<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ivy-network-inventory-software-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="Network Inventory Software">A YANG Network Data Model of Network Inventory Software Extensions</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-software-01"/>
    <author initials="B." surname="Wu" fullname="Bo Wu">
      <organization>Huawei</organization>
      <address>
        <email>lana.wubo@huawei.com</email>
      </address>
    </author>
    <author initials="C." surname="Zhou" fullname="Cheng Zhou">
      <organization>China Mobile</organization>
      <address>
        <email>zhouchengyjy@chinamobile.com</email>
      </address>
    </author>
    <author initials="Q." surname="Wu" fullname="Qin Wu">
      <organization>Huawei</organization>
      <address>
        <email>bill.wu@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Boucadair" fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <date year="2025" month="June" day="10"/>
    <area/>
    <workgroup>Network Inventory YANG</workgroup>
    <keyword>Automation</keyword>
    <keyword>Network Inventory</keyword>
    <keyword>Network Operation</keyword>
    <abstract>
      <?line 44?>

<t>The base Network Inventory YANG model defines the physical network
      elements (NEs) and hardware components of NEs. This document extends the
      base Network Inventory model for non-physical NEs (e.g., controllers,
      virtual routers, virtual firewalls) and software components (e.g.,
      platform operating system (OS), software-patch).</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Network Inventory YANG  mailing list (inventory-yang@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/inventory-yang/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ietf-ivy-wg/network-inventory-software"/>.</t>
    </note>
  </front>
  <middle>
    <?line 52?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Network Inventory consists of the physical and non-physical
      network elements (NEs), hardware components, firmware components, and
      software components on the a managed network domain. The non-physical
      network elements (NEs) are network devices that support network
      protocols and functions, e.g., routers, firewalls, and controllers,
      which can reside in any network or compute devices, such as servers in
      Data Center (DC), server-based virtual machines (VMs), or server-based
      containers.</t>
      <t><xref target="I-D.ietf-ivy-network-inventory-yang"/>  defines the base
      Network Inventory YANG model for physical network element (NE) and
      hardware components of NEs. Examples of hardware components could be
      rack, shelf, slot, board and physical port.</t>
      <t>The management of non-physical NE and software components information
      is similar to the management of physical NE and hardware information.
      For example, inventory data, including product names, serial numbers,
      etc. are also applicable. This document defines a network inventory
      software extension YANG model. In addition to inheriting the common
      inventory attributes of the base network inventory model, this document
      also adds some software-specific attributes of non-physical NEs (such as
      controllers, virtual routers, and virtual firewalls) and software
      components (such as operating system, software patches, BIOS, and boot
      loader).</t>
      <t>The Network Inventory software extension model is classified as a
      network model (Section 4 of  <xref target="RFC8309"/>).</t>
      <t>The YANG data model in this document conforms to the Network
Management Datastore Architecture (NMDA) defined in <xref target="RFC8342"/>.</t>
      <section anchor="editorial-note-to-be-removed-by-rfc-editor">
        <name>Editorial Note (To be removed by RFC Editor)</name>
        <t>Note to the RFC Editor: This section is to be removed prior to publication.</t>
        <t>This document contains placeholder values that need to be replaced with finalized values at the time of publication. This note summarizes all of the substitutions that are needed.</t>
        <t>Please apply the following replacements:</t>
        <ul spacing="normal">
          <li>
            <t>XXXX --&gt; the assigned RFC number for this I-D</t>
          </li>
          <li>
            <t>AAAA --&gt; the assigned RFC number for <xref target="I-D.ietf-ivy-network-inventory-yang"/></t>
          </li>
        </ul>
      </section>
      <section anchor="terminology-and-notations">
        <name>Terminology and Notations</name>
        <t>The following terms are defined in <xref target="RFC7950"/> and are not
redefined here:</t>
        <ul spacing="normal">
          <li>
            <t>client</t>
          </li>
          <li>
            <t>server</t>
          </li>
          <li>
            <t>augment</t>
          </li>
          <li>
            <t>data model</t>
          </li>
          <li>
            <t>data node
The following terms are defined in <xref target="RFC6241"/> and are not redefined
here:</t>
          </li>
          <li>
            <t>configuration data</t>
          </li>
          <li>
            <t>state data
The tree diagram used in this document follows the notation defined
in <xref target="RFC8340"/>..</t>
          </li>
        </ul>
        <t>Also, this document uses terms defined in <xref target="I-D.ietf-ivy-network-inventory-yang"/>.</t>
      </section>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
        "OPTIONAL" in this document are to be interpreted as described in BCP 14
        <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="relationship-to-other-yang-data-models">
      <name>Relationship to Other YANG Data Models</name>
      <t>The base network inventory model supports the software versions of
      NEs and software versions of hardware components. This document adds
      more software component identifiers (e.g. platformos, software patch)
      and more NE types (e.g. software NE, virtual NE) to provide enhanced
      software information on the NE to facilitate software compatibility
      check.</t>
      <t><xref target="fig-ni-sw-mod-relation"/> depicts the relationship between
      the Software Extension model and other models. The Software Extension
      network inventory model enhances the model defined in the base network
      inventory model with more software specific attributes.</t>
      <figure anchor="fig-ni-sw-mod-relation">
        <name>Relationship of SW Extension Model to Other Inventory Models</name>
        <artwork type="ascii-art"><![CDATA[
+----------------------+
|                      |
|Base Network Inventory|
|                      |
+----------^-----------+
           |
           |
           |
           |
+----------^-----------+
|                      |
|  Software Extensions |
|    e.g.,SW patch     |
|                      |
+----------------------+
]]></artwork>
      </figure>
    </section>
    <section anchor="model-overview">
      <name>Model Overview</name>
      <t>The tree diagram in <xref target="full-tree"/> provides an overview of the data model for "ietf-network-inventory-sw-ext"
      module.</t>
      <figure anchor="full-tree">
        <name>YANG Tree of Software Extensions</name>
        <artwork align="center"><![CDATA[
module: ietf-network-inventory-sw-ext
  augment /nwi:network-inventory/nwi:network-elements
            /nwi:network-element:
    +--ro software-attributes
       +--ro status?              identityref
       +--ro installation-time?   yang:date-and-time
       +--ro activation-time?     yang:date-and-time
  augment /nwi:network-inventory/nwi:network-elements
            /nwi:network-element/nwi:components/nwi:component:
    +--ro software-module-attributes
       +--ro status?              identityref
       +--ro installation-time?   yang:date-and-time
       +--ro activation-time?     yang:date-and-time
]]></artwork>
      </figure>
    </section>
    <section anchor="non-physical-network-elements">
      <name>Non-physical Network Elements</name>
      <t>In the base Network Inventory YANG model, "ne-type" is a YANG
      identity that describes the type of the network element and only the
      "physical-network-element" identity" is defined. This document adds
      non-physical NE identity, such as "ne-software", "ne-virtual", and
      "ne-container".</t>
      <t>The base Network Inventory model also defines common inventory
      attributes, including the software version, patch versions, product
      name, and serial number. The data is also applicable to non-physical
      NEs.</t>
      <t>The Network Inventory software extension mode defines some new
      software attributes, consisting of software status, installation time,
      and activation time.</t>
    </section>
    <section anchor="software-components">
      <name>Software components</name>
      <t>Software components refer to the softwares installed on the NE, such
      as operating system, software patches, BIOS, and boot loaders.</t>
      <t>Similar to the common inventory attributes of NEs, the common
      attributes of software components (such as software version, patch
      versions, product name, and serial number) are also applicable to
      software components. For software and patch versions, the base inventory
      (Section 4 of <xref target="I-D.ietf-ivy-network-inventory-yang"/>)
      defines the "leaf" of "software-rev" and the "leaf-list" of
      "software-patch-rev". If more detailed installation and activation
      information is needed, the extension attributes of software components
      can be used.</t>
    </section>
    <section anchor="yang-data-model-for-network-inventory-software-extensions">
      <name>YANG Data model for Network Inventory Software Extensions</name>
      <t>The "ietf-network-inventory-sw-ext" module uses types defined in <xref target="RFC6991"/>,
   <xref target="I-D.ietf-ivy-network-inventory-yang"/>.</t>
      <sourcecode type="yang" markers="true" name="ietf-network-inventory-sw-ext@2024-10-17.yang"><![CDATA[
module ietf-network-inventory-sw-ext {
  yang-version 1.1;
  namespace
    "urn:ietf:params:xml:ns:yang:ietf-network-inventory-sw-ext";
  prefix nwis;

  import ietf-yang-types {
    prefix yang;
    reference
      "RFC 6991: Common YANG Data Types";
  }
  import ietf-network-inventory {
    prefix nwi;
    reference
      "RFCAAAA: A YANG Data Model for Network Inventory";
  }

  organization
    "IETF Network Inventory YANG (ivy) Working Group";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/ivy>
     WG List:  <mailto:inventory-yang@ietf.org>

     Editor: Bo Wu
             <lana.wubo@huawei.com>
     Editor: Cheng Zhou
          <zhouchengyjy@chinamobile.com>
     Editor: Qin Wu
             <bill.wu@huawei.com>
     Editor: Mohamed Boucadair
             <mohamed.boucadair@orange.com>";
  description
    "This YANG module defines a model for network inventory software
     extensions.

     Copyright (c) 2025 IETF Trust and the persons
     identified as authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject
     to the license terms contained in, the Revised BSD License
     set forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX; see
     the RFC itself for full legal notices.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.";

  revision 2025-06-10 {
    description
      "Initial version";
    reference
      "RFC XXXX: A YANG Data Model for Network Inventory Software
                 Extensions.";
  }

  identity ne-nonphysical {
    base nwi:ne-type;
    description
      "A non-physical network element (NE) is a network device that
       support network protocols and functions, e.g., router,
       firewall, and controller, which can reside in any network or
       compute devices, such as a server in Data Center (DC),
       server-based virtual machine (VM), or server-based
       container.";
  }

  identity ne-software {
    base ne-nonphysical;
    description
      "A software NE refers to a a network device residing in any
       network or compute devices, such as a physical server
       (or 'bare metal') in DC. Examples of software NEs are
       network controllers.";
  }

  identity ne-virtual {
    base ne-nonphysical;
    description
      "A virtual NE refers to a network device residing within
       server-based Virtual Machine (VM) implementing a virtual
       network function (VNF). Examples of virtual NEs are
       virtual routers, virtual firewalls.";
  }

  identity ne-container {
    base ne-nonphysical;
    description
      "A container NE refers to a network device residing within
       server-based container implementing a Containerized
       network function (CNF).";
  }

  identity software-component {
    base nwi:non-hardware-component-class;
    description
      "Base identity for software components in a managed
       device.";
  }

  identity operating-system {
    base software-component;
    description
      "OS software type.";
  }

  identity operating-system-patch {
    base software-component;
    description
      "An operating system update - which should be a subcomponent
       of the `operating-system` running on a component. A patch is
       defined to be a set of software changes that are atomically
       installed (and uninstalled) together. ";
  }

  identity bios {
    base software-component;
    description
      "Legacy BIOS or UEFI firmware interface responsible for
       initializing hardware components and first stage boot
       loader.";
  }

  identity boot-loader {
    base software-component;
    description
      "Software layer responsible for loading and booting the
       device OS or network OS.";
  }

  identity software-module {
    base software-component;
    description
      "A base identity for software modules installed and/or
       running on the device.  Modules include user-space programs
       and kernel modules that provide specific functionality.";
  }

  identity software-status {
    description
      "Base identity for software status.";
  }

  identity software-installed {
    base software-status;
    description
      "Software status is Installed.";
  }

  identity software-activated {
    base software-status;
    description
      "Software status is Activated.";
  }

  grouping software-info-grouping {
    description
      "Specific attributes applicable to Software.";
    leaf status {
      type identityref {
        base software-status;
      }
      description
        "Software status.";
    }
    leaf installation-time {
      type yang:date-and-time;
      description
        "Date and time the current revision last changed.";
    }
    leaf activation-time {
      type yang:date-and-time;
      description
        "Date and time the current revision last changed.";
    }
  }

  /* Main blocks */

  augment "/nwi:network-inventory/nwi:network-elements"
        + "/nwi:network-element" {
    description
      "Augment network element (NE) attributes.";
    container software-attributes {
      when "derived-from-or-self(../nwi:ne-type,'ne-software')";
      config false;
      description
        "Container for the attributes applicable only to software
         Network Elements (NEs).";
      uses software-info-grouping;
    }
  }

  augment "/nwi:network-inventory/nwi:network-elements/"
        + "nwi:network-element/nwi:components/nwi:component" {
    description
      "Augment software component attributes.";
    container software-module-attributes {
      when
        "derived-from-or-self(../nwi:class,'software-module')";
      config false;
      description
        "This container contains some attributes belong to
         software modules only.";
      uses software-info-grouping;
    }
  }
}
]]></sourcecode>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This section uses the template described in <xref section="3.7" sectionFormat="of" target="I-D.ietf-netmod-rfc8407bis"/>.</t>
      <t>The "ietf-network-inventory-sw-ext" YANG module defines a data model that is
designed to be accessed via YANG-based management protocols, such as
NETCONF NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. These YANG-based management
protocols (1) have to use a secure transport layer
(e.g., SSH <xref target="RFC4252"/>, TLS <xref target="RFC8446"/>, and QUIC <xref target="RFC9000"/>) and (2) have
to use mutual authentication.</t>
      <t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/>
provides the means to restrict access for particular NETCONF or
RESTCONF users to a preconfigured subset of all available NETCONF or
RESTCONF protocol operations and content.</t>
      <t>There are a number of data nodes defined in this YANG module that are
writable/creatable/deletable (i.e., "config true", which is the
default).  All writable data nodes are likely to be sensitive or
vulnerable in some network environments.  Write
operations (e.g., edit-config) and delete operations to these data
nodes without proper protection or authentication can have a negative
effect on network operations.  The following subtrees and data nodes
have particular sensitivities/vulnerabilities:
* TBC</t>
      <t>Some of the readable data nodes in this YANG module may be considered
sensitive or vulnerable in some network environments.  It is thus
important to control read access (e.g., via get, get-config, or
notification) to these data nodes. Specifically, the following
subtrees and data nodes have particular sensitivities/
vulnerabilities:</t>
      <ul spacing="normal">
        <li>
          <t>TBC</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to register the following URI in the "ns" subregistry within
the "IETF XML Registry" <xref target="RFC3688"/>:</t>
      <artwork><![CDATA[
URI:  urn:ietf:params:xml:ns:yang:ietf-network-inventory-sw-ext
Registrant Contact:  The IESG.
XML:  N/A; the requested URI is an XML namespace.
]]></artwork>
      <t>IANA is requested to register the following YANG module in the "YANG Module
Names" registry <xref target="RFC6020"/> within the "YANG Parameters" registry group:</t>
      <artwork><![CDATA[
Name:  ietf-network-inventory-sw-ext
Namespace:  urn:ietf:params:xml:ns:yang:ietf-network-inventory-sw-ext
Prefix:  nwis
Maintained by IANA?  N
Reference:  RFC XXXX
]]></artwork>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-ivy-network-inventory-yang">
          <front>
            <title>A Base YANG Data Model for Network Inventory</title>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Sergio Belotti" initials="S." surname="Belotti">
              <organization>Nokia</organization>
            </author>
            <author fullname="Jean-Francois Bouquier" initials="J." surname="Bouquier">
              <organization>Vodafone</organization>
            </author>
            <author fullname="Fabio Peruzzini" initials="F." surname="Peruzzini">
              <organization>TIM</organization>
            </author>
            <author fullname="Phil Bedard" initials="P." surname="Bedard">
              <organization>Cisco</organization>
            </author>
            <date day="21" month="May" year="2025"/>
            <abstract>
              <t>   This document defines a base YANG data model for network inventory.
   The scope of this base model is set to be application- and
   technology-agnostic.  The base data model can be augmented with
   application- and technology-specific details.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ivy-network-inventory-yang-06"/>
        </reference>
        <reference anchor="RFC8342">
          <front>
            <title>Network Management Datastore Architecture (NMDA)</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <author fullname="P. Shafer" initials="P." surname="Shafer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="R. Wilton" initials="R." surname="Wilton"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>Datastores are a fundamental concept binding the data models written in the YANG data modeling language to network management protocols such as the Network Configuration Protocol (NETCONF) and RESTCONF. This document defines an architectural framework for datastores based on the experience gained with the initial simpler model, addressing requirements that were not well supported in the initial model. This document updates RFC 7950.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8342"/>
          <seriesInfo name="DOI" value="10.17487/RFC8342"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC6991">
          <front>
            <title>Common YANG Data Types</title>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document introduces a collection of common data types to be used with the YANG data modeling language. This document obsoletes RFC 6021.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6991"/>
          <seriesInfo name="DOI" value="10.17487/RFC6991"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8309">
          <front>
            <title>Service Models Explained</title>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
              <t>A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
              <t>This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture. Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8309"/>
          <seriesInfo name="DOI" value="10.17487/RFC8309"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="I-D.ietf-netmod-rfc8407bis">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="Andy Bierman" initials="A." surname="Bierman">
              <organization>YumaWorks</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <date day="5" month="June" year="2025"/>
            <abstract>
              <t>   This document provides guidelines for authors and reviewers of
   specifications containing YANG data models, including IANA-maintained
   modules.  Recommendations and procedures are defined, which are
   intended to increase interoperability and usability of Network
   Configuration Protocol (NETCONF) and RESTCONF Protocol
   implementations that utilize YANG modules.  This document obsoletes
   RFC 8407.

   Also, this document updates RFC 8126 by providing additional
   guidelines for writing the IANA considerations for RFCs that specify
   IANA-maintained modules.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-rfc8407bis-28"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC4252">
          <front>
            <title>The Secure Shell (SSH) Authentication Protocol</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell Protocol (SSH) is a protocol for secure remote login and other secure network services over an insecure network. This document describes the SSH authentication protocol framework and public key, password, and host-based client authentication methods. Additional authentication methods are described in separate documents. The SSH authentication protocol runs on top of the SSH transport layer protocol and provides a single authenticated tunnel for the SSH connection protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4252"/>
          <seriesInfo name="DOI" value="10.17487/RFC4252"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
      </references>
    </references>
    <?line 496?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Prasenjit Manna,Phil Bedard, Diego R.
      Lopez, Italo Busi, and many others for their helpful comments and
      suggestions.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="Y." surname="Zhao" fullname="Yao Zhao">
        <organization>Huawei</organization>
        <address>
          <email>zhaoyao.zhaoyao@huawei.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
