| rfc9349.original.xml | rfc9349.xml | |||
|---|---|---|---|---|
| <?xml version='1.0' encoding='utf-8'?> | <?xml version="1.0" encoding="UTF-8"?> | |||
| <!DOCTYPE rfc [ | <!DOCTYPE rfc [ | |||
| <!ENTITY nbsp " "> | <!ENTITY nbsp " "> | |||
| <!ENTITY zwsp "​"> | <!ENTITY zwsp "​"> | |||
| <!ENTITY nbhy "‑"> | <!ENTITY nbhy "‑"> | |||
| <!ENTITY wj "⁠"> | <!ENTITY wj "⁠"> | |||
| ]> | ]> | |||
| <?xml-stylesheet type="text/xsl" href="rfc2629.xslt"?> | ||||
| <?rfc toc="yes"?> | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" submissionType | |||
| <?rfc compact="no"?> | ="IETF" category="std" consensus="true" docName="draft-ietf-ipsecme-mib-iptfs-11 | |||
| <?rfc subcompact="no"?> | " number="9349" obsoletes="" updates="" xml:lang="en" tocInclude="true" symRefs= | |||
| <?rfc symrefs="yes" ?> | "true" sortRefs="true" version="3"> | |||
| <?rfc sortrefs="yes"?> | ||||
| <?rfc iprnotified="no"?> | ||||
| <?rfc strict="yes"?> | ||||
| <rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" category="std" | ||||
| docName="draft-ietf-ipsecme-mib-iptfs-11" submissionType="IETF" obsoletes="" up | ||||
| dates="" xml:lang="en" tocInclude="true" symRefs="true" sortRefs="true" version= | ||||
| "3"> | ||||
| <!-- xml2rfc v2v3 conversion 3.14.2 --> | <!-- xml2rfc v2v3 conversion 3.14.2 --> | |||
| <front> | <front> | |||
| <title abbrev="draft-ietf-ipsecme-mib-iptfs-11">Definitions of Managed Objec | <title abbrev="Definitions of Managed Objects for IP-TFS">Definitions of Man | |||
| ts for IP Traffic Flow Security</title> | aged Objects for IP Traffic Flow Security</title> | |||
| <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-mib-iptfs-11"/> | <seriesInfo name="RFC" value="9349"/> | |||
| <!-- <title abbrev="Definitions of Managed Objects for IP-TFS">Definitions o f Managed Objects for IP Traffic Flow Security</title> --> | <!-- <title abbrev="Definitions of Managed Objects for IP-TFS">Definitions o f Managed Objects for IP Traffic Flow Security</title> --> | |||
| <author initials="D." surname="Fedyk" fullname="Don Fedyk"> | <author initials="D." surname="Fedyk" fullname="Don Fedyk"> | |||
| <organization>LabN Consulting, L.L.C.</organization> | <organization>LabN Consulting, L.L.C.</organization> | |||
| <address> | <address> | |||
| <email>dfedyk@labn.net</email> | <email>dfedyk@labn.net</email> | |||
| </address> | </address> | |||
| </author> | </author> | |||
| <author initials="E." surname="Kinzie" fullname="Eric Kinzie"> | <author initials="E." surname="Kinzie" fullname="Eric Kinzie"> | |||
| <organization>LabN Consulting, L.L.C.</organization> | <organization>LabN Consulting, L.L.C.</organization> | |||
| <address> | <address> | |||
| <email>ekinzie@labn.net</email> | <email>ekinzie@labn.net</email> | |||
| </address> | </address> | |||
| </author> | </author> | |||
| <date/> | <date year="2023" month="January"/> | |||
| <area>sec</area> | ||||
| <workgroup>ipsecme</workgroup> | ||||
| <keyword>MIB</keyword> | ||||
| <keyword>IPsec</keyword> | ||||
| <keyword>IP-TRAFFIC-FLOW-SECURITY-MIB</keyword> | ||||
| <abstract> | <abstract> | |||
| <t>This document describes managed objects for the management of IP | <t>This document describes managed objects for the management of IP | |||
| Traffic Flow Security additions to IKEv2 and IPsec. | Traffic Flow Security additions to Internet Key Exchange Protocol Version 2 (IKE | |||
| This document provides a read only version of the objects defined in | v2) and IPsec. | |||
| the YANG module for the same purpose. | This document provides a read-only version of the objects defined in | |||
| the YANG module for the same purpose, which is in "A YANG Data Model for | ||||
| IP Traffic Flow Security" (RFC 9348). | ||||
| </t> | </t> | |||
| </abstract> | </abstract> | |||
| </front> | </front> | |||
| <middle> | <middle> | |||
| <section numbered="true" toc="default"> | <section numbered="true" toc="default"> | |||
| <name>Introduction</name> | <name>Introduction</name> | |||
| <t>This document defines a Management Information Base (MIB) module for us e | <t>This document defines a Management Information Base (MIB) module for us e | |||
| with network management protocols in the Internet community. Traffic | with network management protocols in the Internet community. IP Traffic | |||
| Flow Security (IP-TFS) extensions as defined in | Flow Security (IP-TFS) extensions, as defined in | |||
| <xref target="I-D.ietf-ipsecme-iptfs" format="default"/> are | <xref target="RFC9347" format="default"/>, are | |||
| enhancements to an IPsec tunnel Security Association to provide | enhancements to an IPsec tunnel Security Association (SA) to provide | |||
| improved traffic confidentiality. </t> | improved traffic confidentiality. </t> | |||
| <t> | ||||
| The objects defined here are the same as <xref target="RFC9348" format=" | ||||
| default"/>, | ||||
| with the exception that only operational or state data is supported. | ||||
| By making operational data accessible via SNMP, existing network managem | ||||
| ent systems can monitor IP-TFS. | ||||
| This data is listed in the MIB | ||||
| tree in <xref target ="mib-tree" format="default"/>. | ||||
| This module uses the YANG data model as a reference point for managed objects. | ||||
| Note that an IETF MIB model for IPsec was never standardized; however, the str | ||||
| uctures here | ||||
| could be adapted to existing proprietary MIB implementations where SNMP is use | ||||
| d to manage networks. | ||||
| </t> | ||||
| <section numbered="true" toc="default"> | ||||
| <name>The Internet-Standard Management Framework</name> | ||||
| <!-- DNE starts --> | ||||
| <t> | <t> | |||
| For a detailed overview of the documents that describe the current | For a detailed overview of the documents that describe the current | |||
| Internet-Standard Management Framework, please refer to section 7 of | Internet-Standard Management Framework, please refer to <xref target="RFC3410 | |||
| <xref target="RFC3410" format="default"/>. | " section="7" sectionFormat="of" format="default"/>. | |||
| </t> | </t> | |||
| <t> | <t> | |||
| Managed objects are accessed via a virtual information store, termed | Managed objects are accessed via a virtual information store, termed | |||
| the Management Information Base or MIB. MIB objects are generally | the Management Information Base or MIB. MIB objects are generally | |||
| accessed through the Simple Network Management Protocol (SNMP). | accessed through the Simple Network Management Protocol (SNMP). | |||
| Objects in the MIB are defined using the mechanisms defined in the | Objects in the MIB are defined using the mechanisms defined in the | |||
| Structure of Management Information (SMI). This memo specifies a MIB | Structure of Management Information (SMI). This memo specifies a MIB | |||
| module that is compliant to the SMIv2, which is described in STD 58, | module that is compliant to the SMIv2, which is described in STD 58, | |||
| <xref target="RFC2578" format="default"/>, STD 58, <xref target="RFC2579" fo rmat="default"/> and STD 58, | <xref target="RFC2578" format="default"/>, STD 58, <xref target="RFC2579" fo rmat="default"/> and STD 58, | |||
| <xref target="RFC2580" format="default"/>. | <xref target="RFC2580" format="default"/>. | |||
| </t> | </t> | |||
| <t> | <!-- DNE ends --> | |||
| The objects defined here are the same as <xref target="I-D.ietf-ipsecme- | </section> | |||
| yang-iptfs" format="default"/> | ||||
| with the exception that only operational or state data is supported. | ||||
| By making operational data accessible via SNMP existing network manageme | ||||
| nt systems can monitor IP-TFS. | ||||
| This data is listed in the MIB | ||||
| tree in <xref target ="mib-tree" format="default"/>. | ||||
| This module uses the YANG model as a reference point for managed objects. | ||||
| Note an IETF MIB model for IPsec was never standardized however the structures | ||||
| here | ||||
| could be adapted to existing proprietary MIB implementations where SNMP is use | ||||
| d to manage networks. | ||||
| </t> | ||||
| </section> | </section> | |||
| <section numbered="true" toc="default"> | <section numbered="true" toc="default"> | |||
| <name>Terminology & Concepts</name> | <name>Terminology and Concepts</name> | |||
| <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | <t> | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQU | |||
| "OPTIONAL" in this document are to be interpreted as described in | IRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL | |||
| <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default | NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14> | |||
| "/> when, and only when, they appear in all capitals, | RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", | |||
| as shown here.</t> | "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to | |||
| be interpreted as | ||||
| described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> | ||||
| when, and only when, they appear in all capitals, as shown here. | ||||
| </t> | ||||
| </section> | </section> | |||
| <section numbered="true" toc="default"> | <section numbered="true" toc="default"> | |||
| <name>Overview</name> | <name>Overview</name> | |||
| <t>This document defines the MIB for access to operational parameters of I | <t>This document defines the MIB for access to operational parameters of I | |||
| P traffic | P Traffic | |||
| flow security (IP-TFS). IP-TFS, defined in | Flow Security (IP-TFS). IP-TFS, defined in | |||
| <xref target="I-D.ietf-ipsecme-iptfs" format="default"/>, | <xref target="RFC9347" format="default"/>, | |||
| configures a security association for tunnel mode IPsec with characteristics | configures a Security Association for tunnel mode IPsec with characteristics | |||
| that improve traffic confidentiality and reduce bandwidth efficiency loss. | that improve traffic confidentiality and reduce bandwidth efficiency loss. | |||
| </t> | </t> | |||
| <t> | <t> | |||
| This document is based on the concepts and management model | This document is based on the concepts and management model | |||
| defined in <xref target="I-D.ietf-ipsecme-yang-iptfs" format="default"/>. This | defined in <xref target="RFC9348" format="default"/>. This | |||
| document assumes familiarity with IP security concepts described in | document assumes familiarity with the IPsec concepts described in | |||
| <xref target="RFC4301" format="default"/>, IP-TFS as described in | <xref target="RFC4301" format="default"/>, IP-TFS as described in | |||
| <xref target="I-D.ietf-ipsecme-iptfs" format="default"/> and the | <xref target="RFC9347" format="default"/>, and the | |||
| IP-TFS management model described in | IP-TFS management model described in | |||
| <xref target="I-D.ietf-ipsecme-yang-iptfs" format="default"/>. | <xref target="RFC9348" format="default"/>. | |||
| </t> | </t> | |||
| <t> | <t> | |||
| This document specifies an extensible operational model for IP-TFS. | This document specifies an extensible operational model for IP-TFS. | |||
| It reuses the management model | It reuses the management model | |||
| defined in <xref target="I-D.ietf-ipsecme-yang-iptfs" format="default"/>. | defined in <xref target="RFC9348" format="default"/>. | |||
| It allows SNMP systems to read operational objects (which includes configured ob | It allows SNMP systems to read operational objects (which include configured obj | |||
| jects) from IP-TFS. | ects) from IP-TFS. | |||
| </t> | </t> | |||
| </section> | </section> | |||
| <section numbered="true" toc="default"> | <section numbered="true" toc="default"> | |||
| <name>Management Objects</name> | <name>Management Objects</name> | |||
| <section anchor="mib-tree" numbered="true" toc="default"> | <section anchor="mib-tree" numbered="true" toc="default"> | |||
| <name>MIB Tree</name> | <name>MIB Tree</name> | |||
| <t>The following is the MIB registration tree diagram for the IP-TFS | <t>The following is the MIB registration tree diagram for the IP-TFS | |||
| extensions.</t> | extensions.</t> | |||
| <artwork name="" type="" align="left" alt=""><![CDATA[ | <artwork name="" type="" align="left" alt=""><![CDATA[ | |||
| # IP-TRAFFIC-FLOW-SECURITY-MIB registration tree | # IP-TRAFFIC-FLOW-SECURITY-MIB registration tree | |||
| skipping to change at line 157 ¶ | skipping to change at line 163 ¶ | |||
| | | +--iptfsInnerStatsTable(1) | | | +--iptfsInnerStatsTable(1) | |||
| | | +--iptfsInnerStatsTableEntry(1) [iptfsInnerSaIndex] | | | +--iptfsInnerStatsTableEntry(1) [iptfsInnerSaIndex] | |||
| | | +-- --- Integer32 iptfsInnerSaIndex(1) | | | +-- --- Integer32 iptfsInnerSaIndex(1) | |||
| | | +-- r-n Counter64 txInnerPkts(2) | | | +-- r-n Counter64 txInnerPkts(2) | |||
| | | +-- r-n Counter64 txInnerOctets(3) | | | +-- r-n Counter64 txInnerOctets(3) | |||
| | | +-- r-n Counter64 rxInnerPkts(4) | | | +-- r-n Counter64 rxInnerPkts(4) | |||
| | | +-- r-n Counter64 rxInnerOctets(5) | | | +-- r-n Counter64 rxInnerOctets(5) | |||
| | | +-- r-n Counter64 rxIncompleteInnerPkts(6) | | | +-- r-n Counter64 rxIncompleteInnerPkts(6) | |||
| | +--iptfsOuterStatsGroup(4) | | +--iptfsOuterStatsGroup(4) | |||
| | +--iptfsOuterStatsTable(1) | | +--iptfsOuterStatsTable(1) | |||
| | +--iptfsOuterStatsTableEntry(1) [iptfsSaIndex] | | +--iptfsOuterStatsTableEntry(1) [iptfsOuterSaIndex] | |||
| | +-- --- Integer32 iptfsSaIndex(1) | | +-- --- Integer32 iptfsOuterSaIndex(1) | |||
| | +-- r-n Counter64 txExtraPadPkts(2) | | +-- r-n Counter64 txExtraPadPkts(2) | |||
| | +-- r-n Counter64 txExtraPadOctets(3) | | +-- r-n Counter64 txExtraPadOctets(3) | |||
| | +-- r-n Counter64 txAllPadPkts(4) | | +-- r-n Counter64 txAllPadPkts(4) | |||
| | +-- r-n Counter64 txAllPadOctets(5) | | +-- r-n Counter64 txAllPadOctets(5) | |||
| | +-- r-n Counter64 rxExtraPadPkts(6) | | +-- r-n Counter64 rxExtraPadPkts(6) | |||
| | +-- r-n Counter64 rxExtraPadOctets(7) | | +-- r-n Counter64 rxExtraPadOctets(7) | |||
| | +-- r-n Counter64 rxAllPadPkts(8) | | +-- r-n Counter64 rxAllPadPkts(8) | |||
| | +-- r-n Counter64 rxAllPadOctets(9) | | +-- r-n Counter64 rxAllPadOctets(9) | |||
| | +-- r-n Counter64 rxErroredPkts(10) | | +-- r-n Counter64 rxErroredPkts(10) | |||
| | +-- r-n Counter64 rxMissedPkts(11) | | +-- r-n Counter64 rxMissedPkts(11) | |||
| skipping to change at line 177 ¶ | skipping to change at line 183 ¶ | |||
| | +-- r-n Counter64 rxErroredPkts(10) | | +-- r-n Counter64 rxErroredPkts(10) | |||
| | +-- r-n Counter64 rxMissedPkts(11) | | +-- r-n Counter64 rxMissedPkts(11) | |||
| +--iptfsMIBConformance(2) | +--iptfsMIBConformance(2) | |||
| +--iptfsMIBConformances(1) | +--iptfsMIBConformances(1) | |||
| | +--iptfsMIBCompliance(1) | | +--iptfsMIBCompliance(1) | |||
| +--iptfsMIBGroups(2) | +--iptfsMIBGroups(2) | |||
| +--iptfsMIBConfGroup(1) | +--iptfsMIBConfGroup(1) | |||
| +--ipsecStatsConfGroup(2) | +--ipsecStatsConfGroup(2) | |||
| +--iptfsInnerStatsConfGroup(3) | +--iptfsInnerStatsConfGroup(3) | |||
| +--iptfsOuterStatsConfGroup(4) | +--iptfsOuterStatsConfGroup(4) | |||
| ]]></artwork> | ]]></artwork> | |||
| </section> | </section> | |||
| <section numbered="true" toc="default"> | <section numbered="true" toc="default"> | |||
| <name>SNMP</name> | <name>SNMP</name> | |||
| <t>The following is the MIB for IP-TFS. The Congestion control algorithm | <t>The following is the MIB for IP-TFS. The congestion control algorithm | |||
| in <xref target="RFC5348" format="default"/> is referenced in the MIB text.</t> | in <xref target="RFC5348" format="default"/> is referenced in the MIB text.</t> | |||
| <sourcecode name="iptfs-mib.mib" type="mib" markers="true"><![CDATA[=--> | <sourcecode name="iptfs-mib.mib" type="mib" markers="true"><![CDATA[ | |||
| -- *---------------------------------------------------------------- | -- *---------------------------------------------------------------- | |||
| -- * IP-TRAFFIC-FLOW-SECURITY-MIB Module | -- * IP-TRAFFIC-FLOW-SECURITY-MIB Module | |||
| -- *---------------------------------------------------------------- | -- *---------------------------------------------------------------- | |||
| IP-TRAFFIC-FLOW-SECURITY-MIB DEFINITIONS ::= BEGIN | IP-TRAFFIC-FLOW-SECURITY-MIB DEFINITIONS ::= BEGIN | |||
| IMPORTS | IMPORTS | |||
| MODULE-IDENTITY, OBJECT-TYPE, | MODULE-IDENTITY, OBJECT-TYPE, | |||
| Integer32, Unsigned32, Counter64, mib-2 | Integer32, Unsigned32, Counter64, mib-2 | |||
| FROM SNMPv2-SMI | FROM SNMPv2-SMI | |||
| CounterBasedGauge64 | CounterBasedGauge64 | |||
| FROM HCNUM-TC | FROM HCNUM-TC | |||
| MODULE-COMPLIANCE, OBJECT-GROUP | MODULE-COMPLIANCE, OBJECT-GROUP | |||
| FROM SNMPv2-CONF | FROM SNMPv2-CONF | |||
| TEXTUAL-CONVENTION, | TEXTUAL-CONVENTION, | |||
| TruthValue | TruthValue | |||
| FROM SNMPv2-TC; | FROM SNMPv2-TC; | |||
| iptfsMIB MODULE-IDENTITY | iptfsMIB MODULE-IDENTITY | |||
| LAST-UPDATED "202210210000Z" | LAST-UPDATED "202301090000Z" | |||
| ORGANIZATION "IETF IPsecme Working Group" | ORGANIZATION "IETF IPsecme Working Group" | |||
| CONTACT-INFO | CONTACT-INFO | |||
| " | " | |||
| Author: Don Fedyk | Author: Don Fedyk | |||
| <mailto:dfedyk@labn.net> | <mailto:dfedyk@labn.net> | |||
| Author: Eric Kinzie | Author: Eric Kinzie | |||
| <mailto:ekinzie@labn.net>" | <mailto:ekinzie@labn.net>" | |||
| DESCRIPTION | DESCRIPTION | |||
| "This module defines the configuration and operational | "This module defines the configuration and operational | |||
| state for managing the IP Traffic Flow Security | state for managing the IP Traffic Flow Security | |||
| functionality [RFC XXXX]. Copyright (c) 2022 IETF | functionality (RFC 9349). | |||
| Trust and the persons identified as authors of the | ||||
| code. All rights reserved. | Copyright (c) 2023 IETF Trust and the persons identified | |||
| as authors of the code. All rights reserved. | ||||
| Redistribution and use in source and binary forms, | Redistribution and use in source and binary forms, | |||
| with or without modification, is permitted pursuant | with or without modification, is permitted pursuant | |||
| to, and subject to the license terms contained in, | to, and subject to the license terms contained in, | |||
| the Simplified BSD License set forth in Section 4.c | the Simplified BSD License set forth in Section 4.c | |||
| of the IETF Trust's Legal Provisions Relating to IETF | of the IETF Trust's Legal Provisions Relating to IETF | |||
| Documents (https://trustee.ietf.org/license-info). | Documents (https://trustee.ietf.org/license-info). | |||
| This version of this SNMP MIB module is part of RFC XXXX | This version of this SNMP MIB module is part of RFC 9349; | |||
| (https://tools.ietf.org/html/rfcXXXX); see the RFC | see the RFC itself for full legal notices." | |||
| itself for full legal notices." | ||||
| REVISION "202210210000Z" | REVISION "202301090000Z" | |||
| DESCRIPTION | DESCRIPTION | |||
| "Initial revision. Derived from the IP-TFS Yang Model." | "Initial revision. Derived from the IP-TFS YANG | |||
| ::= { mib-2 500} | Data Model." | |||
| ::= { mib-2 246} | ||||
| -- | -- | |||
| -- Textual Conventions | -- Textual Conventions | |||
| -- | -- | |||
| UnsignedShort ::= TEXTUAL-CONVENTION | UnsignedShort ::= TEXTUAL-CONVENTION | |||
| DISPLAY-HINT "d" | DISPLAY-HINT "d" | |||
| STATUS current | STATUS current | |||
| DESCRIPTION "xs:unsignedShort" | DESCRIPTION "xs:unsignedShort" | |||
| SYNTAX Unsigned32 (0 .. 65535) | SYNTAX Unsigned32 (0 .. 65535) | |||
| NanoSeconds ::= TEXTUAL-CONVENTION | NanoSeconds ::= TEXTUAL-CONVENTION | |||
| DISPLAY-HINT "d-6" | DISPLAY-HINT "d-6" | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "Represents time unit value in nanoseconds." | "Represents the time unit value in nanoseconds." | |||
| SYNTAX Integer32 | SYNTAX Integer32 | |||
| -- Objects, Notifications & Conformances | -- Objects, Notifications & Conformances | |||
| iptfsMIBObjects OBJECT IDENTIFIER | iptfsMIBObjects OBJECT IDENTIFIER | |||
| ::= { iptfsMIB 1 } | ::= { iptfsMIB 1 } | |||
| iptfsMIBConformance OBJECT IDENTIFIER | iptfsMIBConformance OBJECT IDENTIFIER | |||
| ::= { iptfsMIB 2} | ::= { iptfsMIB 2} | |||
| -- | -- | |||
| skipping to change at line 318 ¶ | skipping to change at line 321 ¶ | |||
| sendImmediately TruthValue, | sendImmediately TruthValue, | |||
| lostPacketTimerInterval NanoSeconds | lostPacketTimerInterval NanoSeconds | |||
| } | } | |||
| iptfsConfigSaIndex OBJECT-TYPE | iptfsConfigSaIndex OBJECT-TYPE | |||
| SYNTAX Integer32 (1..16777215) | SYNTAX Integer32 (1..16777215) | |||
| MAX-ACCESS not-accessible | MAX-ACCESS not-accessible | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "A unique value, greater than zero, for each SA. | "A unique value, greater than zero, for each SA. | |||
| It is recommended that values are assigned contiguously | It is recommended that values are assigned contiguously, | |||
| starting from 1. | starting from 1. | |||
| The value for each entry must remain constant at least | The value for each entry must remain constant at least | |||
| from one re-initialization of entity's network management | from one re-initialization of an entity's network management | |||
| system to the next re-initialization." | system to the next re-initialization." | |||
| ::= { iptfsConfigTableEntry 1 } | ::= { iptfsConfigTableEntry 1 } | |||
| congestionControl OBJECT-TYPE | congestionControl OBJECT-TYPE | |||
| SYNTAX TruthValue | SYNTAX TruthValue | |||
| MAX-ACCESS read-only | MAX-ACCESS read-only | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "When set to true, the default, this enables the | "When set to true, the default, this enables the | |||
| congestion control on-the-wire exchange of data that is | congestion control on-the-wire exchange of data that is | |||
| required by congestion control algorithms as defined by | required by congestion control algorithms, as defined by | |||
| RFC 5348. When set to false, IP-TFS sends fixed-sized | RFC 5348. When set to false, IP-TFS sends fixed-sized | |||
| packets over an IP-TFS tunnel at a constant rate." | packets over an IP-TFS tunnel at a constant rate." | |||
| ::= { iptfsConfigTableEntry 2 } | ::= { iptfsConfigTableEntry 2 } | |||
| usePathMtuDiscovery OBJECT-TYPE | usePathMtuDiscovery OBJECT-TYPE | |||
| SYNTAX TruthValue | SYNTAX TruthValue | |||
| MAX-ACCESS read-only | MAX-ACCESS read-only | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "Packet size is either auto-discovered or manually | "Packet size is either auto-discovered or manually | |||
| configured. If usePathMtuDiscovery is true the system | configured. If usePathMtuDiscovery is true, the system | |||
| utilizes path-mtu to determine maximum IP-TFS packet | utilizes path-mtu to determine the maximum IP-TFS packet | |||
| size. If the packet size is explicitly configured | size. If the packet size is explicitly configured, | |||
| then it will only be adjusted downward if use-path-mtu | then it will only be adjusted downward if use-path-mtu | |||
| is set." | is set." | |||
| ::= { iptfsConfigTableEntry 3 } | ::= { iptfsConfigTableEntry 3 } | |||
| outerPacketSize OBJECT-TYPE | outerPacketSize OBJECT-TYPE | |||
| SYNTAX UnsignedShort | SYNTAX UnsignedShort | |||
| MAX-ACCESS read-only | MAX-ACCESS read-only | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "On Transmission, the size of the outer encapsulating | "On transmission, the size of the outer encapsulating | |||
| tunnel packet (i.e., the IP packet containing the ESP | tunnel packet (i.e., the IP packet containing | |||
| payload)." | Encapsulating Security Payload)." | |||
| ::= { iptfsConfigTableEntry 4 } | ::= { iptfsConfigTableEntry 4 } | |||
| l2FixedRate OBJECT-TYPE | l2FixedRate OBJECT-TYPE | |||
| SYNTAX CounterBasedGauge64 | SYNTAX CounterBasedGauge64 | |||
| MAX-ACCESS read-only | MAX-ACCESS read-only | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "IP-TFS bit rate may be specified as a layer 2 wire rate. | "The IP-TFS bit rate may be specified as a layer 2 wire | |||
| On transmission, target bandwidth/bit rate in bps for | rate. On transmission, the target bandwidth/bit rate in | |||
| IP-TFS tunnel. This rate is the nominal timing for the | bits per second (bps) for the IP-TFS tunnel. This rate is | |||
| fixed size packet. If congestion control is enabled the | the nominal timing for the fixed-size packet. If | |||
| rate may be adjusted down." | congestion control is enabled, the rate may be adjusted | |||
| down." | ||||
| ::= { iptfsConfigTableEntry 5 } | ::= { iptfsConfigTableEntry 5 } | |||
| l3FixedRate OBJECT-TYPE | l3FixedRate OBJECT-TYPE | |||
| SYNTAX CounterBasedGauge64 | SYNTAX CounterBasedGauge64 | |||
| MAX-ACCESS read-only | MAX-ACCESS read-only | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "IP-TFS bit rate may be specified as a layer 3 packet rate. | "The IP-TFS bit rate may be specified as a layer 3 packet | |||
| On Transmission, target bandwidth/bit rate in bps for | rate. On transmission, the target bandwidth/bit rate in | |||
| IP-TFS tunnel. This rate is the nominal timing for the | bps for the IP-TFS tunnel. This rate is the nominal timing | |||
| fixed size packet. If congestion control is enabled the | for the fixed-size packet. If congestion control is | |||
| rate may be adjusted down." | enabled, the rate may be adjusted down." | |||
| ::= { iptfsConfigTableEntry 6 } | ::= { iptfsConfigTableEntry 6 } | |||
| dontFragment OBJECT-TYPE | dontFragment OBJECT-TYPE | |||
| SYNTAX TruthValue | SYNTAX TruthValue | |||
| MAX-ACCESS read-only | MAX-ACCESS read-only | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "On transmission, disable packet fragmentation across | "On transmission, disable packet fragmentation across | |||
| consecutive IP-TFS tunnel packets; inner packets larger | consecutive IP-TFS tunnel packets; inner packets larger | |||
| than what can be transmitted in outer packets will be | than what can be transmitted in outer packets will be | |||
| dropped." | dropped." | |||
| ::= { iptfsConfigTableEntry 7 } | ::= { iptfsConfigTableEntry 7 } | |||
| maxAggregationTime OBJECT-TYPE | maxAggregationTime OBJECT-TYPE | |||
| SYNTAX NanoSeconds | SYNTAX NanoSeconds | |||
| MAX-ACCESS read-only | MAX-ACCESS read-only | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "On transmission, maximum aggregation time is the | "On transmission, the maximum aggregation time is the | |||
| maximum length of time a received inner packet can be | maximum length of time a received inner packet can be | |||
| held prior to transmission in the IP-TFS tunnel. Inner | held prior to transmission in the IP-TFS tunnel. Inner | |||
| packets that would be held longer than this time, based | packets that would be held longer than this time, based | |||
| on the current tunnel configuration will be dropped | on the current tunnel configuration, will be dropped | |||
| rather than be queued for transmission." | rather than be queued for transmission." | |||
| ::= { iptfsConfigTableEntry 8 } | ::= { iptfsConfigTableEntry 8 } | |||
| windowSize OBJECT-TYPE | windowSize OBJECT-TYPE | |||
| SYNTAX UnsignedShort | SYNTAX UnsignedShort | |||
| MAX-ACCESS read-only | MAX-ACCESS read-only | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "On reception, the maximum number of out-of-order | "On reception, the maximum number of out-of-order | |||
| packets that will be reordered by an IP-TFS receiver | packets that will be reordered by an IP-TFS receiver | |||
| while performing the reordering operation. The value 0 | while performing the reordering operation. The value 0 | |||
| disables any reordering." | disables any reordering." | |||
| ::= { iptfsConfigTableEntry 9 } | ::= { iptfsConfigTableEntry 9 } | |||
| sendImmediately OBJECT-TYPE | sendImmediately OBJECT-TYPE | |||
| SYNTAX TruthValue | SYNTAX TruthValue | |||
| MAX-ACCESS read-only | MAX-ACCESS read-only | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "On reception, send inner packets as soon as possible, do | "On reception, send inner packets as soon as possible; do | |||
| not wait for lost or misordered outer packets. | not wait for lost or misordered outer packets. | |||
| Selecting this option reduces the inner (user) packet | Selecting this option reduces the inner (user) packet | |||
| delay but can amplify out-of-order delivery of the inner | delay but can amplify out-of-order delivery of the inner | |||
| packet stream in the presence of packet aggregation and | packet stream in the presence of packet aggregation and | |||
| any reordering." | any reordering." | |||
| ::= { iptfsConfigTableEntry 10 } | ::= { iptfsConfigTableEntry 10 } | |||
| lostPacketTimerInterval OBJECT-TYPE | lostPacketTimerInterval OBJECT-TYPE | |||
| SYNTAX NanoSeconds | SYNTAX NanoSeconds | |||
| MAX-ACCESS read-only | MAX-ACCESS read-only | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "On reception, this interval defines the length of time | "On reception, this interval defines the length of time | |||
| an IP-TFS receiver will wait for a missing packet before | an IP-TFS receiver will wait for a missing packet before | |||
| considering it lost. If not using send-immediately, | considering it lost. If not using send-immediately, | |||
| then each lost packet will delay inner (user) packets | then each lost packet will delay inner (user) packets | |||
| until this timer expires. Setting this value too low can | until this timer expires. Setting this value too low can | |||
| impact reordering and reassembly." | impact reordering and reassembly." | |||
| ::= { iptfsConfigTableEntry 11 } | ::= { iptfsConfigTableEntry 11 } | |||
| ipsecStatsTable OBJECT-TYPE | ipsecStatsTable OBJECT-TYPE | |||
| SYNTAX SEQUENCE OF IpsecStatsTableEntry | SYNTAX SEQUENCE OF IpsecStatsTableEntry | |||
| MAX-ACCESS not-accessible | MAX-ACCESS not-accessible | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "The table containing basic statistics on IPsec." | "The table containing basic statistics on IPsec." | |||
| ::= { ipsecStatsGroup 1 } | ::= { ipsecStatsGroup 1 } | |||
| skipping to change at line 481 ¶ | skipping to change at line 485 ¶ | |||
| rxOctets Counter64, | rxOctets Counter64, | |||
| rxDropPkts Counter64 | rxDropPkts Counter64 | |||
| } | } | |||
| ipsecSaIndex OBJECT-TYPE | ipsecSaIndex OBJECT-TYPE | |||
| SYNTAX Integer32 (1..16777215) | SYNTAX Integer32 (1..16777215) | |||
| MAX-ACCESS not-accessible | MAX-ACCESS not-accessible | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "A unique value, greater than zero, for each SA. | "A unique value, greater than zero, for each SA. | |||
| It is recommended that values are assigned contiguously | It is recommended that values are assigned contiguously, | |||
| starting from 1. | starting from 1. | |||
| The value for each entry must remain constant at least | The value for each entry must remain constant at least | |||
| from one re-initialization of entity's network management | from one re-initialization of an entity's network management | |||
| system to the next re-initialization." | system to the next re-initialization." | |||
| ::= { ipsecStatsTableEntry 1 } | ::= { ipsecStatsTableEntry 1 } | |||
| txPkts OBJECT-TYPE | txPkts OBJECT-TYPE | |||
| SYNTAX Counter64 | SYNTAX Counter64 | |||
| MAX-ACCESS read-only | MAX-ACCESS read-only | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "Outbound Packet count." | "Outbound Packet count." | |||
| ::= { ipsecStatsTableEntry 2 } | ::= { ipsecStatsTableEntry 2 } | |||
| skipping to change at line 534 ¶ | skipping to change at line 538 ¶ | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "Inbound Packet bytes." | "Inbound Packet bytes." | |||
| ::= { ipsecStatsTableEntry 6 } | ::= { ipsecStatsTableEntry 6 } | |||
| rxDropPkts OBJECT-TYPE | rxDropPkts OBJECT-TYPE | |||
| SYNTAX Counter64 | SYNTAX Counter64 | |||
| MAX-ACCESS read-only | MAX-ACCESS read-only | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "Inbound Dropped packets" | "Inbound dropped packets." | |||
| ::= { ipsecStatsTableEntry 7 } | ::= { ipsecStatsTableEntry 7 } | |||
| iptfsInnerStatsTable OBJECT-TYPE | iptfsInnerStatsTable OBJECT-TYPE | |||
| SYNTAX SEQUENCE OF IptfsInnerSaEntry | SYNTAX SEQUENCE OF IptfsInnerStatsSaEntry | |||
| MAX-ACCESS not-accessible | MAX-ACCESS not-accessible | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "The table containing information on IP-TFS | "The table containing information on IP-TFS | |||
| Inner Packets." | inner packets." | |||
| ::= { iptfsInnerStatsGroup 1 } | ::= { iptfsInnerStatsGroup 1 } | |||
| iptfsInnerStatsTableEntry OBJECT-TYPE | iptfsInnerStatsTableEntry OBJECT-TYPE | |||
| SYNTAX IptfsInnerSaEntry | SYNTAX IptfsInnerStatsSaEntry | |||
| MAX-ACCESS not-accessible | MAX-ACCESS not-accessible | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "An entry containing the information on | "An entry containing the information on | |||
| a particular IP-TFS SA." | a particular IP-TFS SA." | |||
| INDEX { iptfsInnerSaIndex } | INDEX { iptfsInnerSaIndex } | |||
| ::= { iptfsInnerStatsTable 1 } | ::= { iptfsInnerStatsTable 1 } | |||
| IptfsInnerSaEntry ::= SEQUENCE { | IptfsInnerStatsSaEntry ::= SEQUENCE { | |||
| iptfsInnerSaIndex Integer32, | iptfsInnerSaIndex Integer32, | |||
| txInnerPkts Counter64, | txInnerPkts Counter64, | |||
| txInnerOctets Counter64, | txInnerOctets Counter64, | |||
| rxInnerPkts Counter64, | rxInnerPkts Counter64, | |||
| rxInnerOctets Counter64, | rxInnerOctets Counter64, | |||
| rxIncompleteInnerPkts Counter64 | rxIncompleteInnerPkts Counter64 | |||
| } | } | |||
| iptfsInnerSaIndex OBJECT-TYPE | iptfsInnerSaIndex OBJECT-TYPE | |||
| SYNTAX Integer32 (1..16777215) | SYNTAX Integer32 (1..16777215) | |||
| MAX-ACCESS not-accessible | MAX-ACCESS not-accessible | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "A unique value, greater than zero, for each SA. | "A unique value, greater than zero, for each SA. | |||
| It is recommended that values are assigned contiguously | It is recommended that values are assigned contiguously, | |||
| starting from 1. | starting from 1. | |||
| The value for each entry must remain constant at least | The value for each entry must remain constant at least | |||
| from one re-initialization of entity's network management | from one re-initialization of an entity's network management | |||
| system to the next re-initialization." | system to the next re-initialization." | |||
| ::= { iptfsInnerStatsTableEntry 1 } | ::= { iptfsInnerStatsTableEntry 1 } | |||
| txInnerPkts OBJECT-TYPE | txInnerPkts OBJECT-TYPE | |||
| SYNTAX Counter64 | SYNTAX Counter64 | |||
| MAX-ACCESS read-only | MAX-ACCESS read-only | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "Total number of IP-TFS inner packets sent. This count | "Total number of IP-TFS inner packets sent. This count | |||
| is whole packets only. A fragmented packet counts as | is whole packets only. A fragmented packet counts as | |||
| one packet." | one packet." | |||
| ::= { iptfsInnerStatsTableEntry 2 } | ::= { iptfsInnerStatsTableEntry 2 } | |||
| txInnerOctets OBJECT-TYPE | txInnerOctets OBJECT-TYPE | |||
| SYNTAX Counter64 | SYNTAX Counter64 | |||
| MAX-ACCESS read-only | MAX-ACCESS read-only | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "Total number of IP-TFS inner octets sent. This is | "Total number of IP-TFS inner octets sent. This is | |||
| inner packet octets only. Does not count padding." | inner packet octets only. This does not count padding." | |||
| ::= { iptfsInnerStatsTableEntry 3 } | ::= { iptfsInnerStatsTableEntry 3 } | |||
| rxInnerPkts OBJECT-TYPE | rxInnerPkts OBJECT-TYPE | |||
| SYNTAX Counter64 | SYNTAX Counter64 | |||
| MAX-ACCESS read-only | MAX-ACCESS read-only | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "Total number of IP-TFS inner packets received." | "Total number of IP-TFS inner packets received." | |||
| ::= { iptfsInnerStatsTableEntry 4 } | ::= { iptfsInnerStatsTableEntry 4 } | |||
| rxInnerOctets OBJECT-TYPE | rxInnerOctets OBJECT-TYPE | |||
| SYNTAX Counter64 | SYNTAX Counter64 | |||
| MAX-ACCESS read-only | MAX-ACCESS read-only | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "Total number of IP-TFS inner octets received. Does | "Total number of IP-TFS inner octets received. This does | |||
| not include padding or overhead." | not include padding or overhead." | |||
| ::= { iptfsInnerStatsTableEntry 5 } | ::= { iptfsInnerStatsTableEntry 5 } | |||
| rxIncompleteInnerPkts OBJECT-TYPE | rxIncompleteInnerPkts OBJECT-TYPE | |||
| SYNTAX Counter64 | SYNTAX Counter64 | |||
| MAX-ACCESS read-only | MAX-ACCESS read-only | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "Total number of IP-TFS inner packets that were | "Total number of IP-TFS inner packets that were | |||
| incomplete. Usually this is due to fragments not | incomplete. Usually, this is due to fragments not | |||
| received. Also, this may be due to misordering or | received. Also, this may be due to misordering or | |||
| errors in received outer packets." | errors in received outer packets." | |||
| ::= { iptfsInnerStatsTableEntry 6 } | ::= { iptfsInnerStatsTableEntry 6 } | |||
| iptfsOuterStatsTable OBJECT-TYPE | iptfsOuterStatsTable OBJECT-TYPE | |||
| SYNTAX SEQUENCE OF IptfsOuterSaEntry | SYNTAX SEQUENCE OF IptfsOuterStatsSaEntry | |||
| MAX-ACCESS not-accessible | MAX-ACCESS not-accessible | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "The table containing information on IP-TFS." | "The table containing information on IP-TFS." | |||
| ::= { iptfsOuterStatsGroup 1 } | ::= { iptfsOuterStatsGroup 1 } | |||
| iptfsOuterStatsTableEntry OBJECT-TYPE | iptfsOuterStatsTableEntry OBJECT-TYPE | |||
| SYNTAX IptfsOuterSaEntry | SYNTAX IptfsOuterStatsSaEntry | |||
| MAX-ACCESS not-accessible | MAX-ACCESS not-accessible | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "An entry containing the information on | "An entry containing the information on | |||
| a particular IP-TFS SA." | a particular IP-TFS SA." | |||
| INDEX { iptfsSaIndex } | INDEX { iptfsOuterSaIndex } | |||
| ::= { iptfsOuterStatsTable 1 } | ::= { iptfsOuterStatsTable 1 } | |||
| IptfsOuterSaEntry ::= SEQUENCE { | IptfsOuterStatsSaEntry ::= SEQUENCE { | |||
| iptfsSaIndex Integer32, | iptfsOuterSaIndex Integer32, | |||
| -- iptfs packet statistics information | -- iptfs packet statistics information | |||
| txExtraPadPkts Counter64, | txExtraPadPkts Counter64, | |||
| txExtraPadOctets Counter64, | txExtraPadOctets Counter64, | |||
| txAllPadPkts Counter64, | txAllPadPkts Counter64, | |||
| txAllPadOctets Counter64, | txAllPadOctets Counter64, | |||
| rxExtraPadPkts Counter64, | rxExtraPadPkts Counter64, | |||
| rxExtraPadOctets Counter64, | rxExtraPadOctets Counter64, | |||
| rxAllPadPkts Counter64, | rxAllPadPkts Counter64, | |||
| rxAllPadOctets Counter64, | rxAllPadOctets Counter64, | |||
| rxErroredPkts Counter64, | rxErroredPkts Counter64, | |||
| rxMissedPkts Counter64 | rxMissedPkts Counter64 | |||
| } | } | |||
| iptfsSaIndex OBJECT-TYPE | iptfsOuterSaIndex OBJECT-TYPE | |||
| SYNTAX Integer32 (1..16777215) | SYNTAX Integer32 (1..16777215) | |||
| MAX-ACCESS not-accessible | MAX-ACCESS not-accessible | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "A unique value, greater than zero, for each SA. | "A unique value, greater than zero, for each SA. | |||
| It is recommended that values are assigned contiguously | It is recommended that values are assigned contiguously, | |||
| starting from 1. | starting from 1. | |||
| The value for each entry must remain constant at least | The value for each entry must remain constant at least | |||
| from one re-initialization of entity's network management | from one re-initialization of an entity's network management | |||
| system to the next re-initialization." | system to the next re-initialization." | |||
| ::= { iptfsOuterStatsTableEntry 1 } | ::= { iptfsOuterStatsTableEntry 1 } | |||
| txExtraPadPkts OBJECT-TYPE | txExtraPadPkts OBJECT-TYPE | |||
| SYNTAX Counter64 | SYNTAX Counter64 | |||
| MAX-ACCESS read-only | MAX-ACCESS read-only | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "Total number of transmitted outer IP-TFS packets that | "Total number of transmitted outer IP-TFS packets that | |||
| included some padding." | included some padding." | |||
| skipping to change at line 762 ¶ | skipping to change at line 766 ¶ | |||
| "Total number of IP-TFS outer packets dropped due to | "Total number of IP-TFS outer packets dropped due to | |||
| errors." | errors." | |||
| ::= { iptfsOuterStatsTableEntry 10 } | ::= { iptfsOuterStatsTableEntry 10 } | |||
| rxMissedPkts OBJECT-TYPE | rxMissedPkts OBJECT-TYPE | |||
| SYNTAX Counter64 | SYNTAX Counter64 | |||
| MAX-ACCESS read-only | MAX-ACCESS read-only | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "Total number of IP-TFS outer packets missing indicated | "Total number of IP-TFS outer packets missing indicated | |||
| by missing sequence number." | by a missing sequence number." | |||
| ::= { iptfsOuterStatsTableEntry 11 } | ::= { iptfsOuterStatsTableEntry 11 } | |||
| -- | -- | |||
| -- Iptfs Module Compliance | -- Iptfs Module Compliance | |||
| -- | -- | |||
| iptfsMIBConformances OBJECT IDENTIFIER | iptfsMIBConformances OBJECT IDENTIFIER | |||
| ::= { iptfsMIBConformance 1 } | ::= { iptfsMIBConformance 1 } | |||
| iptfsMIBGroups OBJECT IDENTIFIER | iptfsMIBGroups OBJECT IDENTIFIER | |||
| ::= { iptfsMIBConformance 2 } | ::= { iptfsMIBConformance 2 } | |||
| iptfsMIBCompliance MODULE-COMPLIANCE | iptfsMIBCompliance MODULE-COMPLIANCE | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "The compliance statement for entities which | "The compliance statement for entities that | |||
| implement the IP-TFS MIB" | implement the IP-TFS MIB." | |||
| MODULE -- this module | MODULE -- this module | |||
| MANDATORY-GROUPS { | MANDATORY-GROUPS { | |||
| iptfsMIBConfGroup, | iptfsMIBConfGroup, | |||
| ipsecStatsConfGroup, | ipsecStatsConfGroup, | |||
| iptfsInnerStatsConfGroup, | iptfsInnerStatsConfGroup, | |||
| iptfsOuterStatsConfGroup | iptfsOuterStatsConfGroup | |||
| } | } | |||
| ::= { iptfsMIBConformances 1 } | ::= { iptfsMIBConformances 1 } | |||
| skipping to change at line 810 ¶ | skipping to change at line 814 ¶ | |||
| l3FixedRate , | l3FixedRate , | |||
| dontFragment, | dontFragment, | |||
| maxAggregationTime, | maxAggregationTime, | |||
| windowSize, | windowSize, | |||
| sendImmediately, | sendImmediately, | |||
| lostPacketTimerInterval | lostPacketTimerInterval | |||
| } | } | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "A collection of objects providing per SA IP-TFS | "A collection of objects providing per SA IP-TFS | |||
| Configuration." | configuration." | |||
| ::= { iptfsMIBGroups 1 } | ::= { iptfsMIBGroups 1 } | |||
| ipsecStatsConfGroup OBJECT-GROUP | ipsecStatsConfGroup OBJECT-GROUP | |||
| OBJECTS { | OBJECTS { | |||
| txPkts, | txPkts, | |||
| txOctets, | txOctets, | |||
| txDropPkts, | txDropPkts, | |||
| rxPkts, | rxPkts, | |||
| rxOctets, | rxOctets, | |||
| rxDropPkts | rxDropPkts | |||
| } | } | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "A collection of objects providing per SA Basic | "A collection of objects providing per SA basic | |||
| Stats." | statistics." | |||
| ::= { iptfsMIBGroups 2 } | ::= { iptfsMIBGroups 2 } | |||
| iptfsInnerStatsConfGroup OBJECT-GROUP | iptfsInnerStatsConfGroup OBJECT-GROUP | |||
| OBJECTS { | OBJECTS { | |||
| txInnerPkts, | txInnerPkts, | |||
| txInnerOctets, | txInnerOctets, | |||
| rxInnerPkts, | rxInnerPkts, | |||
| rxInnerOctets, | rxInnerOctets, | |||
| rxIncompleteInnerPkts | rxIncompleteInnerPkts | |||
| } | } | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "A collection of objects providing per SA IP-TFS | "A collection of objects providing per SA IP-TFS | |||
| Inner Packet Statistics." | inner packet statistics." | |||
| ::= { iptfsMIBGroups 3 } | ::= { iptfsMIBGroups 3 } | |||
| iptfsOuterStatsConfGroup OBJECT-GROUP | iptfsOuterStatsConfGroup OBJECT-GROUP | |||
| OBJECTS { | OBJECTS { | |||
| txExtraPadPkts, | txExtraPadPkts, | |||
| txExtraPadOctets, | txExtraPadOctets, | |||
| txAllPadPkts, | txAllPadPkts, | |||
| txAllPadOctets, | txAllPadOctets, | |||
| rxExtraPadPkts, | rxExtraPadPkts, | |||
| rxExtraPadOctets, | rxExtraPadOctets, | |||
| rxAllPadPkts, | rxAllPadPkts, | |||
| rxAllPadOctets, | rxAllPadOctets, | |||
| rxErroredPkts, | rxErroredPkts, | |||
| rxMissedPkts | rxMissedPkts | |||
| } | } | |||
| STATUS current | STATUS current | |||
| DESCRIPTION | DESCRIPTION | |||
| "A collection of objects providing per SA IP-TFS | "A collection of objects providing per SA IP-TFS | |||
| Outer Packet Statistics." | outer packet statistics." | |||
| ::= { iptfsMIBGroups 4 } | ::= { iptfsMIBGroups 4 } | |||
| END | END | |||
| ]]></sourcecode> | ]]></sourcecode> | |||
| </section> | </section> | |||
| </section> | </section> | |||
| <section numbered="true" toc="default"> | <section numbered="true" toc="default"> | |||
| <name>IANA Considerations</name> | <name>IANA Considerations</name> | |||
| <t> The MIB module in this document uses the following IANA-assigned | <t> The MIB module in this document uses the following IANA-assigned | |||
| OBJECT IDENTIFIER value, recorded in the SMI Network Management | OBJECT IDENTIFIER value, recorded in the "SMI Network Management | |||
| MGMT Codes Internet-standard MIB - registry: | MGMT Codes Internet-standard MIB" registry: | |||
| </t> | </t> | |||
| <artwork name="" type="" align="left" alt=""><![CDATA[ | <table align="left"> | |||
| Name Description OBJECT IDENTIFIER value | <thead> | |||
| iptfsMIB IP-TRAFFIC-FLOW-SECURITY-MIB { mib-2 TBA-IANA } | <tr> | |||
| ]]></artwork> | <th>Decimal</th> | |||
| <th>Name</th> | ||||
| <th>Description</th> | ||||
| </tr> | ||||
| </thead> | ||||
| <tbody> | ||||
| <tr> | ||||
| <td>246</td> | ||||
| <td>iptfsMIB</td> | ||||
| <td>IP-TRAFFIC-FLOW-SECURITY-MIB</td> | ||||
| </tr> | ||||
| </tbody> | ||||
| </table> | ||||
| </section> | </section> | |||
| <section numbered="true" toc="default"> | <section numbered="true" toc="default"> | |||
| <name>Security Considerations</name> | <name>Security Considerations</name> | |||
| <t>The MIB specified in this document can read | <t>The MIB specified in this document can read | |||
| the operational behavior of IP traffic flow security. For the implications | the operational behavior of IP Traffic Flow Security. For the implications | |||
| regarding write configuration consult the <xref target="I-D.ietf-ipsecme-iptfs" | regarding write configuration, consult <xref target="RFC9347" format="default"/> | |||
| format="default"/> | , | |||
| which defines the functionality.</t> | which defines the functionality.</t> | |||
| <!-- DNE starts --> | ||||
| <t> | <t> | |||
| There are no management objects defined in this MIB module that have a | There are no management objects defined in this MIB module that have a | |||
| MAX-ACCESS clause of read-write and/or read-create. So, if this MIB module is | MAX-ACCESS clause of read-write and/or read-create. So, if this MIB module is | |||
| implemented correctly, then there is no risk that an intruder can alter or | implemented correctly, then there is no risk that an intruder can alter or | |||
| create any management objects of this MIB module via direct SNMP SET | create any management objects of this MIB module via direct SNMP SET | |||
| operations. | operations. | |||
| </t> | </t> | |||
| <t> | <t> | |||
| Some of the objects in this MIB module may be considered sensitive or | Some of the objects in this MIB module may be considered sensitive or | |||
| vulnerable in some network environments. This includes INDEX objects with a | vulnerable in some network environments. This includes INDEX objects with a | |||
| MAX-ACCESS of not-accessible, and any indices from other modules exposed via | MAX-ACCESS of not-accessible, and any indices from other modules exposed via | |||
| AUGMENTS. It is thus important to control even GET and/or NOTIFY access to | AUGMENTS. It is thus important to control even GET and/or NOTIFY access to | |||
| these objects and possibly to even encrypt the values of these objects when | these objects and possibly to even encrypt the values of these objects when | |||
| sending them over the network via SNMP. These are the tables and objects and | sending them over the network via SNMP. These are the tables and objects and | |||
| their sensitivity/vulnerability: | their sensitivity/vulnerability: | |||
| </t> | </t> | |||
| <!-- DNE ends --> | ||||
| <ul spacing="normal"> | <ul spacing="normal"> | |||
| <li> | <li> | |||
| iptfsInnerStatsTable and iptfsOuterStatsTable- Access to IP inner and outer | iptfsInnerStatsTable and iptfsOuterStatsTable: Access to IP inner and outer | |||
| traffic flow security statistics can provide information that IP | Traffic Flow Security statistics can provide information that IP | |||
| traffic flow security obscures such as the true activity of the | Traffic Flow Security obscures, such as the true activity of the | |||
| flows using IP traffic flow security. | flows using IP Traffic Flow Security. | |||
| </li> | </li> | |||
| </ul> | </ul> | |||
| <!-- DNE starts --> | ||||
| <t> | <t> | |||
| SNMP versions prior to SNMPv3 did not include adequate security. Even if the | SNMP versions prior to SNMPv3 did not include adequate security. Even if the | |||
| network itself is secure (for example by using IPsec), there is no control as | network itself is secure (for example by using IPsec), there is no control as | |||
| to who on the secure network is allowed to access and GET | to who on the secure network is allowed to access and GET | |||
| (read) the objects in this MIB module. | (read) the objects in this MIB module. | |||
| </t> | </t> | |||
| <t> | <t> | |||
| To prevent unauthorized access to SNMP including access to IP-TFS sensit | Implementations <bcp14>SHOULD</bcp14> provide the security features described | |||
| ive objects: | by the SNMPv3 framework (see <xref target="RFC3410" format="default"/>), and | |||
| implementations claiming compliance to the SNMPv3 standard <bcp14>MUST</bcp14> | ||||
| include full support for authentication and privacy via the User-based | ||||
| Security Model (USM) <xref target="RFC3414" format="default"/> with the AES | ||||
| cipher algorithm <xref target="RFC3826" format="default"/>. Implementations | ||||
| <bcp14>MAY</bcp14> also provide support for the Transport Security Model (TSM) | ||||
| <xref target="RFC5591" format="default"/> in combination with a secure | ||||
| transport such as SSH <xref target="RFC5592" format="default"/> or TLS/DTLS | ||||
| <xref target="RFC6353" format="default"/>. | ||||
| </t> | </t> | |||
| <ul spacing="normal"> | <t> | |||
| <li> | Further, deployment of SNMP versions prior to SNMPv3 is <bcp14>NOT RECOMMENDED</ | |||
| Implementations SHOULD provide the security features described by the SNMPv3 | bcp14>. | |||
| framework (see <xref target="RFC3410" format="default"/>), and implementations c | Instead, it is <bcp14>RECOMMENDED</bcp14> to deploy SNMPv3 and to enable cryptog | |||
| laiming compliance to the | raphic | |||
| SNMPv3 standard MUST include full support for authentication and privacy via | ||||
| the User-based Security Model (USM) <xref target="RFC3414" format="default"/> wi | ||||
| th the AES cipher algorithm | ||||
| <xref target="RFC3826" format="default"/>. Implementations MAY also provide supp | ||||
| ort for the Transport Security | ||||
| Model (TSM) <xref target="RFC5591" format="default"/> in combination with a secu | ||||
| re transport such as SSH | ||||
| <xref target="RFC5592" format="default"/> or TLS/DTLS <xref target="RFC6353" for | ||||
| mat="default"/>. | ||||
| </li> | ||||
| <li> | ||||
| Further, deployment of SNMP versions prior to SNMPv3 is NOT RECOMMENDED. | ||||
| Instead, it is RECOMMENDED to deploy SNMPv3 and to enable cryptographic | ||||
| security. It is then a customer/operator responsibility to ensure that the | security. It is then a customer/operator responsibility to ensure that the | |||
| SNMP entity giving access to an instance of this MIB module is properly | SNMP entity giving access to an instance of this MIB module is properly | |||
| configured to give access to the objects only to those principals (users) that | configured to give access to the objects only to those principals (users) that | |||
| have legitimate rights to indeed GET or SET (change/create/delete) them. | have legitimate rights to indeed GET or SET (change/create/delete) them. | |||
| </li> | </t> | |||
| </ul> | <!-- DNE ends --> | |||
| </section> | ||||
| <section numbered="true" toc="default"> | ||||
| <name>Acknowledgements</name> | ||||
| <t>The authors would like to thank Chris Hopps, Lou Berger and Tero Kivine | ||||
| n | ||||
| for their help and feedback on the MIB model. </t> | ||||
| </section> | </section> | |||
| </middle> | </middle> | |||
| <back> | <back> | |||
| <references> | <references> | |||
| <name>References</name> | <name>References</name> | |||
| <references> | <references> | |||
| <name>Normative References</name> | <name>Normative References</name> | |||
| <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2 | ||||
| 119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119. | |||
| <front> | xml"/> | |||
| <title>Key words for use in RFCs to Indicate Requirement Levels</tit | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3414. | |||
| le> | xml"/> | |||
| <author fullname="S. Bradner" initials="S." surname="Bradner"/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3826. | |||
| <date month="March" year="1997"/> | xml"/> | |||
| <abstract> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5591. | |||
| <t>In many standards track documents several words are used to sig | xml"/> | |||
| nify the requirements in the specification. These words are often capitalized. | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5592. | |||
| This document defines these words as they should be interpreted in IETF documen | xml"/> | |||
| ts. This document specifies an Internet Best Current Practices for the Internet | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6353. | |||
| Community, and requests discussion and suggestions for improvements.</t> | xml"/> | |||
| </abstract> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8174. | |||
| </front> | xml"/> | |||
| <seriesInfo name="BCP" value="14"/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2578. | |||
| <seriesInfo name="RFC" value="2119"/> | xml"/> | |||
| <seriesInfo name="DOI" value="10.17487/RFC2119"/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2579. | |||
| </reference> | xml"/> | |||
| <reference anchor="RFC3414" target="https://www.rfc-editor.org/info/rfc3 | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2580. | |||
| 414" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3414.xml"> | xml"/> | |||
| <front> | ||||
| <title>User-based Security Model (USM) for version 3 of the Simple N | <!-- [I-D.ietf-ipsecme-iptfs]; companion document RFC 9347 --> | |||
| etwork Management Protocol (SNMPv3)</title> | <reference anchor='RFC9347' target='https://www.rfc-editor.org/info/rfc9347'> | |||
| <author fullname="U. Blumenthal" initials="U." surname="Blumenthal"/ | <front> | |||
| > | <title>Aggregation and Fragmentation Mode for Encapsulating Security Payload (ES | |||
| <author fullname="B. Wijnen" initials="B." surname="Wijnen"/> | P) and Its Use for IP Traffic Flow Security (IP-TFS)</title> | |||
| <date month="December" year="2002"/> | <author initials='C' surname='Hopps' fullname='Christian Hopps'/> | |||
| <abstract> | <date year='2023' month='January'/> | |||
| <t>This document describes the User-based Security Model (USM) for | </front> | |||
| Simple Network Management Protocol (SNMP) version 3 for use in the SNMP archite | <seriesInfo name="RFC" value="9347"/> | |||
| cture. It defines the Elements of Procedure for providing SNMP message level se | <seriesInfo name="DOI" value="10.17487/RFC9347"/> | |||
| curity. This document also includes a Management Information Base (MIB) for rem | </reference> | |||
| otely monitoring/managing the configuration parameters for this Security Model. | ||||
| This document obsoletes RFC 2574. [STANDARDS-TRACK]</t> | </references> | |||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="STD" value="62"/> | ||||
| <seriesInfo name="RFC" value="3414"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC3414"/> | ||||
| </reference> | ||||
| <reference anchor="RFC3826" target="https://www.rfc-editor.org/info/rfc3 | ||||
| 826" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3826.xml"> | ||||
| <front> | ||||
| <title>The Advanced Encryption Standard (AES) Cipher Algorithm in th | ||||
| e SNMP User-based Security Model</title> | ||||
| <author fullname="U. Blumenthal" initials="U." surname="Blumenthal"/ | ||||
| > | ||||
| <author fullname="F. Maino" initials="F." surname="Maino"/> | ||||
| <author fullname="K. McCloghrie" initials="K." surname="McCloghrie"/ | ||||
| > | ||||
| <date month="June" year="2004"/> | ||||
| <abstract> | ||||
| <t>This document describes a symmetric encryption protocol that su | ||||
| pplements the protocols described in the User-based Security Model (USM), which | ||||
| is a Security Subsystem for version 3 of the Simple Network Management Protocol | ||||
| for use in the SNMP Architecture. The symmetric encryption protocol described i | ||||
| n this document is based on the Advanced Encryption Standard (AES) cipher algori | ||||
| thm used in Cipher FeedBack Mode (CFB), with a key size of 128 bits. [STANDARDS- | ||||
| TRACK]</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="3826"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC3826"/> | ||||
| </reference> | ||||
| <reference anchor="RFC5591" target="https://www.rfc-editor.org/info/rfc5 | ||||
| 591" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5591.xml"> | ||||
| <front> | ||||
| <title>Transport Security Model for the Simple Network Management Pr | ||||
| otocol (SNMP)</title> | ||||
| <author fullname="D. Harrington" initials="D." surname="Harrington"/ | ||||
| > | ||||
| <author fullname="W. Hardaker" initials="W." surname="Hardaker"/> | ||||
| <date month="June" year="2009"/> | ||||
| <abstract> | ||||
| <t>This memo describes a Transport Security Model for the Simple N | ||||
| etwork Management Protocol (SNMP).</t> | ||||
| <t>This memo also defines a portion of the Management Information | ||||
| Base (MIB) for monitoring and managing the Transport Security Model for SNMP. [S | ||||
| TANDARDS-TRACK]</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="STD" value="78"/> | ||||
| <seriesInfo name="RFC" value="5591"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC5591"/> | ||||
| </reference> | ||||
| <reference anchor="RFC5592" target="https://www.rfc-editor.org/info/rfc5 | ||||
| 592" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5592.xml"> | ||||
| <front> | ||||
| <title>Secure Shell Transport Model for the Simple Network Managemen | ||||
| t Protocol (SNMP)</title> | ||||
| <author fullname="D. Harrington" initials="D." surname="Harrington"/ | ||||
| > | ||||
| <author fullname="J. Salowey" initials="J." surname="Salowey"/> | ||||
| <author fullname="W. Hardaker" initials="W." surname="Hardaker"/> | ||||
| <date month="June" year="2009"/> | ||||
| <abstract> | ||||
| <t>This memo describes a Transport Model for the Simple Network Ma | ||||
| nagement Protocol (SNMP), using the Secure Shell (SSH) protocol.</t> | ||||
| <t>This memo also defines a portion of the Management Information | ||||
| Base (MIB) for use with network management protocols in TCP/IP-based internets. | ||||
| In particular, it defines objects for monitoring and managing the Secure Shell T | ||||
| ransport Model for SNMP. [STANDARDS-TRACK]</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="5592"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC5592"/> | ||||
| </reference> | ||||
| <reference anchor="RFC6353" target="https://www.rfc-editor.org/info/rfc6 | ||||
| 353" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6353.xml"> | ||||
| <front> | ||||
| <title>Transport Layer Security (TLS) Transport Model for the Simple | ||||
| Network Management Protocol (SNMP)</title> | ||||
| <author fullname="W. Hardaker" initials="W." surname="Hardaker"/> | ||||
| <date month="July" year="2011"/> | ||||
| <abstract> | ||||
| <t>This document describes a Transport Model for the Simple Networ | ||||
| k Management Protocol (SNMP), that uses either the Transport Layer Security prot | ||||
| ocol or the Datagram Transport Layer Security (DTLS) protocol. The TLS and DTLS | ||||
| protocols provide authentication and privacy services for SNMP applications. Thi | ||||
| s document describes how the TLS Transport Model (TLSTM) implements the needed f | ||||
| eatures of an SNMP Transport Subsystem to make this protection possible in an in | ||||
| teroperable way.</t> | ||||
| <t>This Transport Model is designed to meet the security and opera | ||||
| tional needs of network administrators. It supports the sending of SNMP messages | ||||
| over TLS/TCP and DTLS/UDP. The TLS mode can make use of TCP's improved support | ||||
| for larger packet sizes and the DTLS mode provides potentially superior operatio | ||||
| n in environments where a connectionless (e.g., UDP) transport is preferred. Bot | ||||
| h TLS and DTLS integrate well into existing public keying infrastructures.</t> | ||||
| <t>This document also defines a portion of the Management Informat | ||||
| ion Base (MIB) for use with network management protocols. In particular, it defi | ||||
| nes objects for managing the TLS Transport Model for SNMP. [STANDARDS-TRACK]</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="STD" value="78"/> | ||||
| <seriesInfo name="RFC" value="6353"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC6353"/> | ||||
| </reference> | ||||
| <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8 | ||||
| 174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"> | ||||
| <front> | ||||
| <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</ti | ||||
| tle> | ||||
| <author fullname="B. Leiba" initials="B." surname="Leiba"/> | ||||
| <date month="May" year="2017"/> | ||||
| <abstract> | ||||
| <t>RFC 2119 specifies common key words that may be used in protoco | ||||
| l specifications. This document aims to reduce the ambiguity by clarifying that | ||||
| only UPPERCASE usage of the key words have the defined special meanings.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="BCP" value="14"/> | ||||
| <seriesInfo name="RFC" value="8174"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC8174"/> | ||||
| </reference> | ||||
| <reference anchor="RFC2578" target="https://www.rfc-editor.org/info/rfc2 | ||||
| 578" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2578.xml"> | ||||
| <front> | ||||
| <title>Structure of Management Information Version 2 (SMIv2)</title> | ||||
| <author fullname="K. McCloghrie" initials="K." role="editor" surname | ||||
| ="McCloghrie"/> | ||||
| <author fullname="D. Perkins" initials="D." role="editor" surname="P | ||||
| erkins"/> | ||||
| <author fullname="J. Schoenwaelder" initials="J." role="editor" surn | ||||
| ame="Schoenwaelder"/> | ||||
| <date month="April" year="1999"/> | ||||
| <abstract> | ||||
| <t>It is the purpose of this document, the Structure of Management | ||||
| Information Version 2 (SMIv2), to define that adapted subset, and to assign a s | ||||
| et of associated administrative values. [STANDARDS-TRACK]</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="STD" value="58"/> | ||||
| <seriesInfo name="RFC" value="2578"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC2578"/> | ||||
| </reference> | ||||
| <reference anchor="RFC2579" target="https://www.rfc-editor.org/info/rfc2 | ||||
| 579" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2579.xml"> | ||||
| <front> | ||||
| <title>Textual Conventions for SMIv2</title> | ||||
| <author fullname="K. McCloghrie" initials="K." role="editor" surname | ||||
| ="McCloghrie"/> | ||||
| <author fullname="D. Perkins" initials="D." role="editor" surname="P | ||||
| erkins"/> | ||||
| <author fullname="J. Schoenwaelder" initials="J." role="editor" surn | ||||
| ame="Schoenwaelder"/> | ||||
| <date month="April" year="1999"/> | ||||
| <abstract> | ||||
| <t>It is the purpose of this document to define the initial set of | ||||
| textual conventions available to all MIB modules. [STANDARDS-TRACK]</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="STD" value="58"/> | ||||
| <seriesInfo name="RFC" value="2579"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC2579"/> | ||||
| </reference> | ||||
| <reference anchor="I-D.ietf-ipsecme-iptfs" target="https://www.ietf.org/ | ||||
| archive/id/draft-ietf-ipsecme-iptfs-19.txt" xml:base="https://bib.ietf.org/publi | ||||
| c/rfc/bibxml-ids/reference.I-D.ietf-ipsecme-iptfs.xml"> | ||||
| <front> | ||||
| <title>IP-TFS: Aggregation and Fragmentation Mode for ESP and its Us | ||||
| e for IP Traffic Flow Security</title> | ||||
| <author fullname="Christian Hopps"> | ||||
| <organization>LabN Consulting, L.L.C.</organization> | ||||
| </author> | ||||
| <date day="4" month="September" year="2022"/> | ||||
| <abstract> | ||||
| <t>This document describes a mechanism for aggregation and fragmen | ||||
| tation of IP packets when they are being encapsulated in ESP payloads. This new | ||||
| payload type can be used for various purposes such as decreasing encapsulation o | ||||
| verhead for small IP packets; however, the focus in this document is to enhance | ||||
| IPsec traffic flow security (IP-TFS) by adding Traffic Flow Confidentiality (TFC | ||||
| ) to encrypted IP encapsulated traffic. TFC is provided by obscuring the size an | ||||
| d frequency of IP traffic using a fixed-sized, constant-send-rate IPsec tunnel. | ||||
| The solution allows for congestion control as well as non- constant send-rate us | ||||
| age.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-iptfs-19"/ | ||||
| > | ||||
| </reference> | ||||
| </references> | ||||
| <references> | <references> | |||
| <name>Informative References</name> | <name>Informative References</name> | |||
| <reference anchor="I-D.ietf-ipsecme-yang-iptfs" target="https://www.ietf | ||||
| .org/archive/id/draft-ietf-ipsecme-yang-iptfs-11.txt" xml:base="https://bib.ietf | <!-- [I-D.ietf-ipsecme-yang-iptfs]; companion document RFC 9348 --> | |||
| .org/public/rfc/bibxml-ids/reference.I-D.ietf-ipsecme-yang-iptfs.xml"> | <reference anchor='RFC9348' target='https://www.rfc-editor.org/info/rfc9348'> | |||
| <front> | <front> | |||
| <title>A YANG Data Model for IP Traffic Flow Security</title> | <title>A YANG Data Model for IP Traffic Flow Security</title> | |||
| <author fullname="Don Fedyk"> | <author initials="D." surname="Fedyk" fullname="Don Fedyk"/> | |||
| <organization>LabN Consulting, L.L.C.</organization> | <author initials="C." surname="Hopps" fullname="Christian Hopps"/> | |||
| </author> | <date month="January" year="2023"/> | |||
| <author fullname="Christian Hopps"> | </front> | |||
| <organization>LabN Consulting, L.L.C.</organization> | <seriesInfo name="RFC" value="9348"/> | |||
| </author> | <seriesInfo name="DOI" value="10.17487/RFC9348"/> | |||
| <date day="31" month="August" year="2022"/> | </reference> | |||
| <abstract> | ||||
| <t>This document describes a YANG module for the management of IP | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3410. | |||
| Traffic Flow Security additions to IKEv2 and IPsec.</t> | xml"/> | |||
| </abstract> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4301. | |||
| </front> | xml"/> | |||
| <seriesInfo name="Internet-Draft" value="draft-ietf-ipsecme-yang-iptfs | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5348. | |||
| -11"/> | xml"/> | |||
| </reference> | ||||
| <reference anchor="RFC2580" target="https://www.rfc-editor.org/info/rfc2 | ||||
| 580" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2580.xml"> | ||||
| <front> | ||||
| <title>Conformance Statements for SMIv2</title> | ||||
| <author fullname="K. McCloghrie" initials="K." role="editor" surname | ||||
| ="McCloghrie"/> | ||||
| <author fullname="D. Perkins" initials="D." role="editor" surname="P | ||||
| erkins"/> | ||||
| <author fullname="J. Schoenwaelder" initials="J." role="editor" surn | ||||
| ame="Schoenwaelder"/> | ||||
| <date month="April" year="1999"/> | ||||
| <abstract> | ||||
| <t>Collections of related objects are defined in MIB modules. It | ||||
| may be useful to define the acceptable lower-bounds of implementation, along wit | ||||
| h the actual level of implementation achieved. It is the purpose of this docume | ||||
| nt to define the notation used for these purposes. [STANDARDS-TRACK]</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="STD" value="58"/> | ||||
| <seriesInfo name="RFC" value="2580"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC2580"/> | ||||
| </reference> | ||||
| <reference anchor="RFC3410" target="https://www.rfc-editor.org/info/rfc3 | ||||
| 410" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3410.xml"> | ||||
| <front> | ||||
| <title>Introduction and Applicability Statements for Internet-Standa | ||||
| rd Management Framework</title> | ||||
| <author fullname="J. Case" initials="J." surname="Case"/> | ||||
| <author fullname="R. Mundy" initials="R." surname="Mundy"/> | ||||
| <author fullname="D. Partain" initials="D." surname="Partain"/> | ||||
| <author fullname="B. Stewart" initials="B." surname="Stewart"/> | ||||
| <date month="December" year="2002"/> | ||||
| <abstract> | ||||
| <t>The purpose of this document is to provide an overview of the t | ||||
| hird version of the Internet-Standard Management Framework, termed the SNMP vers | ||||
| ion 3 Framework (SNMPv3). This Framework is derived from and builds upon both t | ||||
| he original Internet-Standard Management Framework (SNMPv1) and the second Inter | ||||
| net-Standard Management Framework (SNMPv2). The architecture is designed to be | ||||
| modular to allow the evolution of the Framework over time. The document explain | ||||
| s why using SNMPv3 instead of SNMPv1 or SNMPv2 is strongly recommended. The doc | ||||
| ument also recommends that RFCs 1157, 1441, 1901, 1909 and 1910 be retired by mo | ||||
| ving them to Historic status. This document obsoletes RFC 2570. This memo prov | ||||
| ides information for the Internet community.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="3410"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC3410"/> | ||||
| </reference> | ||||
| <reference anchor="RFC4301" target="https://www.rfc-editor.org/info/rfc4 | ||||
| 301" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4301.xml"> | ||||
| <front> | ||||
| <title>Security Architecture for the Internet Protocol</title> | ||||
| <author fullname="S. Kent" initials="S." surname="Kent"/> | ||||
| <author fullname="K. Seo" initials="K." surname="Seo"/> | ||||
| <date month="December" year="2005"/> | ||||
| <abstract> | ||||
| <t>This document describes an updated version of the "Security Arc | ||||
| hitecture for IP", which is designed to provide security services for traffic at | ||||
| the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRA | ||||
| CK]</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="4301"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC4301"/> | ||||
| </reference> | ||||
| <reference anchor="RFC5348" target="https://www.rfc-editor.org/info/rfc5 | ||||
| 348" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5348.xml"> | ||||
| <front> | ||||
| <title>TCP Friendly Rate Control (TFRC): Protocol Specification</tit | ||||
| le> | ||||
| <author fullname="S. Floyd" initials="S." surname="Floyd"/> | ||||
| <author fullname="M. Handley" initials="M." surname="Handley"/> | ||||
| <author fullname="J. Padhye" initials="J." surname="Padhye"/> | ||||
| <author fullname="J. Widmer" initials="J." surname="Widmer"/> | ||||
| <date month="September" year="2008"/> | ||||
| <abstract> | ||||
| <t>This document specifies TCP Friendly Rate Control (TFRC). TFRC | ||||
| is a congestion control mechanism for unicast flows operating in a best-effort I | ||||
| nternet environment. It is reasonably fair when competing for bandwidth with TCP | ||||
| flows, but has a much lower variation of throughput over time compared with TCP | ||||
| , making it more suitable for applications such as streaming media where a relat | ||||
| ively smooth sending rate is of importance.</t> | ||||
| <t>This document obsoletes RFC 3448 and updates RFC 4342. [STANDAR | ||||
| DS-TRACK]</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="5348"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC5348"/> | ||||
| </reference> | ||||
| </references> | </references> | |||
| </references> | </references> | |||
| <section numbered="false" toc="default"> | ||||
| <name>Acknowledgements</name> | ||||
| <t>The authors would like to thank <contact fullname="Chris Hopps"/>, <con | ||||
| tact fullname="Lou Berger"/>, and <contact fullname="Tero Kivinen"/> | ||||
| for their help and feedback on the MIB model. </t> | ||||
| </section> | ||||
| </back> | </back> | |||
| </rfc> | </rfc> | |||
| End of changes. 78 change blocks. | ||||
| 508 lines changed or deleted | 252 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. | ||||