Re: [netmod] draft-kwatsen-netconf-server / VRF specification for listening ports & outgoing connections

Martin Bjorklund <mbj@tail-f.com> Wed, 05 March 2014 16:32 UTC

Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F0AB21A01BF; Wed, 5 Mar 2014 08:32:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.448
X-Spam-Level:
X-Spam-Status: No, score=-2.448 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.547, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9oxznD2I3Lf4; Wed, 5 Mar 2014 08:31:59 -0800 (PST)
Received: from mail.tail-f.com (mail.tail-f.com [109.74.15.94]) by ietfa.amsl.com (Postfix) with ESMTP id C4CAB1A01A7; Wed, 5 Mar 2014 08:31:58 -0800 (PST)
Received: from localhost (dhcp-83db.meeting.ietf.org [31.133.131.219]) by mail.tail-f.com (Postfix) with ESMTPSA id A442C37C2BC; Wed, 5 Mar 2014 17:31:54 +0100 (CET)
Date: Wed, 05 Mar 2014 16:31:54 +0000
Message-Id: <20140305.163154.391777655.mbj@tail-f.com>
To: equinox@diac24.net
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <20140303140039.GZ856433@jupiter.n2.diac24.net>
References: <20140303140039.GZ856433@jupiter.n2.diac24.net>
X-Mailer: Mew version 6.5 on Emacs 23.4 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/netmod/CrUulRrry-Y31SKQSVabubMYHi8
Cc: netconf@ietf.org, netmod@ietf.org
Subject: Re: [netmod] draft-kwatsen-netconf-server / VRF specification for listening ports & outgoing connections
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Mar 2014 16:32:01 -0000

Hi,

David Lamparter <equinox@diac24.net> wrote:
> Hi,
> 
> 
> (this is the mail version of the somewhat garbled comment on the mic)
> 
> The original question was, how the configured device chooses a "VPN"
> for
> either incoming or outgoing connections.  This referred to VRF
> instances.  In particular, for the very simplest case where this
> matters, there are devices that have out of band management ports and
> treat those as a VRF.  So, both for listening and for connecting, the
> device needs to choose between "VR-Default" and "VR-Mgmt" (actual
> names,
> guess the vendor.)  It could even listen in both VRFs, to be
> manageable
> inband (normal ops maybe?) and out of band (network in flames?).
> 
> Even though this was raised on the server config model, this is a
> rather
> generic problem.  E.g. specifying a NTP or Syslog server has the same
> issue.  (Cc' from netconf to netmod due to this.)

If I understand this correctly, the proposal is to include a reference
to a routing-instance (rt:routing-instance-ref) in all cases where we
currently have an ip-address (or host) and a port, since the
combination of ip-adress and port is not guaranteed to be unique, on
systems with multiple routing instances.

  leaf address          { type inet:ip-address; }
  leaf port             { type inet:port-number; }
  leaf routing-instance { type rt:routing-instance-ref; }


The existsing data models (specifically ietf-system) are designed in a
way that vendors can augment there own definition of routing-instance
or vrf.  (However, I noticed that ietf-snmp is not).

The question is if the IETF models should include a standardized way
to handle this.  I can see three alternatives:

  1)  Do nothing.  I.e., assume ip/port is unique.

  2)  In all our data models, always make sure we add an (optional)
      reference to a routing-instance, whenever we have a ip/port for
      inbound/outbound traffic.

  3)  Do not add the routing-instance references, but design our data
      models so that vendors can augment with this if they have to.


/martin