rfc9349.original | rfc9349.txt | |||
---|---|---|---|---|
Network Working Group D. Fedyk | Internet Engineering Task Force (IETF) D. Fedyk | |||
Internet-Draft E. Kinzie | Request for Comments: 9349 E. Kinzie | |||
Intended status: Standards Track LabN Consulting, L.L.C. | Category: Standards Track LabN Consulting, L.L.C. | |||
Expires: 24 April 2023 21 October 2022 | ISSN: 2070-1721 January 2023 | |||
Definitions of Managed Objects for IP Traffic Flow Security | Definitions of Managed Objects for IP Traffic Flow Security | |||
draft-ietf-ipsecme-mib-iptfs-11 | ||||
Abstract | Abstract | |||
This document describes managed objects for the management of IP | This document describes managed objects for the management of IP | |||
Traffic Flow Security additions to IKEv2 and IPsec. This document | Traffic Flow Security additions to Internet Key Exchange Protocol | |||
provides a read only version of the objects defined in the YANG | Version 2 (IKEv2) and IPsec. This document provides a read-only | |||
module for the same purpose. | version of the objects defined in the YANG module for the same | |||
purpose, which is in "A YANG Data Model for IP Traffic Flow Security" | ||||
(RFC 9348). | ||||
Status of This Memo | Status of This Memo | |||
This Internet-Draft is submitted in full conformance with the | This is an Internet Standards Track document. | |||
provisions of BCP 78 and BCP 79. | ||||
Internet-Drafts are working documents of the Internet Engineering | ||||
Task Force (IETF). Note that other groups may also distribute | ||||
working documents as Internet-Drafts. The list of current Internet- | ||||
Drafts is at https://datatracker.ietf.org/drafts/current/. | ||||
Internet-Drafts are draft documents valid for a maximum of six months | This document is a product of the Internet Engineering Task Force | |||
and may be updated, replaced, or obsoleted by other documents at any | (IETF). It represents the consensus of the IETF community. It has | |||
time. It is inappropriate to use Internet-Drafts as reference | received public review and has been approved for publication by the | |||
material or to cite them other than as "work in progress." | Internet Engineering Steering Group (IESG). Further information on | |||
Internet Standards is available in Section 2 of RFC 7841. | ||||
This Internet-Draft will expire on 24 April 2023. | Information about the current status of this document, any errata, | |||
and how to provide feedback on it may be obtained at | ||||
https://www.rfc-editor.org/info/rfc9349. | ||||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2022 IETF Trust and the persons identified as the | Copyright (c) 2023 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents | |||
license-info) in effect on the date of publication of this document. | (https://trustee.ietf.org/license-info) in effect on the date of | |||
Please review these documents carefully, as they describe your rights | publication of this document. Please review these documents | |||
and restrictions with respect to this document. Code Components | carefully, as they describe your rights and restrictions with respect | |||
extracted from this document must include Revised BSD License text as | to this document. Code Components extracted from this document must | |||
described in Section 4.e of the Trust Legal Provisions and are | include Revised BSD License text as described in Section 4.e of the | |||
provided without warranty as described in the Revised BSD License. | Trust Legal Provisions and are provided without warranty as described | |||
in the Revised BSD License. | ||||
Table of Contents | Table of Contents | |||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction | |||
2. Terminology & Concepts . . . . . . . . . . . . . . . . . . . 3 | 1.1. The Internet-Standard Management Framework | |||
3. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2. Terminology and Concepts | |||
4. Management Objects . . . . . . . . . . . . . . . . . . . . . 3 | 3. Overview | |||
4.1. MIB Tree . . . . . . . . . . . . . . . . . . . . . . . . 3 | 4. Management Objects | |||
4.2. SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . 5 | 4.1. MIB Tree | |||
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 19 | 4.2. SNMP | |||
6. Security Considerations . . . . . . . . . . . . . . . . . . . 19 | 5. IANA Considerations | |||
7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 20 | 6. Security Considerations | |||
8. References . . . . . . . . . . . . . . . . . . . . . . . . . 20 | 7. References | |||
8.1. Normative References . . . . . . . . . . . . . . . . . . 20 | 7.1. Normative References | |||
8.2. Informative References . . . . . . . . . . . . . . . . . 22 | 7.2. Informative References | |||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 22 | Acknowledgements | |||
Authors' Addresses | ||||
1. Introduction | 1. Introduction | |||
This document defines a Management Information Base (MIB) module for | This document defines a Management Information Base (MIB) module for | |||
use with network management protocols in the Internet community. | use with network management protocols in the Internet community. IP | |||
Traffic Flow Security (IP-TFS) extensions as defined in | Traffic Flow Security (IP-TFS) extensions, as defined in [RFC9347], | |||
[I-D.ietf-ipsecme-iptfs] are enhancements to an IPsec tunnel Security | are enhancements to an IPsec tunnel Security Association (SA) to | |||
Association to provide improved traffic confidentiality. | provide improved traffic confidentiality. | |||
The objects defined here are the same as [RFC9348], with the | ||||
exception that only operational or state data is supported. By | ||||
making operational data accessible via SNMP, existing network | ||||
management systems can monitor IP-TFS. This data is listed in the | ||||
MIB tree in Section 4.1. This module uses the YANG data model as a | ||||
reference point for managed objects. Note that an IETF MIB model for | ||||
IPsec was never standardized; however, the structures here could be | ||||
adapted to existing proprietary MIB implementations where SNMP is | ||||
used to manage networks. | ||||
1.1. The Internet-Standard Management Framework | ||||
For a detailed overview of the documents that describe the current | For a detailed overview of the documents that describe the current | |||
Internet-Standard Management Framework, please refer to section 7 of | Internet-Standard Management Framework, please refer to Section 7 of | |||
[RFC3410]. | [RFC3410]. | |||
Managed objects are accessed via a virtual information store, termed | Managed objects are accessed via a virtual information store, termed | |||
the Management Information Base or MIB. MIB objects are generally | the Management Information Base or MIB. MIB objects are generally | |||
accessed through the Simple Network Management Protocol (SNMP). | accessed through the Simple Network Management Protocol (SNMP). | |||
Objects in the MIB are defined using the mechanisms defined in the | Objects in the MIB are defined using the mechanisms defined in the | |||
Structure of Management Information (SMI). This memo specifies a MIB | Structure of Management Information (SMI). This memo specifies a MIB | |||
module that is compliant to the SMIv2, which is described in STD 58, | module that is compliant to the SMIv2, which is described in STD 58, | |||
[RFC2578], STD 58, [RFC2579] and STD 58, [RFC2580]. | [RFC2578], STD 58, [RFC2579] and STD 58, [RFC2580]. | |||
The objects defined here are the same as | 2. Terminology and Concepts | |||
[I-D.ietf-ipsecme-yang-iptfs] with the exception that only | ||||
operational or state data is supported. By making operational data | ||||
accessible via SNMP existing network management systems can monitor | ||||
IP-TFS. This data is listed in the MIB tree in Section 4.1. This | ||||
module uses the YANG model as a reference point for managed objects. | ||||
Note an IETF MIB model for IPsec was never standardized however the | ||||
structures here could be adapted to existing proprietary MIB | ||||
implementations where SNMP is used to manage networks. | ||||
2. Terminology & Concepts | ||||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
"OPTIONAL" in this document are to be interpreted as described in | "OPTIONAL" in this document are to be interpreted as described in | |||
[RFC2119] [RFC8174] when, and only when, they appear in all capitals, | BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all | |||
as shown here. | capitals, as shown here. | |||
3. Overview | 3. Overview | |||
This document defines the MIB for access to operational parameters of | This document defines the MIB for access to operational parameters of | |||
IP traffic flow security (IP-TFS). IP-TFS, defined in | IP Traffic Flow Security (IP-TFS). IP-TFS, defined in [RFC9347], | |||
[I-D.ietf-ipsecme-iptfs], configures a security association for | configures a Security Association for tunnel mode IPsec with | |||
tunnel mode IPsec with characteristics that improve traffic | characteristics that improve traffic confidentiality and reduce | |||
confidentiality and reduce bandwidth efficiency loss. | bandwidth efficiency loss. | |||
This document is based on the concepts and management model defined | This document is based on the concepts and management model defined | |||
in [I-D.ietf-ipsecme-yang-iptfs]. This document assumes familiarity | in [RFC9348]. This document assumes familiarity with the IPsec | |||
with IP security concepts described in [RFC4301], IP-TFS as described | concepts described in [RFC4301], IP-TFS as described in [RFC9347], | |||
in [I-D.ietf-ipsecme-iptfs] and the IP-TFS management model described | and the IP-TFS management model described in [RFC9348]. | |||
in [I-D.ietf-ipsecme-yang-iptfs]. | ||||
This document specifies an extensible operational model for IP-TFS. | This document specifies an extensible operational model for IP-TFS. | |||
It reuses the management model defined in | It reuses the management model defined in [RFC9348]. It allows SNMP | |||
[I-D.ietf-ipsecme-yang-iptfs]. It allows SNMP systems to read | systems to read operational objects (which include configured | |||
operational objects (which includes configured objects) from IP-TFS. | objects) from IP-TFS. | |||
4. Management Objects | 4. Management Objects | |||
4.1. MIB Tree | 4.1. MIB Tree | |||
The following is the MIB registration tree diagram for the IP-TFS | The following is the MIB registration tree diagram for the IP-TFS | |||
extensions. | extensions. | |||
# IP-TRAFFIC-FLOW-SECURITY-MIB registration tree | # IP-TRAFFIC-FLOW-SECURITY-MIB registration tree | |||
skipping to change at page 4, line 30 ¶ | skipping to change at line 169 ¶ | |||
| | +--iptfsInnerStatsTable(1) | | | +--iptfsInnerStatsTable(1) | |||
| | +--iptfsInnerStatsTableEntry(1) [iptfsInnerSaIndex] | | | +--iptfsInnerStatsTableEntry(1) [iptfsInnerSaIndex] | |||
| | +-- --- Integer32 iptfsInnerSaIndex(1) | | | +-- --- Integer32 iptfsInnerSaIndex(1) | |||
| | +-- r-n Counter64 txInnerPkts(2) | | | +-- r-n Counter64 txInnerPkts(2) | |||
| | +-- r-n Counter64 txInnerOctets(3) | | | +-- r-n Counter64 txInnerOctets(3) | |||
| | +-- r-n Counter64 rxInnerPkts(4) | | | +-- r-n Counter64 rxInnerPkts(4) | |||
| | +-- r-n Counter64 rxInnerOctets(5) | | | +-- r-n Counter64 rxInnerOctets(5) | |||
| | +-- r-n Counter64 rxIncompleteInnerPkts(6) | | | +-- r-n Counter64 rxIncompleteInnerPkts(6) | |||
| +--iptfsOuterStatsGroup(4) | | +--iptfsOuterStatsGroup(4) | |||
| +--iptfsOuterStatsTable(1) | | +--iptfsOuterStatsTable(1) | |||
| +--iptfsOuterStatsTableEntry(1) [iptfsSaIndex] | | +--iptfsOuterStatsTableEntry(1) [iptfsOuterSaIndex] | |||
| +-- --- Integer32 iptfsSaIndex(1) | | +-- --- Integer32 iptfsOuterSaIndex(1) | |||
| +-- r-n Counter64 txExtraPadPkts(2) | | +-- r-n Counter64 txExtraPadPkts(2) | |||
| +-- r-n Counter64 txExtraPadOctets(3) | | +-- r-n Counter64 txExtraPadOctets(3) | |||
| +-- r-n Counter64 txAllPadPkts(4) | | +-- r-n Counter64 txAllPadPkts(4) | |||
| +-- r-n Counter64 txAllPadOctets(5) | | +-- r-n Counter64 txAllPadOctets(5) | |||
| +-- r-n Counter64 rxExtraPadPkts(6) | | +-- r-n Counter64 rxExtraPadPkts(6) | |||
| +-- r-n Counter64 rxExtraPadOctets(7) | | +-- r-n Counter64 rxExtraPadOctets(7) | |||
| +-- r-n Counter64 rxAllPadPkts(8) | | +-- r-n Counter64 rxAllPadPkts(8) | |||
| +-- r-n Counter64 rxAllPadOctets(9) | | +-- r-n Counter64 rxAllPadOctets(9) | |||
| +-- r-n Counter64 rxErroredPkts(10) | | +-- r-n Counter64 rxErroredPkts(10) | |||
| +-- r-n Counter64 rxMissedPkts(11) | | +-- r-n Counter64 rxMissedPkts(11) | |||
skipping to change at page 5, line 7 ¶ | skipping to change at line 192 ¶ | |||
+--iptfsMIBConformances(1) | +--iptfsMIBConformances(1) | |||
| +--iptfsMIBCompliance(1) | | +--iptfsMIBCompliance(1) | |||
+--iptfsMIBGroups(2) | +--iptfsMIBGroups(2) | |||
+--iptfsMIBConfGroup(1) | +--iptfsMIBConfGroup(1) | |||
+--ipsecStatsConfGroup(2) | +--ipsecStatsConfGroup(2) | |||
+--iptfsInnerStatsConfGroup(3) | +--iptfsInnerStatsConfGroup(3) | |||
+--iptfsOuterStatsConfGroup(4) | +--iptfsOuterStatsConfGroup(4) | |||
4.2. SNMP | 4.2. SNMP | |||
The following is the MIB for IP-TFS. The Congestion control | The following is the MIB for IP-TFS. The congestion control | |||
algorithm in [RFC5348] is referenced in the MIB text. | algorithm in [RFC5348] is referenced in the MIB text. | |||
<CODE BEGINS> file "iptfs-mib.mib" | <CODE BEGINS> file "iptfs-mib.mib" | |||
=--> | ||||
-- *---------------------------------------------------------------- | -- *---------------------------------------------------------------- | |||
-- * IP-TRAFFIC-FLOW-SECURITY-MIB Module | -- * IP-TRAFFIC-FLOW-SECURITY-MIB Module | |||
-- *---------------------------------------------------------------- | -- *---------------------------------------------------------------- | |||
IP-TRAFFIC-FLOW-SECURITY-MIB DEFINITIONS ::= BEGIN | IP-TRAFFIC-FLOW-SECURITY-MIB DEFINITIONS ::= BEGIN | |||
IMPORTS | IMPORTS | |||
MODULE-IDENTITY, OBJECT-TYPE, | MODULE-IDENTITY, OBJECT-TYPE, | |||
Integer32, Unsigned32, Counter64, mib-2 | Integer32, Unsigned32, Counter64, mib-2 | |||
FROM SNMPv2-SMI | FROM SNMPv2-SMI | |||
CounterBasedGauge64 | CounterBasedGauge64 | |||
FROM HCNUM-TC | FROM HCNUM-TC | |||
MODULE-COMPLIANCE, OBJECT-GROUP | MODULE-COMPLIANCE, OBJECT-GROUP | |||
FROM SNMPv2-CONF | FROM SNMPv2-CONF | |||
TEXTUAL-CONVENTION, | TEXTUAL-CONVENTION, | |||
TruthValue | TruthValue | |||
FROM SNMPv2-TC; | FROM SNMPv2-TC; | |||
iptfsMIB MODULE-IDENTITY | iptfsMIB MODULE-IDENTITY | |||
LAST-UPDATED "202210210000Z" | LAST-UPDATED "202301090000Z" | |||
ORGANIZATION "IETF IPsecme Working Group" | ORGANIZATION "IETF IPsecme Working Group" | |||
CONTACT-INFO | CONTACT-INFO | |||
" | " | |||
Author: Don Fedyk | Author: Don Fedyk | |||
<mailto:dfedyk@labn.net> | <mailto:dfedyk@labn.net> | |||
Author: Eric Kinzie | Author: Eric Kinzie | |||
<mailto:ekinzie@labn.net>" | <mailto:ekinzie@labn.net>" | |||
-- RFC Ed.: replace XXXX with actual RFC number, update mib-2 | ||||
-- entry and remove this note. | ||||
DESCRIPTION | DESCRIPTION | |||
"This module defines the configuration and operational | "This module defines the configuration and operational | |||
state for managing the IP Traffic Flow Security | state for managing the IP Traffic Flow Security | |||
functionality [RFC XXXX]. Copyright (c) 2022 IETF | functionality (RFC 9349). | |||
Trust and the persons identified as authors of the | ||||
code. All rights reserved. | Copyright (c) 2023 IETF Trust and the persons identified | |||
as authors of the code. All rights reserved. | ||||
Redistribution and use in source and binary forms, | Redistribution and use in source and binary forms, | |||
with or without modification, is permitted pursuant | with or without modification, is permitted pursuant | |||
to, and subject to the license terms contained in, | to, and subject to the license terms contained in, | |||
the Simplified BSD License set forth in Section 4.c | the Simplified BSD License set forth in Section 4.c | |||
of the IETF Trust's Legal Provisions Relating to IETF | of the IETF Trust's Legal Provisions Relating to IETF | |||
Documents (https://trustee.ietf.org/license-info). | Documents (https://trustee.ietf.org/license-info). | |||
This version of this SNMP MIB module is part of RFC XXXX | This version of this SNMP MIB module is part of RFC 9349; | |||
(https://tools.ietf.org/html/rfcXXXX); see the RFC | see the RFC itself for full legal notices." | |||
itself for full legal notices." | ||||
REVISION "202210210000Z" | REVISION "202301090000Z" | |||
DESCRIPTION | DESCRIPTION | |||
"Initial revision. Derived from the IP-TFS Yang Model." | "Initial revision. Derived from the IP-TFS YANG | |||
::= { mib-2 500} | Data Model." | |||
::= { mib-2 246} | ||||
-- | -- | |||
-- Textual Conventions | -- Textual Conventions | |||
-- | -- | |||
UnsignedShort ::= TEXTUAL-CONVENTION | UnsignedShort ::= TEXTUAL-CONVENTION | |||
DISPLAY-HINT "d" | DISPLAY-HINT "d" | |||
STATUS current | STATUS current | |||
DESCRIPTION "xs:unsignedShort" | DESCRIPTION "xs:unsignedShort" | |||
SYNTAX Unsigned32 (0 .. 65535) | SYNTAX Unsigned32 (0 .. 65535) | |||
NanoSeconds ::= TEXTUAL-CONVENTION | NanoSeconds ::= TEXTUAL-CONVENTION | |||
DISPLAY-HINT "d-6" | DISPLAY-HINT "d-6" | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"Represents time unit value in nanoseconds." | "Represents the time unit value in nanoseconds." | |||
SYNTAX Integer32 | SYNTAX Integer32 | |||
-- Objects, Notifications & Conformances | -- Objects, Notifications & Conformances | |||
iptfsMIBObjects OBJECT IDENTIFIER | iptfsMIBObjects OBJECT IDENTIFIER | |||
::= { iptfsMIB 1 } | ::= { iptfsMIB 1 } | |||
iptfsMIBConformance OBJECT IDENTIFIER | iptfsMIBConformance OBJECT IDENTIFIER | |||
::= { iptfsMIB 2} | ::= { iptfsMIB 2} | |||
-- | -- | |||
skipping to change at page 7, line 52 ¶ | skipping to change at line 327 ¶ | |||
sendImmediately TruthValue, | sendImmediately TruthValue, | |||
lostPacketTimerInterval NanoSeconds | lostPacketTimerInterval NanoSeconds | |||
} | } | |||
iptfsConfigSaIndex OBJECT-TYPE | iptfsConfigSaIndex OBJECT-TYPE | |||
SYNTAX Integer32 (1..16777215) | SYNTAX Integer32 (1..16777215) | |||
MAX-ACCESS not-accessible | MAX-ACCESS not-accessible | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"A unique value, greater than zero, for each SA. | "A unique value, greater than zero, for each SA. | |||
It is recommended that values are assigned contiguously | It is recommended that values are assigned contiguously, | |||
starting from 1. | starting from 1. | |||
The value for each entry must remain constant at least | The value for each entry must remain constant at least | |||
from one re-initialization of entity's network management | from one re-initialization of an entity's network management | |||
system to the next re-initialization." | system to the next re-initialization." | |||
::= { iptfsConfigTableEntry 1 } | ::= { iptfsConfigTableEntry 1 } | |||
congestionControl OBJECT-TYPE | congestionControl OBJECT-TYPE | |||
SYNTAX TruthValue | SYNTAX TruthValue | |||
MAX-ACCESS read-only | MAX-ACCESS read-only | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"When set to true, the default, this enables the | "When set to true, the default, this enables the | |||
congestion control on-the-wire exchange of data that is | congestion control on-the-wire exchange of data that is | |||
required by congestion control algorithms as defined by | required by congestion control algorithms, as defined by | |||
RFC 5348. When set to false, IP-TFS sends fixed-sized | RFC 5348. When set to false, IP-TFS sends fixed-sized | |||
packets over an IP-TFS tunnel at a constant rate." | packets over an IP-TFS tunnel at a constant rate." | |||
::= { iptfsConfigTableEntry 2 } | ::= { iptfsConfigTableEntry 2 } | |||
usePathMtuDiscovery OBJECT-TYPE | usePathMtuDiscovery OBJECT-TYPE | |||
SYNTAX TruthValue | SYNTAX TruthValue | |||
MAX-ACCESS read-only | MAX-ACCESS read-only | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"Packet size is either auto-discovered or manually | "Packet size is either auto-discovered or manually | |||
configured. If usePathMtuDiscovery is true the system | configured. If usePathMtuDiscovery is true, the system | |||
utilizes path-mtu to determine maximum IP-TFS packet | utilizes path-mtu to determine the maximum IP-TFS packet | |||
size. If the packet size is explicitly configured | size. If the packet size is explicitly configured, | |||
then it will only be adjusted downward if use-path-mtu | then it will only be adjusted downward if use-path-mtu | |||
is set." | is set." | |||
::= { iptfsConfigTableEntry 3 } | ::= { iptfsConfigTableEntry 3 } | |||
outerPacketSize OBJECT-TYPE | outerPacketSize OBJECT-TYPE | |||
SYNTAX UnsignedShort | SYNTAX UnsignedShort | |||
MAX-ACCESS read-only | MAX-ACCESS read-only | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"On Transmission, the size of the outer encapsulating | "On transmission, the size of the outer encapsulating | |||
tunnel packet (i.e., the IP packet containing the ESP | tunnel packet (i.e., the IP packet containing | |||
payload)." | Encapsulating Security Payload)." | |||
::= { iptfsConfigTableEntry 4 } | ::= { iptfsConfigTableEntry 4 } | |||
l2FixedRate OBJECT-TYPE | l2FixedRate OBJECT-TYPE | |||
SYNTAX CounterBasedGauge64 | SYNTAX CounterBasedGauge64 | |||
MAX-ACCESS read-only | MAX-ACCESS read-only | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"IP-TFS bit rate may be specified as a layer 2 wire rate. | "The IP-TFS bit rate may be specified as a layer 2 wire | |||
rate. On transmission, the target bandwidth/bit rate in | ||||
On transmission, target bandwidth/bit rate in bps for | bits per second (bps) for the IP-TFS tunnel. This rate is | |||
IP-TFS tunnel. This rate is the nominal timing for the | the nominal timing for the fixed-size packet. If | |||
fixed size packet. If congestion control is enabled the | congestion control is enabled, the rate may be adjusted | |||
rate may be adjusted down." | down." | |||
::= { iptfsConfigTableEntry 5 } | ::= { iptfsConfigTableEntry 5 } | |||
l3FixedRate OBJECT-TYPE | l3FixedRate OBJECT-TYPE | |||
SYNTAX CounterBasedGauge64 | SYNTAX CounterBasedGauge64 | |||
MAX-ACCESS read-only | MAX-ACCESS read-only | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"IP-TFS bit rate may be specified as a layer 3 packet rate. | "The IP-TFS bit rate may be specified as a layer 3 packet | |||
On Transmission, target bandwidth/bit rate in bps for | rate. On transmission, the target bandwidth/bit rate in | |||
IP-TFS tunnel. This rate is the nominal timing for the | bps for the IP-TFS tunnel. This rate is the nominal timing | |||
fixed size packet. If congestion control is enabled the | for the fixed-size packet. If congestion control is | |||
rate may be adjusted down." | enabled, the rate may be adjusted down." | |||
::= { iptfsConfigTableEntry 6 } | ::= { iptfsConfigTableEntry 6 } | |||
dontFragment OBJECT-TYPE | dontFragment OBJECT-TYPE | |||
SYNTAX TruthValue | SYNTAX TruthValue | |||
MAX-ACCESS read-only | MAX-ACCESS read-only | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"On transmission, disable packet fragmentation across | "On transmission, disable packet fragmentation across | |||
consecutive IP-TFS tunnel packets; inner packets larger | consecutive IP-TFS tunnel packets; inner packets larger | |||
than what can be transmitted in outer packets will be | than what can be transmitted in outer packets will be | |||
dropped." | dropped." | |||
::= { iptfsConfigTableEntry 7 } | ::= { iptfsConfigTableEntry 7 } | |||
maxAggregationTime OBJECT-TYPE | maxAggregationTime OBJECT-TYPE | |||
SYNTAX NanoSeconds | SYNTAX NanoSeconds | |||
MAX-ACCESS read-only | MAX-ACCESS read-only | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"On transmission, maximum aggregation time is the | "On transmission, the maximum aggregation time is the | |||
maximum length of time a received inner packet can be | maximum length of time a received inner packet can be | |||
held prior to transmission in the IP-TFS tunnel. Inner | held prior to transmission in the IP-TFS tunnel. Inner | |||
packets that would be held longer than this time, based | packets that would be held longer than this time, based | |||
on the current tunnel configuration will be dropped | on the current tunnel configuration, will be dropped | |||
rather than be queued for transmission." | rather than be queued for transmission." | |||
::= { iptfsConfigTableEntry 8 } | ::= { iptfsConfigTableEntry 8 } | |||
windowSize OBJECT-TYPE | windowSize OBJECT-TYPE | |||
SYNTAX UnsignedShort | SYNTAX UnsignedShort | |||
MAX-ACCESS read-only | MAX-ACCESS read-only | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"On reception, the maximum number of out-of-order | "On reception, the maximum number of out-of-order | |||
packets that will be reordered by an IP-TFS receiver | packets that will be reordered by an IP-TFS receiver | |||
while performing the reordering operation. The value 0 | while performing the reordering operation. The value 0 | |||
disables any reordering." | disables any reordering." | |||
::= { iptfsConfigTableEntry 9 } | ::= { iptfsConfigTableEntry 9 } | |||
sendImmediately OBJECT-TYPE | sendImmediately OBJECT-TYPE | |||
SYNTAX TruthValue | SYNTAX TruthValue | |||
MAX-ACCESS read-only | MAX-ACCESS read-only | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"On reception, send inner packets as soon as possible, do | "On reception, send inner packets as soon as possible; do | |||
not wait for lost or misordered outer packets. | not wait for lost or misordered outer packets. | |||
Selecting this option reduces the inner (user) packet | Selecting this option reduces the inner (user) packet | |||
delay but can amplify out-of-order delivery of the inner | delay but can amplify out-of-order delivery of the inner | |||
packet stream in the presence of packet aggregation and | packet stream in the presence of packet aggregation and | |||
any reordering." | any reordering." | |||
::= { iptfsConfigTableEntry 10 } | ::= { iptfsConfigTableEntry 10 } | |||
lostPacketTimerInterval OBJECT-TYPE | lostPacketTimerInterval OBJECT-TYPE | |||
SYNTAX NanoSeconds | SYNTAX NanoSeconds | |||
MAX-ACCESS read-only | MAX-ACCESS read-only | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"On reception, this interval defines the length of time | "On reception, this interval defines the length of time | |||
an IP-TFS receiver will wait for a missing packet before | an IP-TFS receiver will wait for a missing packet before | |||
considering it lost. If not using send-immediately, | considering it lost. If not using send-immediately, | |||
then each lost packet will delay inner (user) packets | then each lost packet will delay inner (user) packets | |||
until this timer expires. Setting this value too low can | until this timer expires. Setting this value too low can | |||
impact reordering and reassembly." | impact reordering and reassembly." | |||
::= { iptfsConfigTableEntry 11 } | ::= { iptfsConfigTableEntry 11 } | |||
ipsecStatsTable OBJECT-TYPE | ipsecStatsTable OBJECT-TYPE | |||
SYNTAX SEQUENCE OF IpsecStatsTableEntry | SYNTAX SEQUENCE OF IpsecStatsTableEntry | |||
MAX-ACCESS not-accessible | MAX-ACCESS not-accessible | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"The table containing basic statistics on IPsec." | "The table containing basic statistics on IPsec." | |||
::= { ipsecStatsGroup 1 } | ::= { ipsecStatsGroup 1 } | |||
skipping to change at page 11, line 23 ¶ | skipping to change at line 491 ¶ | |||
rxOctets Counter64, | rxOctets Counter64, | |||
rxDropPkts Counter64 | rxDropPkts Counter64 | |||
} | } | |||
ipsecSaIndex OBJECT-TYPE | ipsecSaIndex OBJECT-TYPE | |||
SYNTAX Integer32 (1..16777215) | SYNTAX Integer32 (1..16777215) | |||
MAX-ACCESS not-accessible | MAX-ACCESS not-accessible | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"A unique value, greater than zero, for each SA. | "A unique value, greater than zero, for each SA. | |||
It is recommended that values are assigned contiguously | It is recommended that values are assigned contiguously, | |||
starting from 1. | starting from 1. | |||
The value for each entry must remain constant at least | The value for each entry must remain constant at least | |||
from one re-initialization of entity's network management | from one re-initialization of an entity's network management | |||
system to the next re-initialization." | system to the next re-initialization." | |||
::= { ipsecStatsTableEntry 1 } | ::= { ipsecStatsTableEntry 1 } | |||
txPkts OBJECT-TYPE | txPkts OBJECT-TYPE | |||
SYNTAX Counter64 | SYNTAX Counter64 | |||
MAX-ACCESS read-only | MAX-ACCESS read-only | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"Outbound Packet count." | "Outbound Packet count." | |||
::= { ipsecStatsTableEntry 2 } | ::= { ipsecStatsTableEntry 2 } | |||
skipping to change at page 12, line 29 ¶ | skipping to change at line 544 ¶ | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"Inbound Packet bytes." | "Inbound Packet bytes." | |||
::= { ipsecStatsTableEntry 6 } | ::= { ipsecStatsTableEntry 6 } | |||
rxDropPkts OBJECT-TYPE | rxDropPkts OBJECT-TYPE | |||
SYNTAX Counter64 | SYNTAX Counter64 | |||
MAX-ACCESS read-only | MAX-ACCESS read-only | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"Inbound Dropped packets" | "Inbound dropped packets." | |||
::= { ipsecStatsTableEntry 7 } | ::= { ipsecStatsTableEntry 7 } | |||
iptfsInnerStatsTable OBJECT-TYPE | iptfsInnerStatsTable OBJECT-TYPE | |||
SYNTAX SEQUENCE OF IptfsInnerSaEntry | SYNTAX SEQUENCE OF IptfsInnerStatsSaEntry | |||
MAX-ACCESS not-accessible | MAX-ACCESS not-accessible | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"The table containing information on IP-TFS | "The table containing information on IP-TFS | |||
Inner Packets." | inner packets." | |||
::= { iptfsInnerStatsGroup 1 } | ::= { iptfsInnerStatsGroup 1 } | |||
iptfsInnerStatsTableEntry OBJECT-TYPE | iptfsInnerStatsTableEntry OBJECT-TYPE | |||
SYNTAX IptfsInnerSaEntry | SYNTAX IptfsInnerStatsSaEntry | |||
MAX-ACCESS not-accessible | MAX-ACCESS not-accessible | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"An entry containing the information on | "An entry containing the information on | |||
a particular IP-TFS SA." | a particular IP-TFS SA." | |||
INDEX { iptfsInnerSaIndex } | INDEX { iptfsInnerSaIndex } | |||
::= { iptfsInnerStatsTable 1 } | ::= { iptfsInnerStatsTable 1 } | |||
IptfsInnerSaEntry ::= SEQUENCE { | IptfsInnerStatsSaEntry ::= SEQUENCE { | |||
iptfsInnerSaIndex Integer32, | iptfsInnerSaIndex Integer32, | |||
txInnerPkts Counter64, | txInnerPkts Counter64, | |||
txInnerOctets Counter64, | txInnerOctets Counter64, | |||
rxInnerPkts Counter64, | rxInnerPkts Counter64, | |||
rxInnerOctets Counter64, | rxInnerOctets Counter64, | |||
rxIncompleteInnerPkts Counter64 | rxIncompleteInnerPkts Counter64 | |||
} | } | |||
iptfsInnerSaIndex OBJECT-TYPE | iptfsInnerSaIndex OBJECT-TYPE | |||
SYNTAX Integer32 (1..16777215) | SYNTAX Integer32 (1..16777215) | |||
MAX-ACCESS not-accessible | MAX-ACCESS not-accessible | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"A unique value, greater than zero, for each SA. | "A unique value, greater than zero, for each SA. | |||
It is recommended that values are assigned contiguously | It is recommended that values are assigned contiguously, | |||
starting from 1. | starting from 1. | |||
The value for each entry must remain constant at least | The value for each entry must remain constant at least | |||
from one re-initialization of entity's network management | from one re-initialization of an entity's network management | |||
system to the next re-initialization." | system to the next re-initialization." | |||
::= { iptfsInnerStatsTableEntry 1 } | ::= { iptfsInnerStatsTableEntry 1 } | |||
txInnerPkts OBJECT-TYPE | txInnerPkts OBJECT-TYPE | |||
SYNTAX Counter64 | SYNTAX Counter64 | |||
MAX-ACCESS read-only | MAX-ACCESS read-only | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"Total number of IP-TFS inner packets sent. This count | "Total number of IP-TFS inner packets sent. This count | |||
is whole packets only. A fragmented packet counts as | is whole packets only. A fragmented packet counts as | |||
one packet." | one packet." | |||
::= { iptfsInnerStatsTableEntry 2 } | ::= { iptfsInnerStatsTableEntry 2 } | |||
txInnerOctets OBJECT-TYPE | txInnerOctets OBJECT-TYPE | |||
SYNTAX Counter64 | SYNTAX Counter64 | |||
MAX-ACCESS read-only | MAX-ACCESS read-only | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"Total number of IP-TFS inner octets sent. This is | "Total number of IP-TFS inner octets sent. This is | |||
inner packet octets only. Does not count padding." | inner packet octets only. This does not count padding." | |||
::= { iptfsInnerStatsTableEntry 3 } | ::= { iptfsInnerStatsTableEntry 3 } | |||
rxInnerPkts OBJECT-TYPE | rxInnerPkts OBJECT-TYPE | |||
SYNTAX Counter64 | SYNTAX Counter64 | |||
MAX-ACCESS read-only | MAX-ACCESS read-only | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"Total number of IP-TFS inner packets received." | "Total number of IP-TFS inner packets received." | |||
::= { iptfsInnerStatsTableEntry 4 } | ::= { iptfsInnerStatsTableEntry 4 } | |||
rxInnerOctets OBJECT-TYPE | rxInnerOctets OBJECT-TYPE | |||
SYNTAX Counter64 | SYNTAX Counter64 | |||
MAX-ACCESS read-only | MAX-ACCESS read-only | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"Total number of IP-TFS inner octets received. Does | "Total number of IP-TFS inner octets received. This does | |||
not include padding or overhead." | not include padding or overhead." | |||
::= { iptfsInnerStatsTableEntry 5 } | ::= { iptfsInnerStatsTableEntry 5 } | |||
rxIncompleteInnerPkts OBJECT-TYPE | rxIncompleteInnerPkts OBJECT-TYPE | |||
SYNTAX Counter64 | SYNTAX Counter64 | |||
MAX-ACCESS read-only | MAX-ACCESS read-only | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"Total number of IP-TFS inner packets that were | "Total number of IP-TFS inner packets that were | |||
incomplete. Usually this is due to fragments not | incomplete. Usually, this is due to fragments not | |||
received. Also, this may be due to misordering or | received. Also, this may be due to misordering or | |||
errors in received outer packets." | errors in received outer packets." | |||
::= { iptfsInnerStatsTableEntry 6 } | ::= { iptfsInnerStatsTableEntry 6 } | |||
iptfsOuterStatsTable OBJECT-TYPE | iptfsOuterStatsTable OBJECT-TYPE | |||
SYNTAX SEQUENCE OF IptfsOuterSaEntry | SYNTAX SEQUENCE OF IptfsOuterStatsSaEntry | |||
MAX-ACCESS not-accessible | MAX-ACCESS not-accessible | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"The table containing information on IP-TFS." | "The table containing information on IP-TFS." | |||
::= { iptfsOuterStatsGroup 1 } | ::= { iptfsOuterStatsGroup 1 } | |||
iptfsOuterStatsTableEntry OBJECT-TYPE | iptfsOuterStatsTableEntry OBJECT-TYPE | |||
SYNTAX IptfsOuterSaEntry | SYNTAX IptfsOuterStatsSaEntry | |||
MAX-ACCESS not-accessible | MAX-ACCESS not-accessible | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"An entry containing the information on | "An entry containing the information on | |||
a particular IP-TFS SA." | a particular IP-TFS SA." | |||
INDEX { iptfsSaIndex } | INDEX { iptfsOuterSaIndex } | |||
::= { iptfsOuterStatsTable 1 } | ::= { iptfsOuterStatsTable 1 } | |||
IptfsOuterSaEntry ::= SEQUENCE { | IptfsOuterStatsSaEntry ::= SEQUENCE { | |||
iptfsSaIndex Integer32, | iptfsOuterSaIndex Integer32, | |||
-- iptfs packet statistics information | -- iptfs packet statistics information | |||
txExtraPadPkts Counter64, | txExtraPadPkts Counter64, | |||
txExtraPadOctets Counter64, | txExtraPadOctets Counter64, | |||
txAllPadPkts Counter64, | txAllPadPkts Counter64, | |||
txAllPadOctets Counter64, | txAllPadOctets Counter64, | |||
rxExtraPadPkts Counter64, | rxExtraPadPkts Counter64, | |||
rxExtraPadOctets Counter64, | rxExtraPadOctets Counter64, | |||
rxAllPadPkts Counter64, | rxAllPadPkts Counter64, | |||
rxAllPadOctets Counter64, | rxAllPadOctets Counter64, | |||
rxErroredPkts Counter64, | rxErroredPkts Counter64, | |||
rxMissedPkts Counter64 | rxMissedPkts Counter64 | |||
} | } | |||
iptfsSaIndex OBJECT-TYPE | iptfsOuterSaIndex OBJECT-TYPE | |||
SYNTAX Integer32 (1..16777215) | SYNTAX Integer32 (1..16777215) | |||
MAX-ACCESS not-accessible | MAX-ACCESS not-accessible | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"A unique value, greater than zero, for each SA. | "A unique value, greater than zero, for each SA. | |||
It is recommended that values are assigned contiguously | It is recommended that values are assigned contiguously, | |||
starting from 1. | starting from 1. | |||
The value for each entry must remain constant at least | The value for each entry must remain constant at least | |||
from one re-initialization of entity's network management | from one re-initialization of an entity's network management | |||
system to the next re-initialization." | system to the next re-initialization." | |||
::= { iptfsOuterStatsTableEntry 1 } | ::= { iptfsOuterStatsTableEntry 1 } | |||
txExtraPadPkts OBJECT-TYPE | txExtraPadPkts OBJECT-TYPE | |||
SYNTAX Counter64 | SYNTAX Counter64 | |||
MAX-ACCESS read-only | MAX-ACCESS read-only | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"Total number of transmitted outer IP-TFS packets that | "Total number of transmitted outer IP-TFS packets that | |||
included some padding." | included some padding." | |||
skipping to change at page 17, line 18 ¶ | skipping to change at line 772 ¶ | |||
"Total number of IP-TFS outer packets dropped due to | "Total number of IP-TFS outer packets dropped due to | |||
errors." | errors." | |||
::= { iptfsOuterStatsTableEntry 10 } | ::= { iptfsOuterStatsTableEntry 10 } | |||
rxMissedPkts OBJECT-TYPE | rxMissedPkts OBJECT-TYPE | |||
SYNTAX Counter64 | SYNTAX Counter64 | |||
MAX-ACCESS read-only | MAX-ACCESS read-only | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"Total number of IP-TFS outer packets missing indicated | "Total number of IP-TFS outer packets missing indicated | |||
by missing sequence number." | by a missing sequence number." | |||
::= { iptfsOuterStatsTableEntry 11 } | ::= { iptfsOuterStatsTableEntry 11 } | |||
-- | -- | |||
-- Iptfs Module Compliance | -- Iptfs Module Compliance | |||
-- | -- | |||
iptfsMIBConformances OBJECT IDENTIFIER | iptfsMIBConformances OBJECT IDENTIFIER | |||
::= { iptfsMIBConformance 1 } | ::= { iptfsMIBConformance 1 } | |||
iptfsMIBGroups OBJECT IDENTIFIER | iptfsMIBGroups OBJECT IDENTIFIER | |||
::= { iptfsMIBConformance 2 } | ::= { iptfsMIBConformance 2 } | |||
iptfsMIBCompliance MODULE-COMPLIANCE | iptfsMIBCompliance MODULE-COMPLIANCE | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"The compliance statement for entities which | "The compliance statement for entities that | |||
implement the IP-TFS MIB" | implement the IP-TFS MIB." | |||
MODULE -- this module | MODULE -- this module | |||
MANDATORY-GROUPS { | MANDATORY-GROUPS { | |||
iptfsMIBConfGroup, | iptfsMIBConfGroup, | |||
ipsecStatsConfGroup, | ipsecStatsConfGroup, | |||
iptfsInnerStatsConfGroup, | iptfsInnerStatsConfGroup, | |||
iptfsOuterStatsConfGroup | iptfsOuterStatsConfGroup | |||
} | } | |||
::= { iptfsMIBConformances 1 } | ::= { iptfsMIBConformances 1 } | |||
skipping to change at page 18, line 18 ¶ | skipping to change at line 820 ¶ | |||
l3FixedRate , | l3FixedRate , | |||
dontFragment, | dontFragment, | |||
maxAggregationTime, | maxAggregationTime, | |||
windowSize, | windowSize, | |||
sendImmediately, | sendImmediately, | |||
lostPacketTimerInterval | lostPacketTimerInterval | |||
} | } | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"A collection of objects providing per SA IP-TFS | "A collection of objects providing per SA IP-TFS | |||
Configuration." | configuration." | |||
::= { iptfsMIBGroups 1 } | ::= { iptfsMIBGroups 1 } | |||
ipsecStatsConfGroup OBJECT-GROUP | ipsecStatsConfGroup OBJECT-GROUP | |||
OBJECTS { | OBJECTS { | |||
txPkts, | txPkts, | |||
txOctets, | txOctets, | |||
txDropPkts, | txDropPkts, | |||
rxPkts, | rxPkts, | |||
rxOctets, | rxOctets, | |||
rxDropPkts | rxDropPkts | |||
} | } | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"A collection of objects providing per SA Basic | "A collection of objects providing per SA basic | |||
Stats." | statistics." | |||
::= { iptfsMIBGroups 2 } | ::= { iptfsMIBGroups 2 } | |||
iptfsInnerStatsConfGroup OBJECT-GROUP | iptfsInnerStatsConfGroup OBJECT-GROUP | |||
OBJECTS { | OBJECTS { | |||
txInnerPkts, | txInnerPkts, | |||
txInnerOctets, | txInnerOctets, | |||
rxInnerPkts, | rxInnerPkts, | |||
rxInnerOctets, | rxInnerOctets, | |||
rxIncompleteInnerPkts | rxIncompleteInnerPkts | |||
} | } | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"A collection of objects providing per SA IP-TFS | "A collection of objects providing per SA IP-TFS | |||
Inner Packet Statistics." | inner packet statistics." | |||
::= { iptfsMIBGroups 3 } | ::= { iptfsMIBGroups 3 } | |||
iptfsOuterStatsConfGroup OBJECT-GROUP | iptfsOuterStatsConfGroup OBJECT-GROUP | |||
OBJECTS { | OBJECTS { | |||
txExtraPadPkts, | txExtraPadPkts, | |||
txExtraPadOctets, | txExtraPadOctets, | |||
txAllPadPkts, | txAllPadPkts, | |||
txAllPadOctets, | txAllPadOctets, | |||
rxExtraPadPkts, | rxExtraPadPkts, | |||
rxExtraPadOctets, | rxExtraPadOctets, | |||
rxAllPadPkts, | rxAllPadPkts, | |||
rxAllPadOctets, | rxAllPadOctets, | |||
rxErroredPkts, | rxErroredPkts, | |||
rxMissedPkts | rxMissedPkts | |||
} | } | |||
STATUS current | STATUS current | |||
DESCRIPTION | DESCRIPTION | |||
"A collection of objects providing per SA IP-TFS | "A collection of objects providing per SA IP-TFS | |||
Outer Packet Statistics." | outer packet statistics." | |||
::= { iptfsMIBGroups 4 } | ::= { iptfsMIBGroups 4 } | |||
END | END | |||
<CODE ENDS> | <CODE ENDS> | |||
5. IANA Considerations | 5. IANA Considerations | |||
The MIB module in this document uses the following IANA-assigned | The MIB module in this document uses the following IANA-assigned | |||
OBJECT IDENTIFIER value, recorded in the SMI Network Management MGMT | OBJECT IDENTIFIER value, recorded in the "SMI Network Management MGMT | |||
Codes Internet-standard MIB - registry: | Codes Internet-standard MIB" registry: | |||
Name Description OBJECT IDENTIFIER value | +=========+==========+==============================+ | |||
------- --------------------------------- ---------------------- | | Decimal | Name | Description | | |||
iptfsMIB IP-TRAFFIC-FLOW-SECURITY-MIB { mib-2 TBA-IANA } | +=========+==========+==============================+ | |||
| 246 | iptfsMIB | IP-TRAFFIC-FLOW-SECURITY-MIB | | ||||
+---------+----------+------------------------------+ | ||||
Table 1 | ||||
6. Security Considerations | 6. Security Considerations | |||
The MIB specified in this document can read the operational behavior | The MIB specified in this document can read the operational behavior | |||
of IP traffic flow security. For the implications regarding write | of IP Traffic Flow Security. For the implications regarding write | |||
configuration consult the [I-D.ietf-ipsecme-iptfs] which defines the | configuration, consult [RFC9347], which defines the functionality. | |||
functionality. | ||||
There are no management objects defined in this MIB module that have | There are no management objects defined in this MIB module that have | |||
a MAX-ACCESS clause of read-write and/or read-create. So, if this | a MAX-ACCESS clause of read-write and/or read-create. So, if this | |||
MIB module is implemented correctly, then there is no risk that an | MIB module is implemented correctly, then there is no risk that an | |||
intruder can alter or create any management objects of this MIB | intruder can alter or create any management objects of this MIB | |||
module via direct SNMP SET operations. | module via direct SNMP SET operations. | |||
Some of the objects in this MIB module may be considered sensitive or | Some of the objects in this MIB module may be considered sensitive or | |||
vulnerable in some network environments. This includes INDEX objects | vulnerable in some network environments. This includes INDEX objects | |||
with a MAX-ACCESS of not-accessible, and any indices from other | with a MAX-ACCESS of not-accessible, and any indices from other | |||
modules exposed via AUGMENTS. It is thus important to control even | modules exposed via AUGMENTS. It is thus important to control even | |||
GET and/or NOTIFY access to these objects and possibly to even | GET and/or NOTIFY access to these objects and possibly to even | |||
encrypt the values of these objects when sending them over the | encrypt the values of these objects when sending them over the | |||
network via SNMP. These are the tables and objects and their | network via SNMP. These are the tables and objects and their | |||
sensitivity/vulnerability: | sensitivity/vulnerability: | |||
* iptfsInnerStatsTable and iptfsOuterStatsTable- Access to IP inner | * iptfsInnerStatsTable and iptfsOuterStatsTable: Access to IP inner | |||
and outer traffic flow security statistics can provide information | and outer Traffic Flow Security statistics can provide information | |||
that IP traffic flow security obscures such as the true activity | that IP Traffic Flow Security obscures, such as the true activity | |||
of the flows using IP traffic flow security. | of the flows using IP Traffic Flow Security. | |||
SNMP versions prior to SNMPv3 did not include adequate security. | SNMP versions prior to SNMPv3 did not include adequate security. | |||
Even if the network itself is secure (for example by using IPsec), | Even if the network itself is secure (for example by using IPsec), | |||
there is no control as to who on the secure network is allowed to | there is no control as to who on the secure network is allowed to | |||
access and GET (read) the objects in this MIB module. | access and GET (read) the objects in this MIB module. | |||
To prevent unauthorized access to SNMP including access to IP-TFS | Implementations SHOULD provide the security features described by the | |||
sensitive objects: | SNMPv3 framework (see [RFC3410]), and implementations claiming | |||
compliance to the SNMPv3 standard MUST include full support for | ||||
* Implementations SHOULD provide the security features described by | authentication and privacy via the User-based Security Model (USM) | |||
the SNMPv3 framework (see [RFC3410]), and implementations claiming | [RFC3414] with the AES cipher algorithm [RFC3826]. Implementations | |||
compliance to the SNMPv3 standard MUST include full support for | MAY also provide support for the Transport Security Model (TSM) | |||
authentication and privacy via the User-based Security Model (USM) | [RFC5591] in combination with a secure transport such as SSH | |||
[RFC3414] with the AES cipher algorithm [RFC3826]. | [RFC5592] or TLS/DTLS [RFC6353]. | |||
Implementations MAY also provide support for the Transport | ||||
Security Model (TSM) [RFC5591] in combination with a secure | ||||
transport such as SSH [RFC5592] or TLS/DTLS [RFC6353]. | ||||
* Further, deployment of SNMP versions prior to SNMPv3 is NOT | ||||
RECOMMENDED. Instead, it is RECOMMENDED to deploy SNMPv3 and to | ||||
enable cryptographic security. It is then a customer/operator | ||||
responsibility to ensure that the SNMP entity giving access to an | ||||
instance of this MIB module is properly configured to give access | ||||
to the objects only to those principals (users) that have | ||||
legitimate rights to indeed GET or SET (change/create/delete) | ||||
them. | ||||
7. Acknowledgements | ||||
The authors would like to thank Chris Hopps, Lou Berger and Tero | ||||
Kivinen for their help and feedback on the MIB model. | ||||
8. References | Further, deployment of SNMP versions prior to SNMPv3 is NOT | |||
RECOMMENDED. Instead, it is RECOMMENDED to deploy SNMPv3 and to | ||||
enable cryptographic security. It is then a customer/operator | ||||
responsibility to ensure that the SNMP entity giving access to an | ||||
instance of this MIB module is properly configured to give access to | ||||
the objects only to those principals (users) that have legitimate | ||||
rights to indeed GET or SET (change/create/delete) them. | ||||
8.1. Normative References | 7. References | |||
[I-D.ietf-ipsecme-iptfs] | 7.1. Normative References | |||
Hopps, C., "IP-TFS: Aggregation and Fragmentation Mode for | ||||
ESP and its Use for IP Traffic Flow Security", Work in | ||||
Progress, Internet-Draft, draft-ietf-ipsecme-iptfs-19, 4 | ||||
September 2022, <https://www.ietf.org/archive/id/draft- | ||||
ietf-ipsecme-iptfs-19.txt>. | ||||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
<https://www.rfc-editor.org/info/rfc2119>. | <https://www.rfc-editor.org/info/rfc2119>. | |||
[RFC2578] McCloghrie, K., Ed., Perkins, D., Ed., and J. | [RFC2578] McCloghrie, K., Ed., Perkins, D., Ed., and J. | |||
Schoenwaelder, Ed., "Structure of Management Information | Schoenwaelder, Ed., "Structure of Management Information | |||
Version 2 (SMIv2)", STD 58, RFC 2578, | Version 2 (SMIv2)", STD 58, RFC 2578, | |||
DOI 10.17487/RFC2578, April 1999, | DOI 10.17487/RFC2578, April 1999, | |||
<https://www.rfc-editor.org/info/rfc2578>. | <https://www.rfc-editor.org/info/rfc2578>. | |||
[RFC2579] McCloghrie, K., Ed., Perkins, D., Ed., and J. | [RFC2579] McCloghrie, K., Ed., Perkins, D., Ed., and J. | |||
Schoenwaelder, Ed., "Textual Conventions for SMIv2", | Schoenwaelder, Ed., "Textual Conventions for SMIv2", | |||
STD 58, RFC 2579, DOI 10.17487/RFC2579, April 1999, | STD 58, RFC 2579, DOI 10.17487/RFC2579, April 1999, | |||
<https://www.rfc-editor.org/info/rfc2579>. | <https://www.rfc-editor.org/info/rfc2579>. | |||
[RFC2580] McCloghrie, K., Ed., Perkins, D., Ed., and J. | ||||
Schoenwaelder, Ed., "Conformance Statements for SMIv2", | ||||
STD 58, RFC 2580, DOI 10.17487/RFC2580, April 1999, | ||||
<https://www.rfc-editor.org/info/rfc2580>. | ||||
[RFC3414] Blumenthal, U. and B. Wijnen, "User-based Security Model | [RFC3414] Blumenthal, U. and B. Wijnen, "User-based Security Model | |||
(USM) for version 3 of the Simple Network Management | (USM) for version 3 of the Simple Network Management | |||
Protocol (SNMPv3)", STD 62, RFC 3414, | Protocol (SNMPv3)", STD 62, RFC 3414, | |||
DOI 10.17487/RFC3414, December 2002, | DOI 10.17487/RFC3414, December 2002, | |||
<https://www.rfc-editor.org/info/rfc3414>. | <https://www.rfc-editor.org/info/rfc3414>. | |||
[RFC3826] Blumenthal, U., Maino, F., and K. McCloghrie, "The | [RFC3826] Blumenthal, U., Maino, F., and K. McCloghrie, "The | |||
Advanced Encryption Standard (AES) Cipher Algorithm in the | Advanced Encryption Standard (AES) Cipher Algorithm in the | |||
SNMP User-based Security Model", RFC 3826, | SNMP User-based Security Model", RFC 3826, | |||
DOI 10.17487/RFC3826, June 2004, | DOI 10.17487/RFC3826, June 2004, | |||
skipping to change at page 22, line 14 ¶ | skipping to change at line 992 ¶ | |||
[RFC6353] Hardaker, W., "Transport Layer Security (TLS) Transport | [RFC6353] Hardaker, W., "Transport Layer Security (TLS) Transport | |||
Model for the Simple Network Management Protocol (SNMP)", | Model for the Simple Network Management Protocol (SNMP)", | |||
STD 78, RFC 6353, DOI 10.17487/RFC6353, July 2011, | STD 78, RFC 6353, DOI 10.17487/RFC6353, July 2011, | |||
<https://www.rfc-editor.org/info/rfc6353>. | <https://www.rfc-editor.org/info/rfc6353>. | |||
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | |||
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | |||
May 2017, <https://www.rfc-editor.org/info/rfc8174>. | May 2017, <https://www.rfc-editor.org/info/rfc8174>. | |||
8.2. Informative References | [RFC9347] Hopps, C., "Aggregation and Fragmentation Mode for | |||
Encapsulating Security Payload (ESP) and Its Use for IP | ||||
[I-D.ietf-ipsecme-yang-iptfs] | Traffic Flow Security (IP-TFS)", RFC 9347, | |||
Fedyk, D. and C. Hopps, "A YANG Data Model for IP Traffic | DOI 10.17487/RFC9347, January 2023, | |||
Flow Security", Work in Progress, Internet-Draft, draft- | <https://www.rfc-editor.org/info/rfc9347>. | |||
ietf-ipsecme-yang-iptfs-11, 31 August 2022, | ||||
<https://www.ietf.org/archive/id/draft-ietf-ipsecme-yang- | ||||
iptfs-11.txt>. | ||||
[RFC2580] McCloghrie, K., Ed., Perkins, D., Ed., and J. | 7.2. Informative References | |||
Schoenwaelder, Ed., "Conformance Statements for SMIv2", | ||||
STD 58, RFC 2580, DOI 10.17487/RFC2580, April 1999, | ||||
<https://www.rfc-editor.org/info/rfc2580>. | ||||
[RFC3410] Case, J., Mundy, R., Partain, D., and B. Stewart, | [RFC3410] Case, J., Mundy, R., Partain, D., and B. Stewart, | |||
"Introduction and Applicability Statements for Internet- | "Introduction and Applicability Statements for Internet- | |||
Standard Management Framework", RFC 3410, | Standard Management Framework", RFC 3410, | |||
DOI 10.17487/RFC3410, December 2002, | DOI 10.17487/RFC3410, December 2002, | |||
<https://www.rfc-editor.org/info/rfc3410>. | <https://www.rfc-editor.org/info/rfc3410>. | |||
[RFC4301] Kent, S. and K. Seo, "Security Architecture for the | [RFC4301] Kent, S. and K. Seo, "Security Architecture for the | |||
Internet Protocol", RFC 4301, DOI 10.17487/RFC4301, | Internet Protocol", RFC 4301, DOI 10.17487/RFC4301, | |||
December 2005, <https://www.rfc-editor.org/info/rfc4301>. | December 2005, <https://www.rfc-editor.org/info/rfc4301>. | |||
[RFC5348] Floyd, S., Handley, M., Padhye, J., and J. Widmer, "TCP | [RFC5348] Floyd, S., Handley, M., Padhye, J., and J. Widmer, "TCP | |||
Friendly Rate Control (TFRC): Protocol Specification", | Friendly Rate Control (TFRC): Protocol Specification", | |||
RFC 5348, DOI 10.17487/RFC5348, September 2008, | RFC 5348, DOI 10.17487/RFC5348, September 2008, | |||
<https://www.rfc-editor.org/info/rfc5348>. | <https://www.rfc-editor.org/info/rfc5348>. | |||
[RFC9348] Fedyk, D. and C. Hopps, "A YANG Data Model for IP Traffic | ||||
Flow Security", RFC 9348, DOI 10.17487/RFC9348, January | ||||
2023, <https://www.rfc-editor.org/info/rfc9348>. | ||||
Acknowledgements | ||||
The authors would like to thank Chris Hopps, Lou Berger, and Tero | ||||
Kivinen for their help and feedback on the MIB model. | ||||
Authors' Addresses | Authors' Addresses | |||
Don Fedyk | Don Fedyk | |||
LabN Consulting, L.L.C. | LabN Consulting, L.L.C. | |||
Email: dfedyk@labn.net | Email: dfedyk@labn.net | |||
Eric Kinzie | Eric Kinzie | |||
LabN Consulting, L.L.C. | LabN Consulting, L.L.C. | |||
Email: ekinzie@labn.net | Email: ekinzie@labn.net | |||
End of changes. 78 change blocks. | ||||
202 lines changed or deleted | 194 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |