1 / 7

XML Router Configs BOF Operator Involvement

XML Router Configs BOF Operator Involvement. Andy Bierman abierman@cisco.com. Introduction. The goal of the Netconf WG is to create a standard protocol for programmatic configuration of networks.

zenia
Download Presentation

XML Router Configs BOF Operator Involvement

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. XML Router Configs BOFOperator Involvement Andy Bierman abierman@cisco.com

  2. Introduction • The goal of the Netconf WG is to create a standard protocol for programmatic configuration of networks. • The co-chairs are very focused on producing a standard that operators want to use and vendors want to deploy. • Although it’s easy to ignore the IETF WG process and focus on running your network, it will be worth the effort to get involved. • Various ways to participate; some easier than others • The WG really needs input from people with network operations experience to keep the work focused

  3. WG Details • Mailing List • Discussion: netconf@ops.ietf.org • Subscribe: netconf-request@ops.ietf.org • ‘subscribe’ in the message body • Archive: http://ops.ietf.org/lists/netconf/ • WG Charter Page • http://www.ietf.org/html.charters/netconf-charter.html • Please get involved • Read drafts, participate in email discussions, etc. • Send email directly to the co-chairs with your concerns

  4. Some Charter Details • The Netconf WG is chartered to produce a protocol suitable for network configuration, with the following characteristics: • Provides retrieval mechanisms which can differentiate between configuration data and non-configuration data • Is extensible enough that vendors will provide access to all configuration data on the device using a single protocol • Has a programmatic interface (avoids screen scraping and formatting-related changes between releases) • Uses a textual data representation, that can be easily manipulated using non-specialized text manipulation tools. • Supports integration with existing user authentication methods • Supports integration with existing configuration database systems • Supports network wide configuration transactions (with features such as locking and rollback capability) • Is as transport-independent as possible • Provides support for asynchronous notifications

  5. Some Issues Already Decided (1/2) • Peer to Peer • Unicast, connection-oriented, synchronous transactions • Either end can initiate the connection • Session Based • User authentication and some protocol characteristics decided at session startup • Extensible Operational Model • Base features + standard extensions + vendor extensions • Extensions determined by capabilities exchange at session startup

  6. Some Issues Already Decided (2/2) • Transport Independent, but certain requirements of transport are assumed • Connection-oriented • Most security features at transport layer, such as encryption and user authentication • XML data encoding • Good balance between human and machine readable syntax • Config content can also be XML-wrapped (CLI) text • Separation of protocol and data model • Will identify any data model issues which affect the protocol • IETF and vendors will create data models independently of the protocol development • XML Schema (XSD) will probably be used for initial data types and data modeling language

  7. Issues The WG Needs To Resolve • Transport mappings • BEEP, HTTPS, SSH • RPC Layer • SOAP encoding, xmlconf RPC, or simple request/response • Advanced XML features • WSDL templates, XPath filtering • Protocol Operations • Add, Modify, Delete Variants • Operation as element above data model, element within data model, or attribute within data model elements • Advanced operations: mandatory or optional • Checkpoint, Rollback, Locking • Multi-device operation support • Error Handling • Notifications • Use of Secure Syslog (RFC 3195) or SNMP-like notifications

More Related