Name:
DANSK DSF/ISO/IEC/IEEE FDIS 8802-3-2 PDF
Published Date:
Status:
[ Draft ]
Publisher:
Dansk Standard
1.1 Scope This standard defines YANG data models for IEEE Std 802.3 Ethernet. 1.2 Purpose The purpose of the standard is to define YANG modules for IEEE Std 802.3 and publish these modules in a machine-readable format. 1.3 Machine-readable YANG modules The machine-readable files are available for download at the following URL: https://github.com/YangModels/ yang/tree/master/standard/ieee/published/802.3 as text files with a .yang extension, e.g., ieee802-ethernet- interface.yang. The use of specialized tools to view YANG modules may be useful to create tree, UML image, and HTML outputs from the YANG modules. Like other languages, YANG (see IETF RFC 7950) has an accepted style for machine-readable files, which was followed during the development of this standard. This formatting may not be preserved when importing the machine-readable YANG modules into the PDF. In case of any formatting discrepancies, the published machine-readable files should be consulted. 1.4 Summary of YANG-based management framework The structure of YANG-based management framework closely resembles the structure of the Internet-Standard Management Framework, described in detail in section 7 of IETF RFC 3410. Managed objects defined using YANG modeling language are hosted on the managed device and accessed through NETCONF (see IETF RFC 7803) or RESTCONF (see IETF RFC 8040). This standard specifies YANG modules that are compliant to YANG 1.1 (see IETF RFC 7950). 1.5 Security considerations The YANG modules defined in this standard are designed to be accessed via network management protocols, including NETCONF (see IETF RFC 7803) or RESTCONF (see IETF RFC 8040). The lowest NETCONF layer is the secure transport layer, and the mandatory-to-implement secure transport is Secure Shell (SSH) (see IETF RFC 6242) or TLS (see IETF RFC 8446). The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement secure transport is TLS (see IETF RFC 8446). The NETCONF access control model (see IETF RFC 8341) provides the means to restrict access for particular NETCONF or RESTCONF users to a pre-configured subset of all available NETCONF or RESTCONF protocol operations and content. There are a number of data nodes defined in these YANG modules that are writable/creatable/deletable, i.e., have the config property set to true, which is the default setting. These data nodes may be considered sensitive or vulnerable in some network environments. Write operations (e.g., edit-config) to these data nodes without proper protection can have a negative effect on network operations. Some of the readable data nodes in these YANG modules may be considered sensitive or vulnerable in some network environments. It is thus important to control read access (e.g., via get, get-config, or notification) to these data nodes. Some of the RPC operations in these YANG modules may be considered sensitive or vulnerable in some network environments. Therefore, it is important to control access to these operations. 1.6 YANG module syntax validation All YANG modules included in this standard are YANG 1.1 (see IETF RFC 7950) compliant and pass automated checks using tools available at the time of publication. The following open source and/or free versions of YANG validation tools may be used: Pyang (see https:// github.com/mbj4668/pyang), ConfD (see http://www.tail-f.com/confd-basic), as well as other YANG model validation tools listed at http://www.yangvalidator.com.
| Edition : | 21 |
| File Size : | 1 file , 4.9 MB |
| Number of Pages : | 157 |
| Product Code(s) : | DSF-121, DSF-121 |