Netconf Event Notifications IETF 66 Sharon Chisholm Hector Trevino

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems (I) CS 6262 Fall 02. Definitions Intrusion Intrusion A set of actions aimed to compromise the security goals, namely A set.
Advertisements

SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
SOAP: Simple Object Access Protocol CS 795/895. Reference links Video: 2-M.
Stream Control Transmission Protocol 網路前瞻技術實驗室 陳旻槿.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Integrated Security Model for SNMPv3 (ISMS) pronounced "is" "miss" David T. Perkins & Wes Hardaker 60 th IETF August 6, 2004.
Session-based Security Model for SNMPv3 (SNMPv3/SBSM) David T. Perkins Wes Hardaker IETF November 12, 2003.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
1 Introducing the Specifications of the Metro Ethernet Forum.
BOB Tech Demo 2003 G2E – Las Vegas. Agenda  Best of Breed – a layering of standards  Standards, messaging, protocols and why you care  From the bottom.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
THE GITB TESTING FRAMEWORK Jacques Durand, Fujitsu America | December 1, 2011 GITB |
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
September, 2005What IHE Delivers 1 ITI Security Profiles – ATNA, CT IHE Vendors Webinar 2006 IHE IT Infrastructure Education Robert Horn, Agfa Healthcare.
Protocols and the TCP/IP Suite
draft-ietf-netconf-call-home-01
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Netconf Monitoring IETF 70 Mark Scott Sharon Chisholm Hector Trevino
Abierman-nanog-30may03 1 XML Router Configs BOF Operator Involvement Andy Bierman
© Hitachi, Ltd All rights reserved. NETCONF Configuration I/F Advertisement by WSDL and XSD Hideki Okita, Tomoyuki Iijima, Yoshifumi Atarashi, Ray.
Abierman-netconf-mar03 1 NETCONF BOF 56th IETF San Francisco, California March 17, 2003 Discussion: Admin:
Web Services Standards. Introduction A web service is a type of component that is available on the web and can be incorporated in applications or used.
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
Syslog (1) The purpose of syslog is to write system messages to a log The purpose of syslog is to write system messages to a log Syslog messages can include.
N ETWORK C ONFIGURATION Prepared by: Menna Hamza Mohamad Hesham Mona Abdel Mageed Yasmine Shaker.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
BASIC INTERNET PROTOCOLS: http, ftp, telnet. Mirela Walczak.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
PG 1 Netconf Data Model Netmod BOF – IETF 60 Sharon Chisholm – Randy Presuhn -
Protocol for I2RS I2RS WG IETF #89 London, UK Dean Bogdanovic v0.1.
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
Representing Netconf Data Models using Document Schema Definition Languages (DSDL) Rohan Mahy Sharon Chisholm Lada Lhotka IETF 72 - Dublin.
Abierman-netconf-mar07 1 NETCONF WG 68 th IETF Prague, CZ March 19, 2007.
ISMS IETF72 David Harrington. Status IETF72 Transport Subsystem for the Simple Network Management Protocol (SNMP) –IETF69: draft-ietf-isms-tmsm-09.txt.
SSHSM Issues David Harrington IETF64 ISMS WG Vancouver, BC.
NETCONF WG 66 th IETF Montreal, QC, Canada July 14, 2006.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
1 Header Compression over IPsec (HCoIPsec) Emre Ertekin, Christos Christou, Rohan Jasani {
N ETWORK C ONFIGURATION Prepared by: Menna Hamza Mohamad Hesham Mona Abdel Mageed Yasmine Shaker.
PG 1 Framework for Netconf Data Models Netmod BOF – IETF 60 Sharon Chisholm –
Netconf Schema Query Mark Scott IETF 70 Vancouver December 2007
K. Salah1 Security Protocols in the Internet IPSec.
I2rs Requirements for NETCONF IETF 93. Requirement Documents
DOTS Requirements Andrew Mortensen November 2015 IETF 94 1.
Netmod Netconf Data Modeling Sharon Chisholm Nortel
Computer Engineering and Networks, College of Engineering, Majmaah University Protocols OSI reference MODEL TCp /ip model Mohammed Saleem Bhat
Netconf Notifications Sharon Chisholm Hector Trevino IETF 67 November 2006.
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Convergence of Network Management Protocols
SIP Configuration Issues: IETF 57, SIPPING
Lecturer, Department of Computer Application
DEPARTMENT OF COMPUTER SCIENCE
NETCONF Configuration I/F Advertisement by WSDL and XSD
Sharon Chisholm Netconf Phase 2 Musing Sharon Chisholm
IOS Network Model 2nd semester
Chapter 5: Network Security and Monitoring
draft-levin-xcon-cccp-02.txt Orit Levin
UDP based Publication Channel for Streaming Telemetry
Chapter 8: Monitoring the Network
Stream Issues Alex, Ambika, Eric, Tim
Lecture 2: Overview of TCP/IP protocol
OSI Model OSI MODEL.
Evolution of the Subscription & Event Notification Drafts IETF #98 Chicago Eric Voit 28-Mar-2017 DRAFT Authors on at least 1 drafts Andy Bierman Alexander.
Presentation transcript:

Netconf Event Notifications IETF 66 Sharon Chisholm Hector Trevino

Outline Key Features Architecture Requirements Issues Bugs

Key Features Clean subscribe/unsubscribe to notifications of interest Modification of subscription without loss of notifications Event Classes to enable ‘big bucket’ filtering Ability to carry Netconf-content

Netconf Layers Layer Example | Content | | Configuration data | | | | Operations | |, | | | | | | RPC | |, | | | | | | | Application | | BEEP, SSH, SSL, console | | Protocol | | |

An Architecture | Network Element | | | | | Alarm | | | | Management | | | |--->|Netconf Stack | | Netconf | | | | | | | | | | | | | --->| Client | | V | | | | | | | | | Event |--->| | | | | Management | | |Other Protocols | | | | |--->| | | | | | | | | | | | Network Element | | | | | | | Alarm | | | | | Management | | | | |--->|Netconf Stack |< | | | | | | | | | | | | V | | | | | | | Event |--->| | | | Management | | |Other Protocols | | | |--->| | | | | |

Message Flow C S | | | capability exchange | | >| | | | >| |< | | | |< | | | |< | | | | >| (buffered) | | |< | | | |< |

Message Format ___________________________________________________________________ || Notification Header || Data | ||__________________________________________________________||______| || subscriptionId| eventClasses| sequenceNumber| dateAndTime|| | ||_______________|_____________|_______________|____________||______|

Requirements NumberRequirementCompliance 1Initial release should ensure it supports notification in support of configuration operations Has event classes for configuration as well as to be able to report security audit logs 2Data content must be use the same data model as used in configuration Allows user to use the same data model (content) within both configuration commands and notifications 3solution should support structured hierarchical dataAble to support anything that can be modeled in XML. 4solution should be able to carry configuration fragments The configuration event class covers sending configuration fragments 5 solution should support a reasonable message size limit (syslog and SNMP are rather constrained in terms of message sizes) Currently no restrictions on message size 6 solution should provide reliable delivery of notifications Delivery is over SSH. The primary mechanism is reliable, but callHome method is not. 7 solution should support preconfigured notification destinations Not in the primary solution, but the callHome one does 8 solution should support agent initiated connections Not in the primary solution, but the callHome one does

Requirements NumberRequirement Compliance 9 solution should provide a subscription mechanism full 10 solution should support multiple subscriptions full 11 solution should provide a filtering mechanism Based on netconf subtree and/or xpath 12 solution should support notification names The name of the notification is defined by its path, but this is not currently included in the notification header. This can be easily added. 13 solution should support notification timestamps full 14 solution should support notification classes full 15 solution should support notification info There is the data field, although B 16 solution should provide the ability to specify the content of notifications to ensure predictability Notifications are identified within an XML Schema via an attribute.

Requirements NumberRequirementCompliance 17 solution should send sufficient information in a notification so that it can be analyzed independent of the transport mechanism I’m interpretting this to mean that the header and the content should tell you everything and you shouldn’t need to know which session and what happened recently on that session in order for all this to work 18 solution should allow notifications to refer to prior configuration change RPCs The configuration event class can do this, although the details of what specifically is in the data bit hasn’t been specified. Do we really mean to refer to the RPC or the content of the RPC? 19 solution should not bind subscriptions to a connection Main method does (it’s a feature ). Can define subscription information in a named profile for re-use and can use callHome feature if that fits your operational model 20 channels for configuration change notifications should share fate with a session that includes a configuration channel I’m not sure what that means. You can do the configuration changes on the same connection. Subscription connections, if not callHome, behave the same as configuration connections

Requirements NumberRequirementCompliance 21 solution should support replay of locally logged notifications This isn’t included in the draft, but replay had been fully designed from day one to ensure it wouldn’t cause issues when added. This design can be made available. 22 solution should support message chunking capability in cases channels carry mixed RPCs Each notification is a well-formed document, but a large notification can’t be broken into smaller pieces. 23 solution should scale to nodes which may emit notifications Don’t yet have engineering numbers for management software. This really depends on the volume of notifications expected from each node. 24 solution should scale to order nodes to send notifications How does this differ from 23?

Issues - Big Endless RPC versus Notifications Syslog Tunnelling versus Notification Framework

Issues – Less Big Best way to have initial set up event classes while allowing extensibility  Create separate Event Class document? More details of callHomeNotifications

Bugs Missing ‘data’ element from Notification XSD definition