Skip to main content

Ethernet Pseudowire (PW) Management Information Base (MIB)
draft-ietf-pwe3-enet-mib-14

Yes

(Mark Townsley)

No Objection

(Chris Newman)
(Cullen Jennings)
(David Ward)
(Jari Arkko)
(Jon Peterson)
(Lars Eggert)
(Lisa Dusseault)
(Magnus Westerlund)
(Pasi Eronen)
(Ron Bonica)
(Ross Callon)
(Tim Polk)

Note: This ballot was opened for revision 14 and is now closed.

Dan Romascanu Former IESG member
Yes
Yes (2008-07-16) Unknown
Part of the comments are based on the MIB Doctor review performed by Orly Niklass. 

1)

Old:

interfaces that are later associated tp PWs is not handled via this MIB module.                           

NEW:

interfaces that are later associated to PWs is not handled via this MIB module.
 
Change tp/to  but maybe the word with is better here.

2) 

OLD:

entries. If the set of entires of a specific
                                                                     ^

NEW:

entries. If the set of entries of a specific

Change entires/ entries

 
3) 

OLD:

"glues" the standard modules to the PWE3 MIB modules.

NEW:

"glues" the standard native version modules to the PWE3 MIB modules.

add 'native version' 

4) 

OLD:

The next layer of the PWE3 MIB framework is the PW MIB module

Change for consistency to 

NEW:

The next layer of the PWE3 MIB structure is the PW MIB module

 
5)
 

There is

     ---
     --- Conformance description
     ---
 
     pwEnetGroups      OBJECT IDENTIFIER ::= { pwEnetConformance 1 }
     pwEnetCompliances OBJECT IDENTIFIER ::= { pwEnetConformance 2 }
 
 

 

Normally (as listed in RFC4181) we order then with
    Compliances first and then Groups. 
 
       xxxMIB
       |
       +-- xxxNotifications(0)
       +-- xxxObjects(1)
       +-- xxxConformance(2)
           |
           +-- xxxCompliances(1)
           +-- xxxGroups(2)

6) 

In the Security Considerations section: 

   o  the pwEnetTable contains objects to provision Ethernet PWs.
      Unauthorized access to objects in these tables, could result in
      disruption of traffic on the network.  The use of stronger
      mechanisms such as SNMPv3 security should be considered where
      possible.  Specifically, SNMPv3 VACM and USM MUST be used with any
      v3 agent which implements this MIB module.  Administrators should
      consider whether read access to these objects should be allowed,
      since read access may be undesirable under certain circumstances.

Two problems here: 
- the security threat resulting from intentionalor unintentional mis-configuration of the obects in the pwEnetTable should be explicitly stated, as the consequences may be partial or total loss of service for customers connected through the PW which i smore than just disruption of traffic. 
- The should in the second phrase SHOULD be capitalized
Mark Townsley Former IESG member
Yes
Yes () Unknown

                            
Chris Newman Former IESG member
No Objection
No Objection () Unknown

                            
Cullen Jennings Former IESG member
No Objection
No Objection () Unknown

                            
David Ward Former IESG member
No Objection
No Objection () Unknown

                            
Jari Arkko Former IESG member
No Objection
No Objection () Unknown

                            
Jon Peterson Former IESG member
No Objection
No Objection () Unknown

                            
Lars Eggert Former IESG member
No Objection
No Objection () Unknown

                            
Lisa Dusseault Former IESG member
No Objection
No Objection () Unknown

                            
Magnus Westerlund Former IESG member
No Objection
No Objection () Unknown

                            
Pasi Eronen Former IESG member
No Objection
No Objection () Unknown

                            
Ron Bonica Former IESG member
No Objection
No Objection () Unknown

                            
Ross Callon Former IESG member
No Objection
No Objection () Unknown

                            
Russ Housley Former IESG member
No Objection
No Objection (2008-07-12) Unknown
  Please remove the following before publication as an RFC:
  >
  > Comments should be made directly to the PWE3 mailing list at
  > pwe3@ietf.org.
Tim Polk Former IESG member
No Objection
No Objection () Unknown