RFC1812 - Requirements for IP Version 4 Routers(5)
To comply with Section [8.3] of this memo, a router that implements
BGP is required to implement the BGP MIB [MGT:15].
To characterize the set of policy decisions that can be enforced
using BGP, one must focus on the rule that an AS advertises to its
neighbor ASs only those routes that it itself uses. This rule
reflects the hop-by-hop routing paradigm generally used throughout
the current Internet. Note that some policies cannot be supported by
the hop-by-hop routing paradigm and thus require techniques such as
source routing to enforce. For example, BGP does not enable one AS
to send traffic to a neighbor AS intending that traffic take a
different route from that taken by traffic originating in the
neighbor AS. On the other hand, BGP can support any policy
conforming to the hop-by-hop routing paradigm.
Implementors of BGP are strongly encouraged to follow the
recommendations outlined in Section 6 of [ROUTE:5].
7.3.2.2 Protocol Walk-through
While BGP provides support for quite complex routing policies (as an
example see Section 4.2 in [ROUTE:5]), it is not required for all BGP
implementors to support such policies. At a minimum, however, a BGP
implementation:
(1) SHOULD allow an AS to control announcements of the BGP learned
routes to adjacent AS's. Implementations SHOULD support such
control with at least the granularity of a single network.
Implementations SHOULD also support such control with the
granularity of an autonomous system, where the autonomous system
may be either the autonomous system that originated the route,
or the autonomous system that advertised the route to the local
system (adjacent autonomous system).
(2) SHOULD allow an AS to prefer a particular path to a destination
(when more than one path is available). Such function SHOULD be
implemented by allowing system administrator to assign weights
to Autonomous Systems, and making route selection process to
select a route with the lowest weight (where weight of a route
is defined as a sum of weights of all AS's in the AS_PATH path
attribute associated with that route).
(3) SHOULD allow an AS to ignore routes with certain AS's in the
AS_PATH path attribute. Such function can be implemented by
using technique outlined in (2), and by assigning infinity as
weights for such AS's. The route selection process must ignore
routes that have weight equal to infinity.
7.3.3 INTER-AS ROUTING WITHOUT AN EXTERIOR PROTOCOL
It is possible to exchange routing information between two autonomous
systems or routing domains without using a standard exterior routing
protocol between two separate, standard interior routing protocols.
The most common way of doing this is to run both interior protocols
independently in one of the border routers with an exchange of route
information between the two processes.
As with the exchange of information from an EGP to an IGP, without
appropriate controls these exchanges of routing information between
two IGPs in a single router are subject to creation of routing loops.
7.4 STATIC ROUTING
Static routing provides a means of explicitly defining the next hop
from a router for a particular destination. A router SHOULD provide
a means for defining a static route to a destination, where the
destination is defined by a network prefix. The mechanism SHOULD
also allow for a metric to be specified for each static route.
A router that supports a dynamic routing protocol MUST allow static
routes to be defined with any metric valid for the routing protocol
used. The router MUST provide the ability for the user to specify a
list of static routes that may or may not be propagated through the
routing protocol. In addition, a router SHOULD support the following
additional information if it supports a routing protocol that could
make use of the information. They are:
o TOS,
o Subnet Mask, or
o Prefix Length, or
o A metric specific to a given routing protocol that can import the
route.
DISCUSSION
We intend that one needs to support only the things useful to the
given routing protocol. The need for TOS should not require the
vendor to implement the other parts if they are not used.
Whether a router prefers a static route over a dynamic route (or
vice versa) or whether the associated metrics are used to choose
between conflicting static and dynamic routes SHOULD be
configurable for each static route.
A router MUST allow a metric to be assigned to a static route for
each routing domain that it supports. Each such metric MUST be
explicitly assigned to a specific routing domain. For example:
route 10.0.0.0/8 via 192.0.2.3 rip metric 3
route 10.21.0.0/16 via 192.0.2.4 ospf inter-area metric 27
route 10.22.0.0/16 via 192.0.2.5 egp 123 metric 99
DISCUSSION
It has been suggested that, ideally, static routes should have
preference values rather than metrics (since metrics can only be
compared with metrics of other routes in the same routing domain,
the metric of a static route could only be compared with metrics
of other static routes). This is contrary to some current
implementations, where static routes really do have metrics, and
those metrics are used to determine whether a particular dynamic
route overrides the static route to the same destination. Thus,
this document uses the term metric rather than preference.
This technique essentially makes the static route into a RIP
route, or an OSPF route (or whatever, depending on the domain of
the metric). Thus, the route lookup algorithm of that domain
applies. However, this is NOT route leaking, in that coercing a
static route into a dynamic routing domain does not authorize the
router to redistribute the route into the dynamic routing domain.
For static routes not put into a specific routing domain, the
route lookup algorithm is:
(1) Basic match
(2) Longest match
(3) Weak TOS (if TOS supported)
(4) Best metric (where metric are implementation-defined)
The last step may not be necessary, but it's useful in the case
where you want to have a primary static route over one interface
and a secondary static route over an alternate interface, with
failover to the alternate path if the interface for the primary
route fails.
7.5 FILTERING OF ROUTING INFORMATION
Each router within a network makes forwarding decisions based upon
information contained within its forwarding database. In a simple
network the contents of the database may be configured statically.
As the network grows more complex, the need for dynamic updating of
the forwarding database becomes critical to the efficient operation
of the network.
If the data flow through a network is to be as efficient as possible,
it is necessary to provide a mechanism for controlling the
propagation of the information a router uses to build its forwarding
database. This control takes the form of choosing which sources of
routing information should be trusted and selecting which pieces of
the information to believe. The resulting forwarding database is a
filtered version of the available routing information.
In addition to efficiency, controlling the propagation of routing
information can reduce instability by preventing the spread of
incorrect or bad routing information.
In some cases local policy may require that complete routing
information not be widely propagated.
These filtering requirements apply only to non-SPF-based protocols
(and therefore not at all to routers which don't implement any
distance vector protocols).
7.5.1 Route Validation
A router SHOULD log as an error any routing update advertising a
route that violates the specifications of this memo, unless the
routing protocol from which the update was received uses those values
to encode special routes (such as default routes).
7.5.2 Basic Route Filtering
Filtering of routing information allows control of paths used by a
router to forward packets it receives. A router should be selective
in which sources of routing information it listens to and what routes
it believes. Therefore, a router MUST provide the ability to
specify:
o On which logical interfaces routing information will be accepted
and which routes will be accepted from each logical interface.
o Whether all routes or only a default route is advertised on a
logical interface.
Some routing protocols do not recognize logical interfaces as a
source of routing information. In such cases the router MUST provide
the ability to specify
o from which other routers routing information will be accepted.
For example, assume a router connecting one or more leaf networks to
the main portion or backbone of a larger network. Since each of the
leaf networks has only one path in and out, the router can simply
send a default route to them. It advertises the leaf networks to the
main network.
7.5.3 Advanced Route Filtering
As the topology of a network grows more complex, the need for more
complex route filtering arises. Therefore, a router SHOULD provide
the ability to specify independently for each routing protocol:
o Which logical interfaces or routers routing information (routes)
will be accepted from and which routes will be believed from each
other router or logical interface,
o Which routes will be sent via which logical interface(s), and
o Which routers routing information will be sent to, if this is
supported by the routing protocol in use.
In many situations it is desirable to assign a reliability ordering
to routing information received from another router instead of the
simple believe or don't believe choice listed in the first bullet
above. A router MAY provide the ability to specify:
o A reliability or preference to be assigned to each route received.
A route with higher reliability will be chosen over one with lower
reliability regardless of the routing metric associated with each
route.
If a router supports assignment of preferences, the router MUST NOT
propagate any routes it does not prefer as first party information.
If the routing protocol being used to propagate the routes does not
support distinguishing between first and third party information, the
router MUST NOT propagate any routes it does not prefer.
DISCUSSION
For example, assume a router receives a route to network C from
router R and a route to the same network from router S. If router
R is considered more reliable than router S traffic destined for
network C will be forwarded to router R regardless of the route
received from router S.
Routing information for routes which the router does not use (router
S in the above example) MUST NOT be passed to any other router.
7.6 INTER-ROUTING-PROTOCOL INFORMATION EXCHANGE
Routers MUST be able to exchange routing information between separate
IP interior routing protocols, if independent IP routing processes
can run in the same router. Routers MUST provide some mechanism for
avoiding routing loops when routers are configured for bi-directional
exchange of routing information between two separate interior routing
processes. Routers MUST provide some priority mechanism for choosing
routes from independent routing processes. Routers SHOULD provide
administrative control of IGP-IGP exchange when used across
administrative boundaries.
Routers SHOULD provide some mechanism for translating or transforming
metrics on a per network basis. Routers (or routing protocols) MAY
allow for global preference of exterior routes imported into an IGP.
DISCUSSION
Different IGPs use different metrics, requiring some translation
technique when introducing information from one protocol into
another protocol with a different form of metric. Some IGPs can
run multiple instances within the same router or set of routers.
In this case metric information can be preserved exactly or
translated.
There are at least two techniques for translation between
different routing processes. The static (or reachability)
approach uses the existence of a route advertisement in one IGP to
generate a route advertisement in the other IGP with a given
metric. The translation or tabular approach uses the metric in
one IGP to create a metric in the other IGP through use of either
a function (such as adding a constant) or a table lookup.
Bi-directional exchange of routing information is dangerous
without control mechanisms to limit feedback. This is the same
problem that distance vector routing protocols must address with
the split horizon technique and that EGP addresses with the
third-party rule. Routing loops can be avoided explicitly through
use of tables or lists of permitted/denied routes or implicitly
through use of a split horizon rule, a no-third-party rule, or a
route tagging mechanism. Vendors are encouraged to use implicit
techniques where possible to make administration easier for
network operators.
8. APPLICATION LAYER - NETWORK MANAGEMENT PROTOCOLS
Note that this chapter supersedes any requirements stated under
"REMOTE MANAGEMENT" in [INTRO:3].
8.1 The Simple Network Management Protocol - SNMP
8.1.1 SNMP Protocol Elements
Routers MUST be manageable by SNMP [MGT:3]. The SNMP MUST operate
using UDP/IP as its transport and network protocols. Others MAY be
supported (e.g., see [MGT:25, MGT:26, MGT:27, and MGT:28]). SNMP
management operations MUST operate as if the SNMP was implemented on
the router itself. Specifically, management operations MUST be
effected by sending SNMP management requests to any of the IP
addresses assigned to any of the router's interfaces. The actual
management operation may be performed either by the router or by a
proxy for the router.
DISCUSSION
This wording is intended to allow management either by proxy,
where the proxy device responds to SNMP packets that have one of
the router's IP addresses in the packets destination address
field, or the SNMP is implemented directly in the router itself
and receives packets and responds to them in the proper manner.
It is important that management operations can be sent to one of
the router's IP Addresses. In diagnosing network problems the
only thing identifying the router that is available may be one of
the router's IP address; obtained perhaps by looking through
another router's routing table.
All SNMP operations (get, get-next, get-response, set, and trap) MUST
be implemented.
Routers MUST provide a mechanism for rate-limiting the generation of
SNMP trap messages. Routers MAY provide this mechanism through the
algorithms for asynchronous alert management described in [MGT:5].
DISCUSSION
Although there is general agreement about the need to rate-limit
traps, there is not yet consensus on how this is best achieved.
The reference cited is considered experimental.
8.2 Community Table
For the purposes of this specification, we assume that there is an
abstract `community table' in the router. This table contains
several entries, each entry for a specific community and containing
the parameters necessary to completely define the attributes of that
community. The actual implementation method of the abstract
community table is, of course, implementation specific.
A router's community table MUST allow for at least one entry and
SHOULD allow for at least two entries.
DISCUSSION
A community table with zero capacity is useless. It means that
the router will not recognize any communities and, therefore, all
SNMP operations will be rejected.
Therefore, one entry is the minimal useful size of the table.
Having two entries allows one entry to be limited to read-only
access while the other would have write capabilities.
Routers MUST allow the user to manually (i.e., without using SNMP)
examine, add, delete and change entries in the SNMP community table.
The user MUST be able to set the community name or construct a MIB
view. The user MUST be able to configure communities as read-only
(i.e., they do not allow SETs) or read-write (i.e., they do allow
SETs).
The user MUST be able to define at least one IP address to which
notifications are sent for each community or MIB view, if traps are
used. These addresses SHOULD be definable on a community or MIB view
basis. It SHOULD be possible to enable or disable notifications on a
community or MIB view basis.
A router SHOULD provide the ability to specify a list of valid
network managers for any particular community. If enabled, a router
MUST validate the source address of the SNMP datagram against the
list and MUST discard the datagram if its address does not appear.
If the datagram is discarded the router MUST take all actions
appropriate to an SNMP authentication failure.
DISCUSSION
This is a rather limited authentication system, but coupled with
various forms of packet filtering may provide some small measure
of increased security.
The community table MUST be saved in non-volatile storage.
The initial state of the community table SHOULD contain one entry,
with the community name string public and read-only access. The
default state of this entry MUST NOT send traps. If it is
implemented, then this entry MUST remain in the community table until
the administrator changes it or deletes it.
DISCUSSION
By default, traps are not sent to this community. Trap PDUs are
sent to unicast IP addresses. This address must be configured
into the router in some manner. Before the configuration occurs,
there is no such address, so to whom should the trap be sent?
Therefore trap sending to the public community defaults to be
disabled. This can, of course, be changed by an administrative
operation once the router is operational.
8.3 Standard MIBS
All MIBS relevant to a router's configuration are to be implemented.
To wit:
o The System, Interface, IP, ICMP, and UDP groups of MIB-II [MGT:2]
MUST be implemented.
o The Interface Extensions MIB [MGT:18] MUST be implemented.
o The IP Forwarding Table MIB [MGT:20] MUST be implemented.
o If the router implements TCP (e.g., for Telnet) then the TCP group
of MIB-II [MGT:2] MUST be implemented.
o If the router implements EGP then the EGP group of MIB-II [MGT:2]
MUST be implemented.
o If the router supports OSPF then the OSPF MIB [MGT:14] MUST be
implemented.
o If the router supports BGP then the BGP MIB [MGT:15] MUST be
implemented.
o If the router has Ethernet, 802.3, or StarLan interfaces then the
Ethernet-Like MIB [MGT:6] MUST be implemented.
o If the router has 802.4 interfaces then the 802.4 MIB [MGT:7] MUST
be implemented.
o If the router has 802.5 interfaces then the 802.5 MIB [MGT:8] MUST
be implemented.
o If the router has FDDI interfaces that implement ANSI SMT 7.3 then
the FDDI MIB [MGT:9] MUST be implemented.
o If the router has FDDI interfaces that implement ANSI SMT 6.2 then
the FDDI MIB [MGT:29] MUST be implemented.
o If the router has interfaces that use V.24 signalling, such as RS-
232, V.10, V.11, V.35, V.36, or RS-422/423/449, then the RS-232
[MGT:10] MIB MUST be implemented.
o If the router has T1/DS1 interfaces then the T1/DS1 MIB [MGT:16]
MUST be implemented.
o If the router has T3/DS3 interfaces then the T3/DS3 MIB [MGT:17]
MUST be implemented.
o If the router has SMDS interfaces then the SMDS Interface Protocol
MIB [MGT:19] MUST be implemented.
o If the router supports PPP over any of its interfaces then the PPP
MIBs [MGT:11], [MGT:12], and [MGT:13] MUST be implemented.
o If the router supports RIP Version 2 then the RIP Version 2 MIB
[MGT:21] MUST be implemented.
o If the router supports X.25 over any of its interfaces then the
X.25 MIBs [MGT:22, MGT:23 and MGT:24] MUST be implemented.
8.4 Vendor Specific MIBS
The Internet Standard and Experimental MIBs do not cover the entire
range of statistical, state, configuration and control information
that may be available in a network element. This information is,
nevertheless, extremely useful. Vendors of routers (and other
network devices) generally have developed MIB extensions that cover
this information. These MIB extensions are called Vendor Specific
MIBs.
The Vendor Specific MIB for the router MUST provide access to all
statistical, state, configuration, and control information that is
not available through the Standard and Experimental MIBs that have
been implemented. This information MUST be available for both
monitoring and control operations.
DISCUSSION
The intent of this requirement is to provide the ability to do
anything on the router through SNMP that can be done through a
console, and vice versa. A certain minimal amount of
configuration is necessary before SNMP can operate (e.g., the
router must have an IP address). This initial configuration can
not be done through SNMP. However, once the initial configuration
is done, full capabilities ought to be available through network
management.
The vendor SHOULD make available the specifications for all Vendor
Specific MIB variables. These specifications MUST conform to the SMI
[MGT:1] and the descriptions MUST be in the form specified in
[MGT:4].
DISCUSSION
Making the Vendor Specific MIB available to the user is necessary.
Without this information the users would not be able to configure
their network management systems to be able to access the Vendor
Specific parameters. These parameters would then be useless.
ne 2 The format of the MIB specification is also specified.
Parsers that read MIB specifications and generate the needed
tables for the network management station are available. These
parsers generally understand only the standard MIB specification
format.
8.5 Saving Changes
Parameters altered by SNMP MAY be saved to non-volatile storage.
DISCUSSION
Reasons why this requirement is a MAY:
o The exact physical nature of non-volatile storage is not
specified in this document. Hence, parameters may be saved in
NVRAM/EEPROM, local floppy or hard disk, or in some TFTP file
server or BOOTP server, etc. Suppose that this information is
in a file that is retrieved through TFTP. In that case, a
change made to a configuration parameter on the router would
need to be propagated back to the file server holding the
configuration file. Alternatively, the SNMP operation would
need to be directed to the file server, and then the change
somehow propagated to the router. The answer to this problem
does not seem obvious.
This also places more requirements on the host holding the
configuration information than just having an available TFTP
server, so much more that its probably unsafe for a vendor to
assume that any potential customer will have a suitable host
available.
o The timing of committing changed parameters to non-volatile
storage is still an issue for debate. Some prefer to commit
all changes immediately. Others prefer to commit changes to
non-volatile storage only upon an explicit command.
9. APPLICATION LAYER - MISCELLANEOUS PROTOCOLS
For all additional application protocols that a router implements,
the router MUST be compliant and SHOULD be unconditionally compliant
with the relevant requirements of [INTRO:3].
9.1 BOOTP
9.1.1 Introduction
The Bootstrap Protocol (BOOTP) is a UDP/IP-based protocol that allows
a booting host to configure itself dynamically and without user
supervision. BOOTP provides a means to notify a host of its assigned
IP address, the IP address of a boot server host, and the name of a
file to be loaded into memory and executed ([APPL:1]). Other
configuration information such as the local prefix length or subnet
mask, the local time offset, the addresses of default routers, and
the addresses of various Internet servers can also be communicated to
a host using BOOTP ([APPL:2]).
9.1.2 BOOTP Relay Agents
In many cases, BOOTP clients and their associated BOOTP server(s) do
not reside on the same IP (sub)network. In such cases, a third-party
agent is required to transfer BOOTP messages between clients and
servers. Such an agent was originally referred to as a BOOTP
forwarding agent. However, to avoid confusion with the IP forwarding
function of a router, the name BOOTP relay agent has been adopted
instead.
DISCUSSION
A BOOTP relay agent performs a task that is distinct from a
router's normal IP forwarding function. While a router normally
switches IP datagrams between networks more-or-less transparently,
a BOOTP relay agent may more properly be thought to receive BOOTP
messages as a final destination and then generate new BOOTP
messages as a result. One should resist the notion of simply
forwarding a BOOTP message straight through like a regular packet.
This relay-agent functionality is most conveniently located in the
routers that interconnect the clients and servers (although it may
alternatively be located in a host that is directly connected to the
client (sub)net).
A router MAY provide BOOTP relay-agent capability. If it does, it
MUST conform to the specifications in [APPL:3].
Section [5.2.3] discussed the circumstances under which a packet is
delivered locally (to the router). All locally delivered UDP
messages whose UDP destination port number is BOOTPS (67) are
considered for special processing by the router's logical BOOTP relay
agent.
Sections [4.2.2.11] and [5.3.7] discussed invalid IP source
addresses. According to these rules, a router must not forward any
received datagram whose IP source address is 0.0.0.0. However,
routers that support a BOOTP relay agent MUST accept for local
delivery to the relay agent BOOTREQUEST messages whose IP source
address is 0.0.0.0.
10. OPERATIONS AND MAINTENANCE
This chapter supersedes any requirements of [INTRO:3] relating to
"Extensions to the IP Module."
Facilities to support operation and maintenance (O&M) activities form
an essential part of any router implementation. Although these
functions do not seem to relate directly to interoperability, they
are essential to the network manager who must make the router
interoperate and must track down problems when it doesn't. This
chapter also includes some discussion of router initialization and of
facilities to assist network managers in securing and accounting for
their networks.
10.1 Introduction
The following kinds of activities are included under router O&M:
o Diagnosing hardware problems in the router's processor, in its
network interfaces, or in its connected networks, modems, or
communication lines.
o Installing new hardware
o Installing new software.
o Restarting or rebooting the router after a crash.
o Configuring (or reconfiguring) the router.
o Detecting and diagnosing Internet problems such as congestion,
routing loops, bad IP addresses, black holes, packet avalanches,
and misbehaved hosts.
o Changing network topology, either temporarily (e.g., to bypass a
communication line problem) or permanently.
o Monitoring the status and performance of the routers and the
connected networks.
o Collecting traffic statistics for use in (Inter-)network planning.
o Coordinating the above activities with appropriate vendors and
telecommunications specialists.
Routers and their connected communication lines are often operated as
a system by a centralized O&M organization. This organization may
maintain a (Inter-)network operation center, or NOC, to carry out its
O&M functions. It is essential that routers support remote control
and monitoring from such a NOC through an Internet path, since
routers might not be connected to the same network as their NOC.
Since a network failure may temporarily preclude network access, many
NOCs insist that routers be accessible for network management through
an alternative means, often dial-up modems attached to console ports
on the routers.
Since an IP packet traversing an internet will often use routers
under the control of more than one NOC, Internet problem diagnosis
will often involve cooperation of personnel of more than one NOC. In
some cases, the same router may need to be monitored by more than one
NOC, but only if necessary, because excessive monitoring could impact
a router's performance.
The tools available for monitoring at a NOC may cover a wide range of
sophistication. Current implementations include multi-window,
dynamic displays of the entire router system. The use of AI
techniques for automatic problem diagnosis is proposed for the
future.
Router O&M facilities discussed here are only a part of the large and
difficult problem of Internet management. These problems encompass
not only multiple management organizations, but also multiple
protocol layers. For example, at the current stage of evolution of
the Internet architecture, there is a strong coupling between host
TCP implementations and eventual IP-level congestion in the router
system [OPER:1]. Therefore, diagnosis of congestion problems will
sometimes require the monitoring of TCP statistics in hosts. There
are currently a number of R&D efforts in progress in the area of
Internet management and more specifically router O&M. These R&D
efforts have already produced standards for router O&M. This is also
an area in which vendor creativity can make a significant
contribution.
10.2 Router Initialization
10.2.1 Minimum Router Configuration
There exists a minimum set of conditions that must be satisfied
before a router may forward packets. A router MUST NOT enable
forwarding on any physical interface unless either:
(1) The router knows the IP address and associated subnet mask or
network prefix length of at least one logical interface
associated with that physical interface, or
(2) The router knows that the interface is an unnumbered interface
and knows its router-id.
These parameters MUST be explicitly configured:
o A router MUST NOT use factory-configured default values for its IP
addresses, prefix lengths, or router-id, and
o A router MUST NOT assume that an unconfigured interface is an
unnumbered interface.
DISCUSSION
There have been instances in which routers have been shipped with
vendor-installed default addresses for interfaces. In a few
cases, this has resulted in routers advertising these default
addresses into active networks.
10.2.2 Address and Prefix Initialization
A router MUST allow its IP addresses and their address masks or
prefix lengths to be statically configured and saved in non-volatile
storage.
A router MAY obtain its IP addresses and their corresponding address
masks dynamically as a side effect of the system initialization
process (see Section 10.2.3]);
If the dynamic method is provided, the choice of method to be used in
a particular router MUST be configurable.
As was described in Section [4.2.2.11], IP addresses are not
permitted to have the value 0 or -1 in the <Host-number> or
<Network-prefix> fields. Therefore, a router SHOULD NOT allow an IP
address or address mask to be set to a value that would make any of
the these fields above have the value zero or -1.
DISCUSSION
It is possible using arbitrary address masks to create situations
in which routing is ambiguous (i.e., two routes with different but
equally specific subnet masks match a particular destination
address). This is one of the strongest arguments for the use of
network prefixes, and the reason the use of discontiguous subnet
masks is not permitted.
A router SHOULD make the following checks on any address mask it
installs:
o The mask is neither all ones nor all zeroes (the prefix length is
neither zero nor 32).
o The bits which correspond to the network prefix part of the address
are all set to 1.
o The bits that correspond to the network prefix are contiguous.
DISCUSSION
The masks associated with routes are also sometimes called subnet
masks, this test should not be applied to them.
10.2.3 Network Booting using BOOTP and TFTP
There has been much discussion of how routers can and should be
booted from the network. These discussions have revolved around
BOOTP and TFTP. Currently, there are routers that boot with TFTP
from the network. There is no reason that BOOTP could not be used
for locating the server that the boot image should be loaded from.
BOOTP is a protocol used to boot end systems, and requires some
stretching to accommodate its use with routers. If a router is using
BOOTP to locate the current boot host, it should send a BOOTP Request
with its hardware address for its first interface, or, if it has been
previously configured otherwise, with either another interface's
hardware address, or another number to put in the hardware address
field of the BOOTP packet. This is to allow routers without hardware
addresses (like synchronous line only routers) to use BOOTP for
bootload discovery. TFTP can then be used to retrieve the image
found in the BOOTP Reply. If there are no configured interfaces or
numbers to use, a router MAY cycle through the interface hardware
addresses it has until a match is found by the BOOTP server.
A router SHOULD IMPLEMENT the ability to store parameters learned
through BOOTP into local non-volatile storage. A router MAY
implement the ability to store a system image loaded over the network
into local stable storage.
A router MAY have a facility to allow a remote user to request that
the router get a new boot image. Differentiation should be made
between getting the new boot image from one of three locations: the
one included in the request, from the last boot image server, and
using BOOTP to locate a server.
10.3 Operation and Maintenance
10.3.1 Introduction
There is a range of possible models for performing O&M functions on a
router. At one extreme is the local-only model, under which the O&M
functions can only be executed locally (e.g., from a terminal plugged
into the router machine). At the other extreme, the fully remote
model allows only an absolute minimum of functions to be performed
locally (e.g., forcing a boot), with most O&M being done remotely
from the NOC. There are intermediate models, such as one in which
NOC personnel can log into the router as a host, using the Telnet
protocol, to perform functions that can also be invoked locally. The
local-only model may be adequate in a few router installations, but
remote operation from a NOC is normally required, and therefore
remote O&M provisions are required for most routers.
Remote O&M functions may be exercised through a control agent
(program). In the direct approach, the router would support remote
O&M functions directly from the NOC using standard Internet protocols
(e.g., SNMP, UDP or TCP); in the indirect approach, the control agent
would support these protocols and control the router itself using
proprietary protocols. The direct approach is preferred, although
either approach is acceptable. The use of specialized host hardware
and/or software requiring significant additional investment is
discouraged; nevertheless, some vendors may elect to provide the
control agent as an integrated part of the network in which the
routers are a part. If this is the case, it is required that a means
be available to operate the control agent from a remote site using
Internet protocols and paths and with equivalent functionality with
respect to a local agent terminal.
It is desirable that a control agent and any other NOC software tools
that a vendor provides operate as user programs in a standard
operating system. The use of the standard Internet protocols UDP and
TCP for communicating with the routers should facilitate this.
Remote router monitoring and (especially) remote router control
present important access control problems that must be addressed.
Care must also be taken to ensure control of the use of router
resources for these functions. It is not desirable to let router
monitoring take more than some limited fraction of the router CPU
time, for example. On the other hand, O&M functions must receive
priority so they can be exercised when the router is congested, since
often that is when O&M is most needed.
10.3.2 Out Of Band Access
Routers MUST support Out-Of-Band (OOB) access. OOB access SHOULD
provide the same functionality as in-band access. This access SHOULD
implement access controls, to prevent unauthorized access.
DISCUSSION
This Out-Of-Band access will allow the NOC a way to access
isolated routers during times when network access is not
available.
Out-Of-Band access is an important management tool for the network
administrator. It allows the access of equipment independent of
the network connections. There are many ways to achieve this
access. Whichever one is used it is important that the access is
independent of the network connections. An example of Out-Of-Band
access would be a serial port connected to a modem that provides
dial up access to the router.
It is important that the OOB access provides the same
functionality as in-band access. In-band access, or accessing
equipment through the existing network connection, is limiting,
because most of the time, administrators need to reach equipment
to figure out why it is unreachable. In band access is still very
important for configuring a router, and for troubleshooting more
subtle problems.
10.3.2 Router O&M Functions
10.3.2.1 Maintenance - Hardware Diagnosis
Each router SHOULD operate as a stand-alone device for the purposes
of local hardware maintenance. Means SHOULD be available to run
diagnostic programs at the router site using only on-site tools. A
router SHOULD be able to run diagnostics in case of a fault. For
suggested hardware and software diagnostics see Section [10.3.3].
10.3.2.2 Control - Dumping and Rebooting
A router MUST include both in-band and out-of-band mechanisms to
allow the network manager to reload, stop, and restart the router. A
router SHOULD also contain a mechanism (such as a watchdog timer)
which will reboot the router automatically if it hangs due to a
software or hardware fault.
A router SHOULD IMPLEMENT a mechanism for dumping the contents of a
router's memory (and/or other state useful for vendor debugging after
a crash), and either saving them on a stable storage device local to
the router or saving them on another host via an up-line dump
mechanism such as TFTP (see [OPER:2], [INTRO:3]).
10.3.2.3 Control - Configuring the Router
Every router has configuration parameters that may need to be set.
It SHOULD be possible to update the parameters without rebooting the
router; at worst, a restart MAY be required. There may be cases when
it is not possible to change parameters without rebooting the router
(for instance, changing the IP address of an interface). In these
cases, care should be taken to minimize disruption to the router and
the surrounding network.
There SHOULD be a way to configure the router over the network either
manually or automatically. A router SHOULD be able to upload or
download its parameters from a host or another router. A means
SHOULD be provided, either as an application program or a router
function, to convert between the parameter format and a human-
editable format. A router SHOULD have some sort of stable storage
for its configuration. A router SHOULD NOT believe protocols such as
RARP, ICMP Address Mask Reply, and MAY not believe BOOTP.
DISCUSSION
It is necessary to note here that in the future RARP, ICMP Address
Mask Reply, BOOTP and other mechanisms may be needed to allow a
router to auto-configure. Although routers may in the future be
able to configure automatically, the intent here is to discourage
this practice in a production environment until auto-configuration
has been tested more thoroughly. The intent is NOT to discourage
auto-configuration all together. In cases where a router is
expected to get its configuration automatically it may be wise to
allow the router to believe these things as it comes up and then
ignore them after it has gotten its configuration.
10.3.2.4 Net Booting of System Software
A router SHOULD keep its system image in local non-volatile
storage such as PROM, NVRAM, or disk. It MAY also be able to load
its system software over the network from a host or another
router.
A router that can keep its system image in local non-volatile
storage MAY be configurable to boot its system image over the
network. A router that offers this option SHOULD be configurable
to boot the system image in its non-volatile local storage if it
is unable to boot its system image over the network.
DISCUSSION
It is important that the router be able to come up and run on its
own. NVRAM may be a particular solution for routers used in large
networks, since changing PROMs can be quite time consuming for a
network manager responsible for numerous or geographically
dispersed routers. It is important to be able to netboot the
system image because there should be an easy way for a router to
get a bug fix or new feature more quickly than getting PROMs
installed. Also if the router has NVRAM instead of PROMs, it will
netboot the image and then put it in NVRAM.
Routers SHOULD perform some basic consistency check on any image
loaded, to detect and perhaps prevent incorrect images.
A router MAY also be able to distinguish between different
configurations based on which software it is running. If
configuration commands change from one software version to another,
it would be helpful if the router could use the configuration that
was compatible with the software.
10.3.2.5 Detecting and responding to misconfiguration
There MUST be mechanisms for detecting and responding to
misconfigurations. If a command is executed incorrectly, the router
SHOULD give an error message. The router SHOULD NOT accept a poorly
formed command as if it were correct.
DISCUSSION
There are cases where it is not possible to detect errors: the
command is correctly formed, but incorrect with respect to the
network. This may be detected by the router, but may not be
possible.
Another form of misconfiguration is misconfiguration of the network
to which the router is attached. A router MAY detect
misconfigurations in the network. The router MAY log these findings
to a file, either on the router or a host, so that the network
manager will see that there are possible problems on the network.
DISCUSSION
Examples of such misconfigurations might be another router with
the same address as the one in question or a router with the wrong
address mask. If a router detects such problems it is probably
not the best idea for the router to try to fix the situation.
That could cause more harm than good.
10.3.2.6 Minimizing Disruption
Changing the configuration of a router SHOULD have minimal affect on
the network. Routing tables SHOULD NOT be unnecessarily flushed when
a simple change is made to the router. If a router is running
several routing protocols, stopping one routing protocol SHOULD NOT
disrupt other routing protocols, except in the case where one network
is learned by more than one routing protocol.
DISCUSSION
It is the goal of a network manager to run a network so that users
of the network get the best connectivity possible. Reloading a
router for simple configuration changes can cause disruptions in
routing and ultimately cause disruptions to the network and its
users. If routing tables are unnecessarily flushed, for instance,
the default route will be lost as well as specific routes to sites
within the network. This sort of disruption will cause
significant downtime for the users. It is the purpose of this
section to point out that whenever possible, these disruptions
should be avoided.
10.3.2.7 Control - Troubleshooting Problems
(1) A router MUST provide in-band network access, but (except as
required by Section [8.2]) for security considerations this
access SHOULD be disabled by default. Vendors MUST document
the default state of any in-band access. This access SHOULD
implement access controls, to prevent unauthorized access.
DISCUSSION
In-band access primarily refers to access through the normal
network protocols that may or may not affect the permanent
operational state of the router. This includes, but is not
limited to Telnet/RLOGIN console access and SNMP operations.
This was a point of contention between the operational out of the
box and secure out of The box contingents. Any automagic access
to the router may introduce insecurities, but it may be more
important for the customer to have a router that is accessible
over the network as soon as it is plugged in. At least one vendor
supplies routers without any external console access and depends
on being able to access the router through the network to complete
its configuration.
It is the vendors call whether in-band access is enabled by
default; but it is also the vendor's responsibility to make its
customers aware of possible insecurities.
(2) A router MUST provide the ability to initiate an ICMP echo.
The following options SHOULD be implemented:
o Choice of data patterns
o Choice of packet size
o Record route
and the following additional options MAY be implemented:
o Loose source route
o Strict source route
o Timestamps
(3) A router SHOULD provide the ability to initiate a traceroute.
If traceroute is provided, then the 3rd party traceroute
SHOULD be implemented.
Each of the above three facilities (if implemented) SHOULD have
access restrictions placed on it to prevent its abuse by unauthorized
persons.
10.4 Security Considerations
10.4.1 Auditing and Audit Trails
Auditing and billing are the bane of the network operator, but are
the two features most requested by those in charge of network
security and those who are responsible for paying the bills. In the
context of security, auditing is desirable if it helps you keep your
network working and protects your resources from abuse, without
costing you more than those resources are worth.
(1) Configuration Changes
Router SHOULD provide a method for auditing a configuration
change of a router, even if it's something as simple as
recording the operator's initials and time of change.
DISCUSSION
Configuration change logging (who made a configuration change,
what was changed, and when) is very useful, especially when
traffic is suddenly routed through Alaska on its way across town.
So is the ability to revert to a previous configuration.
(2) Packet Accounting
Vendors should strongly consider providing a system for
tracking traffic levels between pairs of hosts or networks.
A mechanism for limiting the collection of this information
to specific pairs of hosts or networks is also strongly
encouraged.
DISCUSSION
A host traffic matrix as described above can give the network
operator a glimpse of traffic trends not apparent from other
statistics. It can also identify hosts or networks that are
probing the structure of the attached networks - e.g., a single
external host that tries to send packets to every IP address in
the network address range for a connected network.
(3) Security Auditing
Routers MUST provide a method for auditing security related
failures or violations to include:
o Authorization Failures: bad passwords, invalid SNMP
communities, invalid authorization tokens,
o Violations of Policy Controls: Prohibited Source Routes,
Filtered Destinations, and
o Authorization Approvals: good passwords - Telnet in-band
access, console access.
Routers MUST provide a method of limiting or disabling such
auditing but auditing SHOULD be on by default. Possible
methods for auditing include listing violations to a console
if present, logging or counting them internally, or logging
them to a remote security server through the SNMP trap
mechanism or the Unix logging mechanism as appropriate. A
router MUST implement at least one of these reporting
mechanisms - it MAY implement more than one.
10.4.2 Configuration Control
A vendor has a responsibility to use good configuration control
practices in the creation of the software/firmware loads for their
routers. In particular, if a vendor makes updates and loads
available for retrieval over the Internet, the vendor should also
provide a way for the customer to confirm the load is a valid one,
perhaps by the verification of a checksum over the load.
DISCUSSION
Many vendors currently provide short notice updates of their
software products through the Internet. This a good trend and
should be encouraged, but provides a point of vulnerability in the
configuration control process.
If a vendor provides the ability for the customer to change the
configuration parameters of a router remotely, for example through a
Telnet session, the ability to do so SHOULD be configurable and
SHOULD default to off. The router SHOULD require valid
authentication before permitting remote reconfiguration. This
authentication procedure SHOULD NOT transmit the authentication
secret over the network. For example, if telnet is implemented, the
vendor SHOULD IMPLEMENT Kerberos, S-Key, or a similar authentication
procedure.
DISCUSSION
Allowing your properly identified network operator to twiddle with
your routers is necessary; allowing anyone else to do so is
foolhardy.
A router MUST NOT have undocumented back door access and master
passwords. A vendor MUST ensure any such access added for purposes
of debugging or product development are deleted before the product is
distributed to its customers.
DISCUSSION
A vendor has a responsibility to its customers to ensure they are
aware of the vulnerabilities present in its code by intention -
e.g., in-band access. Trap doors, back doors and master passwords
intentional or unintentional can turn a relatively secure router
into a major problem on an operational network. The supposed
operational benefits are not matched by the potential problems.
11. REFERENCES
Implementors should be aware that Internet protocol standards are
occasionally updated. These references are current as of this
writing, but a cautious implementor will always check a recent
version of the RFCindex to ensure that an RFChas not been updated
or superseded by another, more recent RFC. Reference [INTRO:6]
explains various ways to obtain a current RFCindex.
APPL:1.
Croft, B., and J. Gilmore, "Bootstrap Protocol (BOOTP)", RFC
951, Stanford University, Sun Microsystems, September 1985.
APPL:2.
Alexander, S., and R. Droms, "DHCP Options and BOOTP Vendor
Extensions", RFC1533, Lachman Technology, Inc., Bucknell
University, October 1993.
APPL:3.
Wimer, W., "Clarifications and Extensions for the Bootstrap
Protocol", RFC1542, Carnegie Mellon University, October 1993.
ARCH:1.
DDN Protocol Handbook, NIC-50004, NIC-50005, NIC-50006 (three
volumes), DDN Network Information Center, SRI International,
Menlo Park, California, USA, December 1985.
ARCH:2.
V. Cerf and R. Kahn, "A Protocol for Packet Network
Intercommunication", IEEE Transactions on Communication, May
1974. Also included in [ARCH:1].
ARCH:3.
J. Postel, C. Sunshine, and D. Cohen, "The ARPA Internet
Protocol", Computer Networks, volume 5, number 4, July 1981.
Also included in [ARCH:1].
ARCH:4.
B. Leiner, J. Postel, R. Cole, and D. Mills, :The DARPA
Internet Protocol Suite", Proceedings of INFOCOM '85, IEEE,
Washington, DC, March 1985. Also in: IEEE Communications
Magazine, March 1985. Also available from the Information
Sciences Institute, University of Southern California as
Technical Report ISI-RS-85-153.
ARCH:5.
D. Comer, "Internetworking With TCP/IP Volume 1: Principles,
Protocols, and Architecture", Prentice Hall, Englewood Cliffs,
NJ, 1991.
ARCH:6.
W. Stallings, "Handbook of Computer-Communications Standards
Volume 3: The TCP/IP Protocol Suite", Macmillan, New York, NY,
1990.
ARCH:7.
Postel, J., "Internet Official Protocol Standards", STD 1, RFC
1780, Internet Architecture Board, March 1995.
ARCH:8.
Information processing systems - Open Systems Interconnection -
Basic Reference Model, ISO 7489, International Standards
Organization, 1984.
ARCH:9
R. Braden, J. Postel, Y. Rekhter, "Internet Architecture
Extensions for Shared Media", 05/20/1994
FORWARD:1.
IETF CIP Working Group (C. Topolcic, Editor), "Experimental
Internet Stream Protocol", Version 2 (ST-II), RFC1190, October
1990.
FORWARD:2.
Mankin, A., and K. Ramakrishnan, Editors, "Gateway Congestion
Control Survey", RFC1254, MITRE, Digital Equipment Corporation,
August 1991.
FORWARD:3.
J. Nagle, "On Packet Switches with Infinite Storage", IEEE
Transactions on Communications, volume COM-35, number 4, April
1987.
FORWARD:4.
R. Jain, K. Ramakrishnan, and D. Chiu, "Congestion Avoidance
in Computer Networks With a Connectionless Network Layer",
Technical Report DEC-TR-506, Digital Equipment Corporation.
FORWARD:5.
V. Jacobson, "Congestion Avoidance and Control", Proceedings of
SIGCOMM '88, Association for Computing Machinery, August 1988.
FORWARD:6.
W. Barns, "Precedence and Priority Access Implementation for
Department of Defense Data Networks", Technical Report MTR-
91W00029, The Mitre Corporation, McLean, Virginia, USA, July
1991.
FORWARD:7
Fang, Chen, Hutchins, "Simulation Results of TCP Performance
over ATM with and without Flow Control", presentation to the ATM
Forum, November 15, 1993.
FORWARD:8
V. Paxson, S. Floyd "Wide Area Traffic: the Failure of Poisson
Modeling", short version in SIGCOMM '94.
FORWARD:9
Leland, TaQQu, Willinger and Wilson, "On the Self-Similar Nature
of Ethernet Traffic", Proceedings of SIGCOMM '93, September,
1993.
FORWARD:10
S. Keshav "A Control Theoretic Approach to Flow Control",
SIGCOMM 91, pages 3-16
FORWARD:11
K.K. Ramakrishnan and R. Jain, "A Binary Feedback Scheme for
Congestion Avoidance in Computer Networks", ACM Transactions of
Computer Systems, volume 8, number 2, 1980.
FORWARD:12
H. Kanakia, P. Mishara, and A. Reibman]. "An adaptive
congestion control scheme for real-time packet video transport",
In Proceedings of ACM SIGCOMM 1994, pages 20-31, San Francisco,
California, September 1993.
FORWARD:13
A. Demers, S. Keshav, S. Shenker, "Analysis and Simulation of
a Fair Queuing Algorithm",
93 pages 1-12
FORWARD:14
Clark, D., Shenker, S., and L. Zhang, "Supporting Real-Time
Applications in an Integrated Services Packet Network:
Architecture and Mechanism", 92 pages 14-26
INTERNET:1.
Postel, J., "Internet Protocol", STD 5, RFC791, USC/Information
Sciences Institute, September 1981.
INTERNET:2.
Mogul, J., and J. Postel, "Internet Standard Subnetting
Procedure", STD 5, RFC950, Stanford, USC/Information Sciences
Institute, August 1985.
INTERNET:3.
Mogul, J., "Broadcasting Internet Datagrams in the Presence of
Subnets", STD 5, RFC922, Stanford University, October 1984.
INTERNET:4.
Deering, S., "Host Extensions for IP Multicasting", STD 5, RFC
1112, Stanford University, August 1989.
INTERNET:5.
Kent, S., "U.S. Department of Defense Security Options for the
Internet Protocol", RFC1108, BBN Communications, November 1991.
INTERNET:6.
Braden, R., Borman, D., and C. Partridge, "Computing the
Internet Checksum", RFC1071, USC/Information Sciences
Institute, Cray Research, BBN Communications, September 1988.
INTERNET:7.
Mallory T., and A. Kullberg, "Incremental Updating of the
Internet Checksum", RFC1141, BBN Communications, January 1990.
INTERNET:8.
Postel, J., "Internet Control Message Protocol", STD 5, RFC792,
USC/Information Sciences Institute, September 1981.
INTERNET:9.
A. Mankin, G. Hollingsworth, G. Reichlen, K. Thompson, R.
Wilder, and R. Zahavi, "Evaluation of Internet Performance -
FY89", Technical Report MTR-89W00216, MITRE Corporation,
February, 1990.
INTERNET:10.
G. Finn, A "Connectionless Congestion Control Algorithm",
Computer Communications Review, volume 19, number 5, Association
for Computing Machinery, October 1989.
INTERNET:11.
Prue, W., and J. Postel, "The Source Quench Introduced Delay
(SQuID)", RFC1016, USC/Information Sciences Institute, August
1987.
INTERNET:12.
McKenzie, A., "Some comments on SQuID", RFC1018, BBN Labs,
August 1987.
INTERNET:13.
Deering, S., "ICMP Router Discovery Messages", RFC1256, Xerox
PARC, September 1991.
INTERNET:14.
Mogul J., and S. Deering, "Path MTU Discovery", RFC1191,
DECWRL, Stanford University, November 1990.
INTERNET:15
Fuller, V., Li, T., Yu, J., and K. Varadhan, "Classless Inter-
Domain Routing (CIDR): an Address Assignment and Aggregation
Strategy" RFC1519, BARRNet, cisco, Merit, OARnet, September
1993.
INTERNET:16
St. Johns, M., "Draft Revised IP Security Option", RFC1038,
IETF, January 1988.
INTERNET:17
Prue, W., and J. Postel, "Queuing Algorithm to Provide Type-
of-service For IP Links", RFC1046, USC/Information Sciences
Institute, February 1988.
INTERNET:18
Postel, J., "Address Mappings", RFC796, USC/Information
Sciences Institute, September 1981.
INTRO:1.
Braden, R., and J. Postel, "Requirements for Internet
Gateways", STD 4, RFC1009, USC/Information Sciences Institute,
June 1987.
INTRO:2.
Internet Engineering Task Force (R. Braden, Editor),
"Requirements for Internet Hosts - Communication Layers", STD 3,
RFC1122, USC/Information Sciences Institute, October 1989.
INTRO:3.
Internet Engineering Task Force (R. Braden, Editor),
"Requirements for Internet Hosts - Application and Support", STD
3, RFC1123, USC/Information Sciences Institute, October 1989.
INTRO:4.
Clark, D., "Modularity and Efficiency in Protocol
Implementations", RFC817, MIT Laboratory for Computer Science,
July 1982.
INTRO:5.
Clark, D., "The Structuring of Systems Using Upcalls",
Proceedings of 10th ACM SOSP, December 1985.
INTRO:6.
Jacobsen, O., and J. Postel, "Protocol Document Order
Information", RFC980, SRI, USC/Information Sciences Institute,
March 1986.
INTRO:7.
Reynolds, J., and J. Postel, "Assigned Numbers", STD 2, RFC
1700, USC/Information Sciences Institute, October 1994. This
document is periodically updated and reissued with a new number.
It is wise to verify occasionally that the version you have is
still current.
INTRO:8.
DoD Trusted Computer System Evaluation Criteria, DoD publication
5200.28-STD, U.S. Department of Defense, December 1985.
INTRO:9
Malkin, G., and T. LaQuey Parker, Editors, "Internet Users'
Glossary", FYI 18, RFC1392, Xylogics, Inc., UTexas, January
1993.
LINK:1.
Leffler, S., and M. Karels, "Trailer Encapsulations", RFC893,
University of California at Berkeley, April 1984.
LINK:2
Simpson, W., "The Point-to-Point Protocol (PPP)", STD 51, RFC
1661, Daydreamer July 1994.
LINK:3
McGregor, G., "The PPP Internet Protocol Control Protocol
(IPCP)", RFC1332, Merit May 1992.
LINK:4
Lloyd, B., and W. Simpson, "PPP Authentication Protocols", RFC
1334, L&A, Daydreamer, May 1992.
LINK:5
Simpson, W., "PPP Link Quality Monitoring", RFC1333,
Daydreamer, May 1992.
MGT:1.
Rose, M., and K. McCloghrie, "Structure and Identification of
Management Information of TCP/IP-based Internets", STD 16, RFC
1155, Performance Systems International, Hughes LAN Systems, May
1990.
MGT:2.
McCloghrie, K., and M. Rose (Editors), "Management Information
Base of TCP/IP-Based Internets: MIB-II", STD 16, RFC1213,
Hughes LAN Systems, Inc., Performance Systems International,
March 1991.
MGT:3.
Case, J., Fedor, M., Schoffstall, M., and J. Davin, "Simple
Network Management Protocol", STD 15, RFC1157, SNMP Research,
Performance Systems International, MIT Laboratory for Computer
Science, May 1990.
MGT:4.
Rose, M., and K. McCloghrie (Editors), "Towards Concise MIB
Definitions", STD 16, RFC1212, Performance Systems
International, Hughes LAN Systems, March 1991.
MGT:5.
Steinberg, L., "Techniques for Managing Asynchronously Generated
Alerts", RFC1224, IBM Corporation, May 1991.
MGT:6.
Kastenholz, F., "Definitions of Managed Objects for the
Ethernet-like Interface Types", RFC1398, FTP Software, Inc.,
January 1993.
MGT:7.
McCloghrie, K., and R. Fox "IEEE 802.4 Token Bus MIB", RFC1230,
Hughes LAN Systems, Inc., Synoptics, Inc., May 1991.
MGT:8.
McCloghrie, K., Fox R., and E. Decker, "IEEE 802.5 Token Ring
MIB", RFC1231, Hughes LAN Systems, Inc., Synoptics, Inc., cisco
Systems, Inc., February 1993.
MGT:9.
Case, J., and A. Rijsinghani, "FDDI Management Information
Base", RFC1512, The University of Tennesse and SNMP Research,
Digital Equipment Corporation, September 1993.
MGT:10.
Stewart, B., Editor "Definitions of Managed Objects for RS-232-
like Hardware Devices", RFC1317, Xyplex, Inc., April 1992.
MGT:11.
Kastenholz, F., "Definitions of Managed Objects for the Link
Control Protocol of the Point-to-Point Protocol", RFC1471, FTP
Software, Inc., June 1992.
MGT:12.
Kastenholz, F., "The Definitions of Managed Objects for the
Security Protocols of the Point-to-Point Protocol", RFC1472,
FTP Software, Inc., June 1992.
MGT:13.
Kastenholz, F., "The Definitions of Managed Objects for the IP
Network Control Protocol of the Point-to-Point Protocol", RFC
1473, FTP Software, Inc., June 1992.
MGT:14.
Baker, F., and R. Coltun, "OSPF Version 2 Management
Information Base", RFC1253, ACC, Computer Science Center,
August 1991.
MGT:15.
Willis, S., and J. Burruss, "Definitions of Managed Objects for
the Border Gateway Protocol (Version 3)", RFC1269, Wellfleet
Communications Inc., October 1991.
MGT:16.
Baker, F., and J. Watt, "Definitions of Managed Objects for the
DS1 and E1 Interface Types", RFC1406, Advanced Computer
Communications, Newbridge Networks Corporation, January 1993.
MGT:17.
Cox, T., and K. Tesink, Editors "Definitions of Managed Objects
for the DS3/E3 Interface Types", RFC1407, Bell Communications
Research, January 1993.
MGT:18.
McCloghrie, K., "Extensions to the Generic-Interface MIB", RFC
1229, Hughes LAN Systems, August 1992.
MGT:19.
Cox, T., and K. Tesink, "Definitions of Managed Objects for the
SIP Interface Type", RFC1304, Bell Communications Research,
February 1992.
MGT:20
Baker, F., "IP Forwarding Table MIB", RFC1354, ACC, July 1992.
MGT:21.
Malkin, G., and F. Baker, "RIP Version 2 MIB Extension", RFC
1724, Xylogics, Inc., Cisco Systems, November 1994
MGT:22.
Throop, D., "SNMP MIB Extension for the X.25 Packet Layer", RFC
1382, Data General Corporation, November 1992.
MGT:23.
Throop, D., and F. Baker, "SNMP MIB Extension for X.25 LAPB",
RFC1381, Data General Corporation, ACC, November 1992.
MGT:24.
Throop, D., and F. Baker, "SNMP MIB Extension for MultiProtocol
Interconnect over X.25", RFC1461, Data General Corporation, May
1993.
MGT:25.
Rose, M., "SNMP over OSI", RFC1418, Dover Beach Consulting,
Inc., March 1993.
MGT:26.
Minshall, G., and M. Ritter, "SNMP over AppleTalk", RFC1419,
Novell, Inc., Apple Computer, Inc., March 1993.
MGT:27.
Bostock, S., "SNMP over IPX", RFC1420, Novell, Inc., March
1993.
MGT:28.
Schoffstall, M., Davin, C., Fedor, M., and J. Case, "SNMP over
Ethernet", RFC1089, Rensselaer Polytechnic Institute, MIT
Laboratory for Computer Science, NYSERNet, Inc., University of
Tennessee at Knoxville, February 1989.
MGT:29.
Case, J., "FDDI Management Information Base", RFC1285, SNMP
Research, Incorporated, January 1992.
OPER:1.
Nagle, J., "Congestion Control in IP/TCP Internetworks", RFC
896, FACC, January 1984.
OPER:2.
Sollins, K., "TFTP Protocol (revision 2)", RFC1350, MIT, July
1992.
ROUTE:1.
Moy, J., "OSPF Version 2", RFC1583, Proteon, March 1994.
ROUTE:2.
Callon, R., "Use of OSI IS-IS for Routing in TCP/IP and Dual
Environments", RFC1195, DEC, December 1990.
ROUTE:3.
Hedrick, C., "Routing Information Protocol", RFC1058, Rutgers
University, June 1988.
ROUTE:4.
Lougheed, K., and Y. Rekhter, "A Border Gateway Protocol 3
(BGP-3)", RFC1267, cisco, T.J. Watson Research Center, IBM
Corp., October 1991.
ROUTE:5.
Gross, P, and Y. Rekhter, "Application of the Border Gateway
Protocol in the Internet", RFC1772, T.J. Watson Research
Center, IBM Corp., MCI, March 1995.
ROUTE:6.
Mills, D., "Exterior Gateway Protocol Formal Specification", RFC
904, UDEL, April 1984.
ROUTE:7.
Rosen, E., "Exterior Gateway Protocol (EGP)", RFC827, BBN,
October 1982.
ROUTE:8.
Seamonson, L, and E. Rosen, "STUB" "Exterior Gateway Protocol",
RFC888, BBN, January 1984.
ROUTE:9.
Waitzman, D., Partridge, C., and S. Deering, "Distance Vector
Multicast Routing Protocol", RFC1075, BBN, Stanford, November
1988.
ROUTE:10.
Deering, S., Multicast Routing in Internetworks and Extended
LANs, Proceedings of '88, Association for Computing Machinery,
August 1988.
ROUTE:11.
Almquist, P., "Type of Service in the Internet Protocol Suite",
RFC1349, Consultant, July 1992.
ROUTE:12.
Rekhter, Y., "Experience with the BGP Protocol", RFC1266, T.J.
Watson Research Center, IBM Corp., October 1991.
ROUTE:13.
Rekhter, Y., "BGP Protocol Analysis", RFC1265, T.J. Watson
Research Center, IBM Corp., October 1991.
TRANS:1.
Postel, J., "User Datagram Protocol", STD 6, RFC768,
USC/Information Sciences Institute, August 1980.
TRANS:2.
Postel, J., "Transmission Control Protocol", STD 7, RFC793,
USC/Information Sciences Institute, September 1981.
APPENDIX A. REQUIREMENTS FOR SOURCE-ROUTING HOSTS
Subject to restrictions given below, a host MAY be able to act as an
intermediate hop in a source route, forwarding a source-routed
datagram to the next specified hop.