IETF-84 Proceedings

Introduction  |  Area, Working Goup & BoF Reports  |  Plenaries  |  Training  |  Internet Research Task Force

Network Configuration (netconf) (WG)

Minutes   |   Audio Archives  |   Jabber Logs  |   Mailing List Archives

Additional information is available at tools.ietf.org/wg/netconf

Chair(s):

Operations and Management Area Area Director(s):

Operations and Management Area Advisor



Meeting Slides:

Blue Sheets:

Internet-Drafts:

Request for Comments:

Charter (as of 2012-09-20):

Configuration of networks of devices has become a critical requirement
for operators in today's highly interconnected networks. Large and small
operators alike have developed their own mechanisms or have used vendor
specific mechanisms to transfer configuration data to and from a device
and to examine device state information which may impact the
configuration. Each of these mechanisms may be different in various
aspects, such as session establishment, user authentication,
configuration data exchange, and error responses.

The NETCONF protocol has the following characteristics:

- Provides retrieval mechanisms which can differentiate between
configuration data and non-configuration data
- Is extensible enough so that vendors can provide access to all
configuration data on the device using a single protocol
- Has a programmatic interface (avoids screen scraping and formatting-
related changes between releases)
- Uses an XML-based data representation, that can be easily manipulated
using non-specialized XML manipulation tools.
- Supports integration with existing user authentication methods
- Supports integration with existing configuration database systems
- Supports multiple (e.g. candidate and running) data-stores to optimize
configuration preparation and activation
- Supports network wide configuration transactions (with features such
as locking and rollback capability)
- Runs over a secure transport; SSH is mandatory to implement while TLS,
BEEP, and SOAP are optional transports.
- Provides support for asynchronous notifications.
- Supports an Access Control Model and a YANG module for configuring the
Access Control parameters.
- Supports a YANG module for System Notifications

The NETCONF protocol is data modeling language independent, but YANG is
the recommended NETCONF modeling language, which introduces advanced
language features for configuration management.

In the current phase of NETCONF's incremental development the workgroup
will focus on following items:

1. Advance NETCONF over TLS to be in-line with NETCONF 1.1 (i.e., update
RFC 5539).

2. Based on the implementation, deployment experience and
interoperability testing, the WG will produce a NETCONF status report.
The result may be clarifications for RFC6241 and RFC6242 and addressing
any reported errata.

Internet SocietyAMSHome - Tools Team - Datatracker - Web Site Usage Statistics - IASA - IAB - RFC Editor - IANA - IRTF - IETF Trust - ISOC - Store - Contact Us
Secretariat services provided by Association Management Solutions, LLC (AMS).
Please send problem reports to: ietf-action@ietf.org.