<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ogondio-opsawg-dmanm-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="DMaNM">An Approach to Expose 'Device Models'-as-'Network Models'</title>
    <seriesInfo name="Internet-Draft" value="draft-ogondio-opsawg-dmanm-00"/>
    <author fullname="Oscar Gonzalez de Dios">
      <organization>Telefonica</organization>
      <address>
        <email>oscar.gonzalezdedios@telefonica.com</email>
      </address>
    </author>
    <author fullname="Victor Lopez">
      <organization>Nokia</organization>
      <address>
        <email>victor.lopez@nokia.com</email>
      </address>
    </author>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2023" month="October" day="23"/>
    <area>Operations and Management</area>
    <workgroup>Operations and Management Area Working Group</workgroup>
    <keyword>Device models</keyword>
    <keyword>Network models</keyword>
    <abstract>
      <?line 45?>

<t>This document describes an approach for exposing Device Models as Network Models (DMaNM). In particular, this document provides guidance for structuring a data model to facilitate the reuse of device models within the customer-facing interface of Software-Defined Networking (SDN) controllers. The objective of this approach is to enhance the reusability of device models in various network scenarios and ease the mapping between network/service models with device models.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://vlopezalvarez.github.io/draft-ogondio-opsawg-dmanm/draft-ogondio-opsawg-dmanm.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ogondio-opsawg-dmanm/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Operations and Management Area Working Group Working Group mailing list (<eref target="mailto:opsawg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/opsawg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/opsawg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/vlopezalvarez/draft-ogondio-opsawg-dmanm"/>.</t>
    </note>
  </front>
  <middle>
    <?line 49?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Network operators need to efficiently manage  network elements throughout their infrastructure. By implementing network-wide management and configuration practices, operators can achieve centralized control and visibility over their network elements. This enables them to streamline operations, monitor performance, and promptly respond to network events. Moreover, network-wide management facilitates the enforcement of standardized policies and configurations, thus ensuring consistent behavior and minimizing the risk of errors or misconfigurations that may result in service disruptions. Additionally, it enables operators to implement proactive actions such as performance optimization, load balancing, and security policies across the entire network, fostering a more secure and efficient infrastructure.</t>
      <t>The ability to reuse device models may play a crucial role in network management. Multiple teams within an organization, such as network engineering, operations, and planning, can benefit from accessing these device models. These models serve as a common language for understanding and configuring network elements, ensuring consistency and interoperability across different teams and systems. The utilization of models from various teams is a key requirement for network operators.</t>
      <t>The IETF has made remarkable progress in defining device models to manage network element capabilities. These device models, often represented using YANG data modeling language, provide a structured, standardized approach to manage various network devices and their features. By leveraging YANG models, network operators can effectively manage the network element functionalities. These models not only streamline network management but also promote interoperability between different vendors and platforms, fostering a more efficient and robust networking ecosystem.</t>
      <t>Some examples of these device models are:</t>
      <ul spacing="normal">
        <li>
          <t>"ietf-routing-policy" <xref target="RFC8349"/>: This YANG model defines a generic data model for managing routing policies that can be applied to various routing protocols. The model provides a framework for creating, modifying, and applying routing policies, which allows defining how routes are selected, filtered, and modified. The "ietf-routing-policy" model covers features like policy definition, policy attachment, route filters, and route actions.</t>
        </li>
        <li>
          <t>"ietf-bgp-policy" <xref target="I-D.ietf-idr-bgp-model"/>: This YANG model defines a data model for the Border Gateway Protocol (BGP). The "ietf-bgp-policy" model is designed to configure and manage BGP routers and sessions, as well as provide a representation of BGP operational state data. The model covers BGP-specific features such as peer configuration, address families, route filters, and route actions. The model is intended to work alongside the "ietf-routing-policy" model to manage BGP routing policies.</t>
        </li>
        <li>
          <t>"ietf-access-list" <xref target="RFC8519"/>: This YANG model provides a data model for configuring and managing network access control lists (ACLs). This model provides a generic structure for representing ACLs, along with the ability to define rules for permitting, denying, or assigning a specific action to matching packets.</t>
        </li>
      </ul>
      <t>Software-Defined Networking (SDN) <xref target="RFC7149"/><xref target="RFC7426"/> controllers facilitate seamless communication and coordination between high-level management systems and the underlying network infrastructure. This arrangement enables efficient translation of network-wide policies and objectives, defined by the Operations Support Systems (OSS), into granular, device-specific configurations and commands for the network elements. A similar concept applies for orchestration scenarios like in network slicing. Consequently, SDN controllers are typically placed as intermediate entities between the OSS and the network elements. <xref target="SDNsce"/> represents this scenario, where the SDN controller exposes its customer-facing interface to the OSS or orchestration layer.</t>
      <figure anchor="SDNsce">
        <name>An Example of SDN Scenario</name>
        <artwork align="center"><![CDATA[
        +-----+  +------+
        | OSS |  | Orch |
        +-----+  +------+
           ^        ^
           |        | Customer-Facing
           v        v    Interface
     +-------------------+
     | SDN Controller(s) |
     +-------------------+
      ^      ^       ^
      |      |       | Network-Facing
      v      v       v    Interface
  +-----+ +-----+ +-----+
  | NE1 | | NE2 | | NE3 |
  +-----+ +-----+ +-----+
]]></artwork>
      </figure>
      <t><xref target="SDNsce"/> illustrates the hierarchical relationship between the OSS, SDN controller and the network elements. Typically, the OSS acts as the central management system responsible for overseeing the entire network. Similarly, an orchestrator acts with a similar role in scenarios like network slicing. The SDN controller, positioned in the middle, acts as an intermediary, facilitating communication and coordination between the OSS and the network elements. At the bottom, the network elements are directly controlled and configured by the SDN controller. This archicture enables efficient translation of high-level network policies into device-specific configurations, ultimately streamlining network management and decoupling the systems from the network evolution.</t>
      <t>Device models were defined to be applicable in the network-facing interface of an SDN controller. As a result, these models do not inherently possess the necessary network concepts to make them directly applicable in the customer-facing interface of the SDN controller.</t>
      <t>Within the scope of the IETF, efforts can be focused on two approaches when it comes to creating network models for device models. The first approach involves creating network models specific to each device model, while the second approach entails developing a generic and reusable structure for all models. This document puts forth a proposal for a reusable structure, aligning with the latter approach.</t>
      <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture (NMDA) defined in <xref target="RFC8342"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <section anchor="terminology-and-notations">
        <name>Terminology and Notations</name>
        <t>The document uses the following terms from <xref target="RFC8309"/> and <xref target="RFC8969"/>:</t>
        <dl>
          <dt>Service Model:</dt>
          <dd>
            <t>Describes a service and the parameters of the service in a portable way that can be used uniformly and independent of the equipment and operating environment.</t>
          </dd>
          <dt/>
          <dd>
            <t>Examples of service models are the L3VPN Service Model (L3SM) <xref target="RFC8299"/> and the L2VPN Service Model (L2SM) <xref target="RFC8466"/>.</t>
          </dd>
          <dt>Network Model:</dt>
          <dd>
            <t>Describes a network-level abstraction (or a subset of aspects of a network infrastructure), including devices and their subsystems, and relevant protocols operating at the link and network layers across multiple devices. This model corresponds to the network configuration model discussed in <xref target="RFC8309"/>. : It can be used by a network operator to allocate resources (e.g., tunnel resource, topology resource) for the service or schedule resources to meet the service requirements defined in a service model.</t>
          </dd>
          <dt/>
          <dd>
            <t>Examples of network models are the L3VPN Network Model (L3NM) <xref target="RFC9182"/> or the L2VPN Network Model (L2NM) <xref target="RFC9291"/>.</t>
          </dd>
          <dt>Device Model:</dt>
          <dd>
            <t>Refers to the Network Element YANG data model described in <xref target="RFC8199"/> or the device configuration model discussed in <xref target="RFC8309"/>.</t>
          </dd>
          <dt/>
          <dd>
            <t>Device models are also used to refer to model a function embedded in a device (e.g., Access Control Lists (ACLs) <xref target="RFC8519"/>).</t>
          </dd>
        </dl>
      </section>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
      <section anchor="prefix-in-data-node-names">
        <name>Prefix in Data Node Names</name>
        <t>In this document, names of data nodes and other data model objects will be prefixed using the standard prefix associated with the corresponding YANG imported modules, as shown in the following table.</t>
        <table anchor="tab-prefixes">
          <name>Prefixes and corresponding YANG modules</name>
          <thead>
            <tr>
              <th align="left">Prefix</th>
              <th align="left">Yang Module</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">ntwdev</td>
              <td align="left">ietf-network-device</td>
              <td align="left">RFCXXX</td>
            </tr>
          </tbody>
        </table>
        <t>RFC Editor Note:
Please replace XXXX with the RFC number assigned to this document. Please remove this note in that case.</t>
      </section>
    </section>
    <section anchor="sample-use-cases">
      <name>Sample Use Cases</name>
      <section anchor="device-config-as-a-service">
        <name>"Device Config"-as-a-Service</name>
        <t>"Device Config"-as-a-Service involves the use of device models by an OSS to configure network elements through an SDN controller. In this scenario, the SDN controller acts as an intermediary between the OSS and the network elements, providing a configuration service for each network element.</t>
        <t>By leveraging device models, the OSS gains a common representation of the network elements' capabilities and configuration parameters. These device models define the desired configuration for specific functions, such as ACLs or routing policies. The OSS utilizes these device models to define the desired configuration for each network element.</t>
        <t>Through an SDN controller, the OSS can send the configuration instructions based on the device models to the respective network elements. The SDN controller translates and applies the configuration, ensuring consistency and correctness across the network. Moreover, the mediation of the SDN controller facilitates the access to the network elements from several users, applications or OSS minimizing the impact on the device.</t>
      </section>
      <section anchor="profiles">
        <name>Profiles</name>
        <t>By leveraging device models, network operators can design profile that represent configurations for specific network functionalities, protocols, or services. These templates serve as reusable building blocks, encapsulating best practices, and ensuring consistency in network configuration and management. Once a profile is created, it can be applied to one or multiple network elements, either individually or in groups, depending on the specific network requirements.</t>
        <t>This approach not only simplifies the configuration process but also reduces the likelihood of errors and misconfigurations, ultimately improving network stability and performance. Moreover, this process facilitates the lifecycle of the configurations enabling updating the profiles and, later, the network elements in a consistent manner across multiple network elements as a network-wide operation.</t>
      </section>
    </section>
    <section anchor="guidelines-to-use-device-models-in-the-customer-facing-interface-of-sdn-controllers">
      <name>Guidelines to Use Device Models in the Customer-facing Interface of SDN Controllers</name>
      <t>This section outlines two key concepts for the guidelines on utilizing device models in the Customer-facing Interface of SDN controllers: (1) groups of network elements and (2) a YANG structure for extending device models to enable network-wide utilization.</t>
      <section anchor="groups-of-network-elements">
        <name>Groups of Network Elements</name>
        <t>The management of groups of network elements is a requirement to cover the previous use cases. It is intended to have a YANG model to tag a group of network elements under the same identifier, so the operator can apply a given configuration to a set of devices. This document defines a module called "ietf-grp-ntw-elements", which provides a structured approach to represent and manage groups of network elements, enabling efficient network management.</t>
        <t>The "ietf-grp-ntw-elements" module defines a YANG model for representing a group of network elements. Within the module, there is a list called "grp-ntw-element" that includes the groups of network elements. Each group is uniquely identified by the "grp-ne-id" leaf, which has a string data type and represents the group's identifier. The "grp-ntw-element" list has a nested list called "ntw-elements" to specify the individual network elements within each group. The "ntw-element" list has a key of "ne-id" to uniquely identify each network element. The "ne-id" leaf represents the identifier of each network element and has a string data type.</t>
        <t><xref target="grp-ntw-elements-tree-st"/> represents the tree of the proposed YANG model. Tree diagrams used in this document follow the notation defined in <xref target="RFC8340"/>.</t>
        <figure anchor="grp-ntw-elements-tree-st">
          <name>Group of Network Elements</name>
          <artwork align="center"><![CDATA[
module: ietf-grp-ntw-elements
  +--rw grp-ntw-element* [grp-ne-id]
     +--rw grp-ne-id       string
     +--rw ntw-element* [ne-id]
        +--rw ne-id    string
]]></artwork>
        </figure>
      </section>
      <section anchor="yang-structure-for-extending-the-models">
        <name>YANG Structure for Extending the Models</name>
        <t>The document proposes a structure to enable the reutilization of the device models in network scenarios. The objective is to create a YANG model with the device model and providing a nested structure to store deployment information for network elements associated with each instance in the list. The guideline is to follow the next structure:</t>
        <ul spacing="normal">
          <li>
            <t>An import of the device model.</t>
          </li>
          <li>
            <t>A container named deployment that includes:</t>
          </li>
          <li>
            <t>A list called "ntw-element" with the following elements:</t>
          </li>
          <li>
            <t>A leaf named "ne-id" of type string that serves as the network element identifier (which is the key).</t>
          </li>
          <li>
            <t>A leaf named "devmod-alias" of type string that serves as the device module alias for the deployment.</t>
          </li>
          <li>
            <t>A list called "grp-ntw-element" with the following elements:  </t>
            <ul spacing="normal">
              <li>
                <t>A leaf named "grp-ne-id" of type string that serves as the network element identifier (which is the key).</t>
              </li>
              <li>
                <t>A leaf named "devmod-alias" of type string that serves as the device module alias for the deployment.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>Let us assume that there is a device model called "foo.yang". The tree of the "foo.yang" model is shown in <xref target="foo-tree-st"/>.</t>
        <figure anchor="foo-tree-st">
          <name>Foo Tree Structure</name>
          <artwork align="center"><![CDATA[
module: foo
  +--rw foo?   empty
]]></artwork>
        </figure>
        <t>This document proposes the creation of a module that consists of a list of instances from the "foo.yang" model. To iterate through the list, a key named "devmod-name" must be defined, which will be a string. Additionally, the new model will import "foo.yang". Lastly, a container called "deployment" will encompass a list of network elements, with each element identified by the "ne-id" and having a "devmod-alias" as an alias for the "devmod-name" configuration in the network element.</t>
        <t>An example of the proposed structure is shown in <xref target="foo-ntwdev-tree-st"/>.</t>
        <figure anchor="foo-ntwdev-tree-st">
          <name>Usage Example for 'foo' Module</name>
          <artwork align="center"><![CDATA[
module: foo-ntwdev
  +--rw devmod-list* [devmod-name]
     +--rw devmod-name    string
     +--rw foo?           -> /foo:foo
     +--rw deployment
        +--rw ntw-element* [ne-id]
        |  +--rw ne-id           string
        |  +--rw devmod-alias?   string
        +--rw grp-ntw-element* [grp-ne-id]
           +--rw grp-ne-id       string
           +--rw devmod-alias?   string
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="dmanm-yang-model">
      <name>DMaNM YANG Model</name>
      <section anchor="groups-of-network-elements-1">
        <name>Groups of Network Elements</name>
        <sourcecode markers="true" name="ietf-grp-ntw-elements@2023-10-23.yang"><![CDATA[

module ietf-grp-ntw-elements {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-grp-ntw-elements";
  prefix "grp";

  organization
    "IETF OPSA (Operations and Management Area) Working Group";
  contact
    "WG Web:  <https://datatracker.ietf.org/wg/opsawg/>
    WG List:  <mailto:opsawg@ietf.org>

    Editor:   Oscar Gonzalez de Dios
              <mailto:oscar.gonzalezdedios@telefonica.com>
    Editor:   Victor Lopez
              <mailto:victor.lopez@nokia.com>
    Editor:   Mohamed Boucadair
              <mailto:mohamed.boucadair@orange.com>";

  description
    "YANG model for group of network elements.

    Copyright (c) 2023 IETF Trust and the persons identified as
    authors of the code.  All rights reserved.

    Redistribution and use in source and binary forms, with or
    without modification, is permitted pursuant to, and subject
    to the license terms contained in, the Revised BSD License
    set forth in Section 4.c of the IETF Trust's Legal Provisions
    Relating to IETF Documents
    (https://trustee.ietf.org/license-info).

    This version of this YANG module is part of RFC xxx; see the
    RFC itself for full legal notices.";

  revision "2023-10-23" {
    description "Initial revision.";
    reference "RFC XXXX: An Approach to Expose 'Device Models'
                         -as-'Network Models'";
  }

  list grp-ntw-element {
    key "grp-ne-id";
    description "List of groups of network elements.";

    leaf grp-ne-id {
      type string;
      description "Group of network element identifier.";
    }

    list ntw-element {
      key "ne-id";
      description "List of network elements.";

      leaf ne-id {
        type string;
        description "Network element identifier.";
      }
    }
  }
}
]]></sourcecode>
      </section>
      <section anchor="usage-example-applying-the-guidelines-to-the-foo-module">
        <name>Usage Example: Applying the Guidelines to The 'foo' Module"</name>
        <artwork><![CDATA[
module foo-ntwdev {
  namespace "urn:example:foo-ntwdev";
  prefix "netdevfoo";

  import foo {
    prefix "foo";
  }

  organization "Example Organization";
  contact "example@example.com";
  description "YANG model for foo-dev.";
  revision "2023-10-23" {
    description "Initial revision.";
    reference "RFC XXXX: YANG Model for foo-dev";
  }

  leaf foo {
    type leafref {
      path "/foo:foo";
    }
    description "Reference to foo leaf from foo.yang";
  }

  container deployment {
    description "Deployment container.";

    list ntw-element {
      key "ne-id";
      description "List of network elements.";

      leaf ne-id {
        type string;
        description "Network element identifier.";
      }
      leaf devmod-alias {
        type string;
        description "Device module alias for the deployment.";
      }
    }

    list grp-ntw-element {
      key "grp-ne-id";
      description "List of group of network elements.";

      leaf grp-ne-id {
        type string;
        description "Group of network element identifier.";
      }
      leaf devmod-alias {
        type string;
        description "Device module alias for the deployment.";
      }
    }
  }
}
]]></artwork>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The YANG module specified in this document defines schema for data that is designed to be accessed via network management protocols such as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS <xref target="RFC8446"/>.</t>
      <t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/> provides the means to restrict access for particular NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.</t>
      <t>There are a number of data nodes defined in this YANG module that are writable/creatable/deletable (i.e., config true, which is the default). These data nodes may be considered sensitive or vulnerable in some network environments. Write operations (e.g., edit-config) and delete operations to these data nodes without proper protection or authentication can have a negative effect on network operations. These are the subtrees and data nodes and their sensitivity/ vulnerability in the "xxx" module:</t>
      <ul spacing="normal">
        <li>
          <t>TBC</t>
        </li>
        <li>
          <t>TBC</t>
        </li>
      </ul>
      <t>Some of the readable data nodes in this YANG module may be considered sensitive or vulnerable in some network environments. It is thus important to control read access (e.g., via get, get-config, or notification) to these data nodes. These are the subtrees and data nodes and their sensitivity/vulnerability in the "ixxx" module:</t>
      <ul spacing="normal">
        <li>
          <t>TBC</t>
        </li>
        <li>
          <t>TBC</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to register the following URI in the "ns" subregistry within the "IETF XML Registry"  <xref target="RFC3688"/>:</t>
      <t>URI:  urn:ietf:params:xml:ns:yang:xxxx
   Registrant Contact:  The IESG.
   XML:  N/A; the requested URI is an XML namespace.</t>
      <t>IANA is requested to register the following YANG module in the "YANG Module Names" registry  <xref target="RFC6020"/> within the "YANG Parameters" registry group.</t>
      <t>Name:  xxx
   Maintained by IANA?  N
   Namespace:  urn:ietf:params:xml:ns:yang:xxx
   Prefix:  xxx
   Reference:  RFC xxxx</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>This section will be used to track the status of the implementations of the model. It is aimed at being removed if the document becomes RFC.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC8349">
        <front>
          <title>A YANG Data Model for Routing Management (NMDA Version)</title>
          <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
          <author fullname="A. Lindem" initials="A." surname="Lindem"/>
          <author fullname="Y. Qu" initials="Y." surname="Qu"/>
          <date month="March" year="2018"/>
          <abstract>
            <t>This document specifies three YANG modules and one submodule. Together, they form the core routing data model that serves as a framework for configuring and managing a routing subsystem. It is expected that these modules will be augmented by additional YANG modules defining data models for control-plane protocols, route filters, and other functions. The core routing data model provides common building blocks for such extensions -- routes, Routing Information Bases (RIBs), and control-plane protocols.</t>
            <t>The YANG modules in this document conform to the Network Management Datastore Architecture (NMDA). This document obsoletes RFC 8022.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8349"/>
        <seriesInfo name="DOI" value="10.17487/RFC8349"/>
      </reference>
      <reference anchor="I-D.ietf-idr-bgp-model">
        <front>
          <title>YANG Model for Border Gateway Protocol (BGP-4)</title>
          <author fullname="Mahesh Jethanandani" initials="M." surname="Jethanandani">
            <organization>Kloud Services</organization>
          </author>
          <author fullname="Keyur Patel" initials="K." surname="Patel">
            <organization>Arrcus</organization>
          </author>
          <author fullname="Susan Hares" initials="S." surname="Hares">
            <organization>Huawei</organization>
          </author>
          <author fullname="Jeffrey Haas" initials="J." surname="Haas">
            <organization>Juniper Networks</organization>
          </author>
          <date day="5" month="July" year="2023"/>
          <abstract>
            <t>   This document defines a YANG data model for configuring and managing
   BGP, including protocol, policy, and operational aspects, such as
   RIB, based on data center, carrier, and content provider operational
   requirements.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-idr-bgp-model-17"/>
      </reference>
      <reference anchor="RFC8519">
        <front>
          <title>YANG Data Model for Network Access Control Lists (ACLs)</title>
          <author fullname="M. Jethanandani" initials="M." surname="Jethanandani"/>
          <author fullname="S. Agarwal" initials="S." surname="Agarwal"/>
          <author fullname="L. Huang" initials="L." surname="Huang"/>
          <author fullname="D. Blair" initials="D." surname="Blair"/>
          <date month="March" year="2019"/>
          <abstract>
            <t>This document defines a data model for Access Control Lists (ACLs). An ACL is a user-ordered set of rules used to configure the forwarding behavior in a device. Each rule is used to find a match on a packet and define actions that will be performed on the packet.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8519"/>
        <seriesInfo name="DOI" value="10.17487/RFC8519"/>
      </reference>
      <reference anchor="RFC7149">
        <front>
          <title>Software-Defined Networking: A Perspective from within a Service Provider Environment</title>
          <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
          <author fullname="C. Jacquenet" initials="C." surname="Jacquenet"/>
          <date month="March" year="2014"/>
          <abstract>
            <t>Software-Defined Networking (SDN) has been one of the major buzz words of the networking industry for the past couple of years. And yet, no clear definition of what SDN actually covers has been broadly admitted so far. This document aims to clarify the SDN landscape by providing a perspective on requirements, issues, and other considerations about SDN, as seen from within a service provider environment.</t>
            <t>It is not meant to endlessly discuss what SDN truly means but rather to suggest a functional taxonomy of the techniques that can be used under an SDN umbrella and to elaborate on the various pending issues the combined activation of such techniques inevitably raises. As such, a definition of SDN is only mentioned for the sake of clarification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7149"/>
        <seriesInfo name="DOI" value="10.17487/RFC7149"/>
      </reference>
      <reference anchor="RFC7426">
        <front>
          <title>Software-Defined Networking (SDN): Layers and Architecture Terminology</title>
          <author fullname="E. Haleplidis" initials="E." role="editor" surname="Haleplidis"/>
          <author fullname="K. Pentikousis" initials="K." role="editor" surname="Pentikousis"/>
          <author fullname="S. Denazis" initials="S." surname="Denazis"/>
          <author fullname="J. Hadi Salim" initials="J." surname="Hadi Salim"/>
          <author fullname="D. Meyer" initials="D." surname="Meyer"/>
          <author fullname="O. Koufopavlou" initials="O." surname="Koufopavlou"/>
          <date month="January" year="2015"/>
          <abstract>
            <t>Software-Defined Networking (SDN) refers to a new approach for network programmability, that is, the capacity to initialize, control, change, and manage network behavior dynamically via open interfaces. SDN emphasizes the role of software in running networks through the introduction of an abstraction for the data forwarding plane and, by doing so, separates it from the control plane. This separation allows faster innovation cycles at both planes as experience has already shown. However, there is increasing confusion as to what exactly SDN is, what the layer structure is in an SDN architecture, and how layers interface with each other. This document, a product of the IRTF Software-Defined Networking Research Group (SDNRG), addresses these questions and provides a concise reference for the SDN research community based on relevant peer-reviewed literature, the RFC series, and relevant documents by other standards organizations.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7426"/>
        <seriesInfo name="DOI" value="10.17487/RFC7426"/>
      </reference>
      <reference anchor="RFC8342">
        <front>
          <title>Network Management Datastore Architecture (NMDA)</title>
          <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
          <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
          <author fullname="P. Shafer" initials="P." surname="Shafer"/>
          <author fullname="K. Watsen" initials="K." surname="Watsen"/>
          <author fullname="R. Wilton" initials="R." surname="Wilton"/>
          <date month="March" year="2018"/>
          <abstract>
            <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8342"/>
        <seriesInfo name="DOI" value="10.17487/RFC8342"/>
      </reference>
      <reference anchor="RFC8309">
        <front>
          <title>Service Models Explained</title>
          <author fullname="Q. Wu" initials="Q." surname="Wu"/>
          <author fullname="W. Liu" initials="W." surname="Liu"/>
          <author fullname="A. Farrel" initials="A." surname="Farrel"/>
          <date month="January" year="2018"/>
          <abstract>
            <t>The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
            <t>A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
            <t>This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture. Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8309"/>
        <seriesInfo name="DOI" value="10.17487/RFC8309"/>
      </reference>
      <reference anchor="RFC8969">
        <front>
          <title>A Framework for Automating Service and Network Management with YANG</title>
          <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="D. Lopez" initials="D." surname="Lopez"/>
          <author fullname="C. Xie" initials="C." surname="Xie"/>
          <author fullname="L. Geng" initials="L." surname="Geng"/>
          <date month="January" year="2021"/>
          <abstract>
            <t>Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.</t>
            <t>This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8969"/>
        <seriesInfo name="DOI" value="10.17487/RFC8969"/>
      </reference>
      <reference anchor="RFC8299">
        <front>
          <title>YANG Data Model for L3VPN Service Delivery</title>
          <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
          <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
          <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
          <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
          <date month="January" year="2018"/>
          <abstract>
            <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
            <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8299"/>
        <seriesInfo name="DOI" value="10.17487/RFC8299"/>
      </reference>
      <reference anchor="RFC8466">
        <front>
          <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
          <author fullname="B. Wen" initials="B." surname="Wen"/>
          <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
          <author fullname="C. Xie" initials="C." surname="Xie"/>
          <author fullname="L. Jalil" initials="L." surname="Jalil"/>
          <date month="October" year="2018"/>
          <abstract>
            <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
            <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
            <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8466"/>
        <seriesInfo name="DOI" value="10.17487/RFC8466"/>
      </reference>
      <reference anchor="RFC9182">
        <front>
          <title>A YANG Network Data Model for Layer 3 VPNs</title>
          <author fullname="S. Barguil" initials="S." surname="Barguil"/>
          <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="L. Munoz" initials="L." surname="Munoz"/>
          <author fullname="A. Aguado" initials="A." surname="Aguado"/>
          <date month="February" year="2022"/>
          <abstract>
            <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
            <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9182"/>
        <seriesInfo name="DOI" value="10.17487/RFC9182"/>
      </reference>
      <reference anchor="RFC9291">
        <front>
          <title>A YANG Network Data Model for Layer 2 VPNs</title>
          <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
          <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
          <author fullname="S. Barguil" initials="S." surname="Barguil"/>
          <author fullname="L. Munoz" initials="L." surname="Munoz"/>
          <date month="September" year="2022"/>
          <abstract>
            <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
            <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9291"/>
        <seriesInfo name="DOI" value="10.17487/RFC9291"/>
      </reference>
      <reference anchor="RFC8199">
        <front>
          <title>YANG Module Classification</title>
          <author fullname="D. Bogdanovic" initials="D." surname="Bogdanovic"/>
          <author fullname="B. Claise" initials="B." surname="Claise"/>
          <author fullname="C. Moberg" initials="C." surname="Moberg"/>
          <date month="July" year="2017"/>
          <abstract>
            <t>The YANG data modeling language is currently being considered for a wide variety of applications throughout the networking industry at large. Many standards development organizations (SDOs), open-source software projects, vendors, and users are using YANG to develop and publish YANG modules for a wide variety of applications. At the same time, there is currently no well-known terminology to categorize various types of YANG modules.</t>
            <t>A consistent terminology would help with the categorization of YANG modules, assist in the analysis of the YANG data modeling efforts in the IETF and other organizations, and bring clarity to the YANG- related discussions between the different groups.</t>
            <t>This document describes a set of concepts and associated terms to support consistent classification of YANG modules.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8199"/>
        <seriesInfo name="DOI" value="10.17487/RFC8199"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC8340">
        <front>
          <title>YANG Tree Diagrams</title>
          <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
          <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
          <date month="March" year="2018"/>
          <abstract>
            <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="215"/>
        <seriesInfo name="RFC" value="8340"/>
        <seriesInfo name="DOI" value="10.17487/RFC8340"/>
      </reference>
      <reference anchor="RFC6241">
        <front>
          <title>Network Configuration Protocol (NETCONF)</title>
          <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
          <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
          <date month="June" year="2011"/>
          <abstract>
            <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6241"/>
        <seriesInfo name="DOI" value="10.17487/RFC6241"/>
      </reference>
      <reference anchor="RFC8040">
        <front>
          <title>RESTCONF Protocol</title>
          <author fullname="A. Bierman" initials="A." surname="Bierman"/>
          <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
          <author fullname="K. Watsen" initials="K." surname="Watsen"/>
          <date month="January" year="2017"/>
          <abstract>
            <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8040"/>
        <seriesInfo name="DOI" value="10.17487/RFC8040"/>
      </reference>
      <reference anchor="RFC6242">
        <front>
          <title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
          <author fullname="M. Wasserman" initials="M." surname="Wasserman"/>
          <date month="June" year="2011"/>
          <abstract>
            <t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem. This document obsoletes RFC 4742. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6242"/>
        <seriesInfo name="DOI" value="10.17487/RFC6242"/>
      </reference>
      <reference anchor="RFC8446">
        <front>
          <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <date month="August" year="2018"/>
          <abstract>
            <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
            <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8446"/>
        <seriesInfo name="DOI" value="10.17487/RFC8446"/>
      </reference>
      <reference anchor="RFC8341">
        <front>
          <title>Network Configuration Access Control Model</title>
          <author fullname="A. Bierman" initials="A." surname="Bierman"/>
          <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
          <date month="March" year="2018"/>
          <abstract>
            <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
            <t>This document obsoletes RFC 6536.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="91"/>
        <seriesInfo name="RFC" value="8341"/>
        <seriesInfo name="DOI" value="10.17487/RFC8341"/>
      </reference>
      <reference anchor="RFC3688">
        <front>
          <title>The IETF XML Registry</title>
          <author fullname="M. Mealling" initials="M." surname="Mealling"/>
          <date month="January" year="2004"/>
          <abstract>
            <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="81"/>
        <seriesInfo name="RFC" value="3688"/>
        <seriesInfo name="DOI" value="10.17487/RFC3688"/>
      </reference>
      <reference anchor="RFC6020">
        <front>
          <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
          <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
          <date month="October" year="2010"/>
          <abstract>
            <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6020"/>
        <seriesInfo name="DOI" value="10.17487/RFC6020"/>
      </reference>
    </references>
    <?line 402?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
