Ethernet Pseudowire (PW) Management Information Base (MIB)
draft-ietf-pwe3-enet-mib-14
Yes
(Mark Townsley)
No Objection
(Chris Newman)
(Cullen Jennings)
(David Ward)
(Jari Arkko)
(Jon Peterson)
(Lars Eggert)
(Lisa Dusseault)
(Magnus Westerlund)
(Pasi Eronen)
(Ron Bonica)
(Ross Callon)
(Tim Polk)
Note: This ballot was opened for revision 14 and is now closed.
Dan Romascanu Former IESG member
Yes
Yes
(2008-07-16)
Unknown
Part of the comments are based on the MIB Doctor review performed by Orly Niklass. 1) Old: interfaces that are later associated tp PWs is not handled via this MIB module. NEW: interfaces that are later associated to PWs is not handled via this MIB module. Change tp/to but maybe the word with is better here. 2) OLD: entries. If the set of entires of a specific ^ NEW: entries. If the set of entries of a specific Change entires/ entries 3) OLD: "glues" the standard modules to the PWE3 MIB modules. NEW: "glues" the standard native version modules to the PWE3 MIB modules. add 'native version' 4) OLD: The next layer of the PWE3 MIB framework is the PW MIB module Change for consistency to NEW: The next layer of the PWE3 MIB structure is the PW MIB module 5) There is --- --- Conformance description --- pwEnetGroups OBJECT IDENTIFIER ::= { pwEnetConformance 1 } pwEnetCompliances OBJECT IDENTIFIER ::= { pwEnetConformance 2 } Normally (as listed in RFC4181) we order then with Compliances first and then Groups. xxxMIB | +-- xxxNotifications(0) +-- xxxObjects(1) +-- xxxConformance(2) | +-- xxxCompliances(1) +-- xxxGroups(2) 6) In the Security Considerations section: o the pwEnetTable contains objects to provision Ethernet PWs. Unauthorized access to objects in these tables, could result in disruption of traffic on the network. The use of stronger mechanisms such as SNMPv3 security should be considered where possible. Specifically, SNMPv3 VACM and USM MUST be used with any v3 agent which implements this MIB module. Administrators should consider whether read access to these objects should be allowed, since read access may be undesirable under certain circumstances. Two problems here: - the security threat resulting from intentionalor unintentional mis-configuration of the obects in the pwEnetTable should be explicitly stated, as the consequences may be partial or total loss of service for customers connected through the PW which i smore than just disruption of traffic. - The should in the second phrase SHOULD be capitalized
Mark Townsley Former IESG member
Yes
Yes
()
Unknown
Chris Newman Former IESG member
No Objection
No Objection
()
Unknown
Cullen Jennings Former IESG member
No Objection
No Objection
()
Unknown
David Ward Former IESG member
No Objection
No Objection
()
Unknown
Jari Arkko Former IESG member
No Objection
No Objection
()
Unknown
Jon Peterson Former IESG member
No Objection
No Objection
()
Unknown
Lars Eggert Former IESG member
No Objection
No Objection
()
Unknown
Lisa Dusseault Former IESG member
No Objection
No Objection
()
Unknown
Magnus Westerlund Former IESG member
No Objection
No Objection
()
Unknown
Pasi Eronen Former IESG member
No Objection
No Objection
()
Unknown
Ron Bonica Former IESG member
No Objection
No Objection
()
Unknown
Ross Callon Former IESG member
No Objection
No Objection
()
Unknown
Russ Housley Former IESG member
No Objection
No Objection
(2008-07-12)
Unknown
Please remove the following before publication as an RFC: > > Comments should be made directly to the PWE3 mailing list at > pwe3@ietf.org.
Tim Polk Former IESG member
No Objection
No Objection
()
Unknown