>
            </ul>
          </li>
          <li>
            <t>How is liveness monitored? (<xref target="sec-monitor"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What testing and liveness detection features are built into the protocol? (<xref target="sec-monitor"/>)</t>
              </li>
            </ul>
          </li>
          <li>
            <t>How are faults determined? (<xref target="sec-fault-determ"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What error counters or diagnostics help pinpoint faults? (<xref target="sec-fault-determ"/>)</t>
              </li>
              <li>
                <t>What distinguishes faulty from correct messages? (<xref target="sec-fault-determ"/>)</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="configuration-management">
        <name>Configuration Management</name>
        <ul spacing="normal">
          <li>
            <t>What configuration parameters are defined? (<xref target="sec-config-mgmt"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What parameters need to be configurable, including their defaults and valid ranges? (<xref target="sec-config-mgmt"/>)</t>
              </li>
              <li>
                <t>What information persists across reboots? (<xref target="sec-config-mgmt"/>)</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="performance-management">
        <name>Performance Management</name>
        <ul spacing="normal">
          <li>
            <t>What are the performance implications? (<xref target="sec-perf-mgmt"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What are the hardware/software performance impacts (e.g., CPU, memory, forwarding)? (<xref target="sec-perf-mgmt"/>)</t>
              </li>
            </ul>
          </li>
          <li>
            <t>What performance information should be available? (<xref target="sec-monitor-proto"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What protocol counters are defined (e.g., packets received, sent, dropped)? (<xref target="sec-monitor-proto"/>)</t>
              </li>
              <li>
                <t>What is the counter behavior at maximum values? (<xref target="sec-monitor-proto"/>)</t>
              </li>
              <li>
                <t>What are the protocol limitations and behavior when limits are exceeded? (<xref target="sec-monitor-proto"/>)</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="security-management">
        <name>Security Management</name>
        <ul spacing="normal">
          <li>
            <t>What security-related monitoring is needed? (<xref target="sec-security-mgmt"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What security events should be logged? (<xref target="sec-security-mgmt"/>)</t>
              </li>
              <li>
                <t>What statistics help detect attacks? (<xref target="sec-security-mgmt"/>)</t>
              </li>
              <li>
                <t>What security and privacy threats do management operations introduce? (<xref target="sec-security-mgmt"/>)</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-changes-since-5706">
      <name>Changes Since RFC 5706</name>
      <t>The following changes have been made to the guidelines published in  <xref target="RFC5706"/>:</t>
      <ul spacing="normal">
        <li>
          <t>Change intended status from Informational to Best Current Practice</t>
        </li>
        <li>
          <t>Indicate that this document updates RFC 2360 and add the relevant updated text</t>
        </li>
        <li>
          <t>Move the "Operational Considerations" Appendix A to a Checklist <xref target="CHECKLIST"/> maintained in GitHub</t>
        </li>
        <li>
          <t>Add a concise "Operational Considerations Checklist" appendix (<xref target="sec-checklist"/>) with key questions that should be addressed in protocol specifications</t>
        </li>
        <li>
          <t>Add a requirement for an "Operational Considerations" section in all new RFCs that document a technical specification in the IETF Stream, along with specific guidance on its content.</t>
        </li>
        <li>
          <t>Update the operational and manageability-related technologies to reflect over 15 years of advancements  </t>
          <ul spacing="normal">
            <li>
              <t>Provide focus and details on YANG-based standards, deprioritizing MIB Modules.</t>
            </li>
            <li>
              <t>Add a "YANG Data Model Considerations" section</t>
            </li>
            <li>
              <t>Update the "Available Management Technologies" landscape</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Add an "Operational and Management Tooling Considerations" section</t>
        </li>
      </ul>
      <section anchor="sec-todo">
        <name>TO DO LIST</name>
        <t>See the list of open issues at https://github.com/IETF-OPSAWG-WG/draft-opsarea-rfc5706bis/issues</t>
      </section>
    </section>
    <section numbered="false" anchor="sec-ack">
      <name>Acknowledgements</name>
      <t>The authors thank the following individuals and groups,
whose efforts have helped to improve this document:</t>
      <dl>
        <dt>The IETF Ops Directorate (OpsDir):</dt>
        <dd>
          <t>The IETF OpsDir <xref target="IETF-OPS-Dir"/> reviewer team, which has been providing document reviews for more than a decade, and its Chairs past and present: Gunter Van de Velde, Carlos Pignataro, Bo Wu, and Daniele Ceccarelli.</t>
        </dd>
        <dt>The Area Director (AD) championing the update:</dt>
        <dd>
          <t>Med Boucadair, who initiated and championed the effort to refresh RFC 5706, 15 years after its publication, building on an idea originally suggested by Carlos Pignataro.</t>
        </dd>
        <dt>Reviewers of this document, in roughly chronological order:</dt>
        <dd>
          <t>Mahesh Jethanandani, Chongfeng Xie, Alvaro Retana, Michael P., Scott Hollenbeck, Ron Bonica, Italo Busi, Brian Trammel, Aijun Wang, Richard Shockey, Tina Tsou, Lars Eggert, Joel Halpern, Johan Stenstam, Dave Thaler, Harald Alvestrand, Greg Mirsky, and Marco Tiloca.</t>
        </dd>
        <dt>The document shepherd who has gone beyond normal shepherding duties to improve this document:</dt>
        <dd>
          <t>Alvaro Retana</t>
        </dd>
        <dt>The author of RFC 5706:</dt>
        <dd>
          <t>David Harrington</t>
        </dd>
        <dt>Acknowledgments from RFC 5706:</dt>
        <dd>
          <t>This document started from an earlier document edited by Adrian
Farrel, which itself was based on work exploring the need for
Manageability Considerations sections in all Internet-Drafts produced
within the Routing Area of the IETF. That earlier work was produced
by Avri Doria, Loa Andersson, and Adrian Farrel, with valuable
feedback provided by Pekka Savola and Bert Wijnen.</t>
        </dd>
        <dt/>
        <dd>
          <t>Some of the discussion about designing for manageability came from
private discussions between Dan Romascanu, Bert Wijnen, Jürgen Schönwälder, Andy Bierman, and David Harrington.</t>
        </dd>
        <dt/>
        <dd>
          <t>Thanks to reviewers who helped fashion this document, including
Harald Alvestrand, Ron Bonica, Brian Carpenter, Benoît Claise, Adrian
Farrel, David Kessens, Dan Romascanu, Pekka Savola, Jürgen Schönwälder, Bert Wijnen, Ralf Wolter, and Lixia Zhang.</t>
        </dd>
      </dl>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Thomas Graf">
        <organization>Swisscom</organization>
        <address>
          <email>thomas.graf@swisscom.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
