<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.34 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-opsawg-rfc5706bis-04" category="bcp" consensus="true" submissionType="IETF" obsoletes="5706" updates="2360" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="Operations &amp; Management Considerations">Guidelines for Considering Operations and Management in IETF Specifications</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-rfc5706bis-04"/>
    <author fullname="Benoit Claise">
      <organization>Everything OPS</organization>
      <address>
        <email>benoit@everything-ops.net</email>
      </address>
    </author>
    <author fullname="Joe Clarke">
      <organization>Cisco</organization>
      <address>
        <email>jclarke@cisco.com</email>
      </address>
    </author>
    <author fullname="Adrian Farrel">
      <organization>Old Dog Consulting</organization>
      <address>
        <email>adrian@olddog.co.uk</email>
      </address>
    </author>
    <author fullname="Samier Barguil">
      <organization>Nokia</organization>
      <address>
        <email>samier.barguil_giraldo@nokia.com</email>
      </address>
    </author>
    <author fullname="Carlos Pignataro">
      <organization>Blue Fern Consulting</organization>
      <address>
        <email>carlos@bluefern.consulting</email>
        <email>cpignata@gmail.com</email>
        <uri>https://bluefern.consulting</uri>
      </address>
    </author>
    <author fullname="Ran Chen">
      <organization>ZTE</organization>
      <address>
        <email>chen.ran@zte.com.cn</email>
      </address>
    </author>
    <date year="2026" month="March" day="16"/>
    <area>Operations and Management</area>
    <keyword>management</keyword>
    <keyword>operations</keyword>
    <keyword>operations and management</keyword>
    <keyword>ops considerations</keyword>
    <abstract>
      <?line 89?>

<t>New Protocols and Protocol Extensions are best designed with due
   consideration of the functionality needed to operate and manage them.
   Retrofitting operations and management considerations is suboptimal.
   The purpose of this document is to provide guidance to authors and
   reviewers on what operational and management aspects should be
   addressed when writing documents in the IETF Stream that document a specification for New Protocols or Protocol Extensions or describe their use.</t>
      <t>This document obsoletes RFC 5706, replacing it completely and updating
   it with new operational and management techniques and mechanisms. It also
   updates RFC 2360 to obsolete mandatory MIB creation. Finally, it introduces a
   requirement to include an "Operational Considerations" section in new RFCs in
   the IETF Stream that define New Protocols or Protocol Extensions or describe their use (including relevant YANG
   Models), while providing an escape clause if no new considerations are identified.</t>
    </abstract>
  </front>
  <middle>
    <?line 105?>

<section anchor="sec-intro">
      <name>Introduction</name>
      <t>Often, when New Protocols or Protocol Extensions are developed, not
   enough consideration is given to how they will be deployed,
   operated, and managed. Retrofitting operations and management
   mechanisms is often hard and architecturally unpleasant, and certain
   protocol design choices may make deployment, operations, and
   management particularly difficult or insecure.
   To ensure deployability, the operational environment and manageability
   must be considered during design.</t>
      <t>This document provides guidelines to help Protocol Designers and Working
   Groups (WGs) consider the operations and management functionality for
   their New Protocol or Protocol Extension at an early phase in the design
   process.</t>
      <t>This document obsoletes <xref target="RFC5706"/> and fully updates its content
   with new operational and management techniques and mechanisms. It also
   introduces a requirement to include an "Operational Considerations"
   section in new RFCs in the IETF Stream that define New Protocols or
   Protocol Extensions or describe their use (including relevant YANG
   Models). This section must cover both operational and management considerations.
   Additionally, this document updates Section <xref target="RFC2360" section="2.14" sectionFormat="bare"/> of RFC 2360 <xref target="BCP22"/> on "Guide for Internet Standards Writers"
   to obsolete references to mandatory MIBs and instead focus on documenting holistic manageability and operational
   considerations as described in <xref target="sec-doc-req-ietf-spec"/>. The update is provided in <xref target="sec-2360-update"/>.
   Further, this document removes outdated
   references and aligns with current practices, protocols, and
   technologies used in operating and managing devices, networks, and
   services. Refer to <xref target="sec-changes-since-5706"/> for more details.</t>
      <section anchor="sec-this-doc">
        <name>This Document</name>
        <t>This document provides a set of guidelines for considering
   operations and management in an IETF technical specification
   with an eye toward being flexible while also striving for
   interoperability.</t>
        <t>Entirely New Protocols may require significant consideration of expected
   operations and management, while Protocol Extensions to existing, widely
   deployed protocols may have established de facto operations and
   management practices that are already well understood. This document does
   not mandate a comprehensive inventory of all operational considerations.
   Instead, it guides authors to focus on key aspects that are essential for
   the technology's deployability, operation, and maintenance.</t>
        <t>Suitable operational and management approaches may vary for different areas, WGs,
   and protocols in the IETF. This document does not prescribe
   a fixed solution or format in dealing with operational and management
   aspects of IETF protocols. However, these aspects should be
   considered for any New Protocol or Protocol Extension.</t>
        <t>A WG may decide that its protocol does not need interoperable
   operational and management or a standardized Data Model, but this should be a
   deliberate and documented decision, not the result of omission. This document
   provides some guidelines for those considerations.</t>
        <t>This document recognizes a distinction between management and operational
   considerations, although the two are closely related. However, for New
   Protocols or Protocol Extensions only an "Operational Considerations" section is required.
   This section is intended to address both management and operational aspects.
   Operational considerations pertain to the deployment and functioning of protocols
   within a network, regardless of whether a management protocol is in active use.
   Management considerations focus on the use of management technologies, such as
   management protocols and the design of management Data Models. Both topics should
   be described within the "Operational Considerations" section.</t>
      </section>
      <section anchor="sec-audience">
        <name>Audience</name>
        <t>The guidelines are intended to be useful to authors
   writing protocol specifications.
   They outline what to consider for operations, management, and deployment, how to document
   those aspects, and how to present them in a consistent format.
    This document is intended to offer a flexible set of
   guiding principles applicable to various circumstances. It provides a framework for WGs
   to ensure that operational considerations are an integral part of the protocol design process, and
   its use should not be misinterpreted as imposing new hurdles on work in other areas.</t>
        <t>Protocol Designers should consider which operations and management
   needs are relevant to their protocol, document how those needs could
   be addressed, and suggest (preferably standard) management protocols
   and Data Models that could be used to address those needs. This is
   similar to a WG that considers which security threats are relevant to
   their protocol, documents (in the required Security Considerations section,
   per Guidelines for Writing RFC Text on Security Considerations <xref target="BCP72"/>)
   how threats should be mitigated, and then suggests appropriate standard
   protocols that could mitigate the threats.</t>
        <t>It is not the intention that a protocol specification document should
   be held up waiting for operations and management solutions to be
   developed.  This is particularly the case when a protocol extension
   is proposed, but the base protocol is missing operations or
   management solutions.  However, it is the intent that new documents
   should clearly articulate the operations and management of
   that new work to fill any operations and management gaps.</t>
        <t>A core principle of this document is to encourage early-on discussions rather than mandating any specific solution.
   It does not impose a specific management or operational solution,
   imply that a formal Data Model is needed, or imply that using a specific management
   protocol is mandatory. Specifically, this document does not require developing solutions to accommodate
   identified operational considerations within the document that specifies
   a New Protocol or Protocol Extension itself.</t>
        <t>If Protocol Designers conclude that the technology can be
   managed solely by using Proprietary Interfaces or that it does
   not need any structured or standardized Data Model, this might be fine,
   but it is a decision that should be explicit in a operational considerations discussion
   -- that this is how the protocol will need to be operated and managed.
   Protocol Designers should avoid deferring operations and manageability to a later
   phase of the development of the specification.</t>
        <t>When a WG considers operations and management functionality for a
   protocol, the document should contain enough information for readers
   to understand how the protocol will be deployed, operated, and managed. The considerations
   do not need to be comprehensive and exhaustive; focus should be on key aspects. The WG
   should expect that considerations for operations and management may
   need to be updated in the future, after further operational
   experience has been gained.</t>
        <t>The Ops Directorate (OpsDir) can use this document to inform their reviews. A list of guidelines and a
   checklist of questions to consider, which a reviewer can use to evaluate whether the protocol and
   documentation address common operations and management needs, is provided in <xref target="CHECKLIST"/>.</t>
        <t>This document is also of interest to the broader community, who wants to understand, contribute to,
   and review Internet-Drafts, taking operational considerations into account.</t>
      </section>
    </section>
    <section anchor="sec-terms">
      <name>Terminology</name>
      <t>This document does not describe interoperability requirements. As such, it does not use the capitalized keywords defined in <xref target="BCP14"/>.</t>
      <t>This section defines key terms used throughout the document to ensure clarity and consistency. Some terms are drawn from existing RFCs and IETF Internet-Drafts, while others are defined here for the purposes of this document. Where appropriate, references are provided for further reading or authoritative definitions.</t>
      <ul spacing="normal">
        <li>
          <t>Cause: See <xref target="I-D.ietf-nmop-terminology"/>.</t>
        </li>
        <li>
          <t>CLI: Command Line Interface. A human-oriented interface, typically
a Proprietary Interface, to hardware or software devices
(e.g., hosts, routers, or operating systems). The commands, their syntax,
and the precise semantics of the parameters may vary considerably
between different vendors, between products from the same
vendor, and even between different versions or releases of a single
product. No attempt at standardizing CLIs has been made by the IETF.</t>
        </li>
        <li>
          <t>Data Model: A set of mechanisms for representing, organizing, storing,
and handling data within a particular type of data store or repository.
This usually comprises a collection of data structures such as lists, tables,
relations, etc., a collection of operations that can be applied to the
structures such as retrieval, update, summation, etc., and a collection of
integrity rules that define the legal states (set of values) or changes of
state (operations on values). A Data Model may be derived by mapping the
contents of an Information Model or may be developed ab initio. Further
discussion of Data Models can be found in <xref target="RFC3444"/>, <xref target="sec-interop"/>,
and <xref target="sec-mgmt-info"/>.</t>
        </li>
        <li>
          <t>Fault: See <xref target="I-D.ietf-nmop-terminology"/>.</t>
        </li>
        <li>
          <t>Fault Management: The process of interpreting fault notifications and other alerts
and alarms, isolating faults, correlating them, and deducing underlying
Causes. See <xref target="sec-fm-mgmt"/> for more information.</t>
        </li>
        <li>
          <t>Information Model: An abstraction and representation of the
entities in a managed environment, their properties, attributes
and operations, and the way that they relate to each other. The model is
independent of any specific software usage, protocol,
or platform <xref target="RFC3444"/>. See Sections <xref format="counter" target="sec-interop"/> and <xref format="counter" target="sec-im-design"/> for
further discussion of Information Models.</t>
        </li>
        <li>
          <t>New Protocol and Protocol Extension: These terms are used in this document
to identify entirely new protocols, new versions of existing
protocols, and extensions to protocols.</t>
        </li>
        <li>
          <t>Network Device: A device that implements one or more network
protocols and participates in network operations. This term
encompasses a broad range of implementations, including conventional
network infrastructure equipment (e.g., routers and switches), end
hosts, IoT devices, virtual network functions, and containerized
workloads. In this document, the term is used generically to mean
any managed entity implementing the protocol under consideration.</t>
        </li>
        <li>
          <t>OAM: Operations, Administration, and Maintenance <xref target="RFC6291"/>
            <xref target="I-D.ietf-opsawg-oam-characterization"/> is the term given to the
combination of:  </t>
          <ol spacing="normal" type="1"><li>
              <t>Operation activities that are undertaken to keep the
network running as intended. They include monitoring of the network.</t>
            </li>
            <li>
              <t>Administration activities that keep track of resources in the
network and how they are used. They include the bookkeeping necessary
to track networking resources.</t>
            </li>
            <li>
              <t>Maintenance activities focused on facilitating repairs and upgrades.
They also involve corrective and preventive measures to make the
managed network run more effectively.</t>
            </li>
          </ol>
        </li>
      </ul>
      <artwork><![CDATA[
 The broader concept of "operations and management" that is the
 subject of this document encompasses OAM, in addition to other
 management and provisioning tools and concepts. This is
 sometimes known as "OAM and Management" or "O&M" as
 explained in {{RFC6291}}.
]]></artwork>
      <ul spacing="normal">
        <li>
          <t>Operator: A person or organization responsible for deploying and managing
systems, services, or networks that run or rely on a protocol implementation.
This includes, but is not limited to,
network operators, cloud service administrators, IoT device fleet
managers, home network administrators, and DNS/NTP server
administrators. The term "operator" is used throughout this document
in this broad sense unless the context explicitly requires a narrower
scope.</t>
        </li>
        <li>
          <t>Probable Root Cause: See <xref target="I-D.ietf-nmop-network-incident-yang"/></t>
        </li>
        <li>
          <t>Problem: See <xref target="I-D.ietf-nmop-terminology"/>.</t>
        </li>
        <li>
          <t>Proprietary Interface: An interface to manage a network element
that is not standardized. As such, the user interface, syntax, and
semantics typically vary significantly between implementations.
Examples of proprietary interfaces include Command Line
Interface (CLI), management web portal and Browser User Interface (BUI),
Graphical User Interface (GUI), and vendor-specific application
programming interface (API).</t>
        </li>
        <li>
          <t>Protocol Designer: An individual, a group of
people, or an IETF WG involved in the development and specification
of New Protocols or Protocol Extensions.</t>
        </li>
        <li>
          <t>Technical Document:
This includes any document that describes the
design, specification, implementation, or deployment of a new Protocol or Protocol Extensions.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-doc-req-ietf-spec">
      <name>Documentation Requirements for IETF Specifications</name>
      <section anchor="sec-oper-manag-considerations">
        <name>"Operational Considerations" Section</name>
        <t>All Internet-Drafts that document a technical specification for a New Protocol
   or Protocol Extension or describe their use are required to include an "Operational Considerations" section
   if it is the intention that they will be advanced for publication as IETF RFCs.
   Internet-Drafts that do not document technical specifications, such as process, policy, or administrative
   Internet-Drafts, are not required to include such a section.</t>
        <t>After evaluating the operational (<xref target="sec-oper-consid"/>) and manageability (<xref target="sec-mgmt-consid"/>) aspects of a New
   Protocol or Protocol Extension, the resulting practices and
   requirements should be documented
   in an "Operational Considerations" section within the
   specification. Since protocols are intended for operational deployment and
   management within real networks, it is expected that such considerations
   will be present.</t>
        <t>It is also recommended that operational and manageability considerations
   be addressed early in the protocol design process. Consequently, early
   revisions of Internet-Drafts are highly encouraged to include an "Operational
   Considerations" section.</t>
        <t>An "Operational Considerations" section should include a discussion of
   the management and operations topics raised in this document.
   When one or more of these topics is not relevant, it would be helpful
   to include a brief statement explaining why it is not
   relevant or applicable for the New Protocol or Protocol Extension.
   Of course, additional relevant operational and manageability topics
   should be included as well. A concise checklist of key questions is
   provided in <xref target="sec-checklist"/>.</t>
        <t>Data Models (e.g., YANG) and other schema artifacts (JSON schema, YAML, CDDL, etc.)
  may be consumed out of the RFCs that specify them. As such, it is recommended
  that operational aspects for a data model (and similar artifacts) are
  documented as part of the model itself. Such considerations should not be
  duplicated in the narrative part of a specification that includes such artifacts.</t>
        <t>For example:</t>
        <ul empty="true">
          <li>
            <t>Readers may refer to the following non-exhaustive list for examples of specifications, covering various areas,
with adequate documentation of operational considerations, including manageability: <xref target="I-D.ietf-core-dns-over-coap"/>,
<xref target="I-D.ietf-suit-mti"/>, <xref target="RFC9937"/> <xref target="RFC7574"/>, <xref target="RFC9877"/>, and <xref target="RFC9552"/>.
Given the various available transport alternatives, <xref target="I-D.ietf-core-dns-over-coap"/> discusses co-existence with
those and clarifies some key deployment aspects such as redirection, forwarding loop prevention, and error handling.
Also, <xref target="I-D.ietf-ippm-ioam-integrity-yang"/> is an example of a document that follows
the above guidance by documenting operational aspects as part of the YANG module itself.</t>
          </li>
        </ul>
        <t>For architecture documents, an "Operational Considerations" section is expected only where the architecture introduces new operational considerations with normative implications for downstream protocol designs. When included, it should focus on describing the intended deployment environment, assumptions about network operations, potential impacts on existing operational practices, and any high-level requirements that future protocol designs should address. It is not expected to detail specific configuration parameters or management interfaces unless they are integral to the architecture itself. If the architecture document does not introduce new operational considerations, the exemption statement in <xref target="sec-null-sec"/> applies.</t>
      </section>
      <section anchor="sec-null-sec">
        <name>"Operational Considerations" Section Boilerplate When No New Considerations Exist</name>
        <t>After a Protocol Designer has considered the manageability
   requirements of a New Protocol or Protocol Extension, they may determine that no
   management functionality or operational best-practice clarifications are
   needed. It would be helpful to
   reviewers, those who may update or write extensions to the protocol in the
   future, and those deploying the protocol, to know the rationale
   for the decisions on the protocol's manageability at the
   time of its design.</t>
        <t>If there are no new manageability or deployment considerations, the "Operational Considerations" section
   must contain the following simple statement, followed by a brief explanation of
   why that is the case.</t>
        <artwork><![CDATA[
  "There are no new operations or manageability requirements introduced
    by this document.

    Explanation: [brief rationale goes here]"
]]></artwork>
        <t>The presence of such a
   section would indicate to the reader that due
   consideration has been given to manageability and operations.</t>
        <t>When the specification is a Protocol Extension, and the base protocol
   already addresses the relevant operational and manageability
   considerations, it is helpful to reference the considerations section
   of the base document.</t>
      </section>
      <section anchor="sec-placement-sec">
        <name>Placement of the "Operational Considerations" Section</name>
        <t>It is recommended that the section be
   placed immediately before the Security Considerations section.
   Reviewers interested in this section will find it easily, and this
   placement could simplify the development of tools to detect its
   presence.</t>
      </section>
      <section anchor="sec-2360-update">
        <name>Update to RFC 2360</name>
        <t>This document replaces this text from Section <xref target="RFC2360" section="2.14" sectionFormat="bare"/> of RFC 2360 <xref target="BCP22"/>:</t>
        <blockquote>
          <t>When relevant, each standard needs to discuss how to manage the
protocol being specified.  This management process should be
compatible with the current IETF Standard management protocol.  In
addition, a MIB must be defined within the standard or in a companion
document.  The MIB must be compatible with current Structure of
Management Information (SMI) and parseable using a tool such as
SMICng.  Where management or a MIB is not necessary this section of
the standard should explain the reason it is not relevant to the
protocol.</t>
        </blockquote>
        <t>with the following:</t>
        <blockquote>
          <t>When relevant, each standard needs to discuss how to manage the
protocol being specified. Refer to RFC XXXX for holistic manageability and operational
considerations.</t>
        </blockquote>
        <ul empty="true">
          <li>
            <t>Note to the RFC Editor: Please replace RFC XXXX with the RFC number to be assigned to this document.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-oper-consid">
      <name>How Will the New Protocol or Protocol Extension Fit into the Current Environment?</name>
      <t>Designers of a New Protocol or Protocol Extension should carefully consider the operational
   aspects of real-world deployments, which can directly
   impact its success. Such aspects include
   interactions with existing solutions, upgrade or deployment paths,
   the ability to debug problems, ease of configuration,
   and a state diagram that operations
   staff can understand. This exercise
   need not be reflected directly in their document, but could help visualize how
   to apply the protocol in the environments where it will be deployed.
   <xref target="RFC5218"/> provides a more detailed discussion on what makes for a successful protocol.</t>
      <t>For example:</t>
      <ul empty="true">
        <li>
          <t>BGP flap damping <xref target="RFC2439"/> was designed to block
   high-frequency route flaps.  Some BGP implementations were memory-constrained
   so often elected not to support this function, others found a
   conflict where path exploration caused false flap damping resulting
   in loss of reachability.  As a result, flap damping was often not
   enabled network-wide, contrary to the intentions of the original
   designers.</t>
        </li>
      </ul>
      <section anchor="sec-install">
        <name>Installation and Initial Setup</name>
        <t>Anything that can be configured can be misconfigured. "Architectural
   Principles of the Internet" <xref target="RFC1958"/>, Section 3.8, states:</t>
        <blockquote>
          <t>Avoid
   options and parameters whenever possible. Any options and parameters
   should be configured or negotiated dynamically rather than manually.</t>
        </blockquote>
        <t>The New Protocol or Protocol Extension should be able to operate "out of the box".
   To simplify configuration, Protocol Designers should
   specify reasonable defaults, including default modes and
   parameters. For example, define
   default values for modes, timers, default state of logical control
   variables, default transports, and so on.</t>
        <t>Protocol Designers should explain the background of the chosen default
   values and provide the rationale.
   In many cases, as
   technology changes, the documented values might make less and less
   sense. It is helpful to understand whether defaults are based on
   best current practice and are expected to change as technologies
   advance, or whether they have a more universal value that should not
   be changed lightly. For example, the default interface speed might
   change over time as network speeds increase,
   and cryptographic algorithms might be expected to change
   over time as older algorithms are "broken".</t>
        <t>Default values should generally favor the conservative side over the
   "optimizing performance" side (e.g., the initial Round-Trip Time (RTT) and
   Round-Trip Time Variance (RTTVAR) values of a TCP connection <xref target="RFC6298"/>).</t>
        <t>For parameters that can vary (e.g., speed-dependent), instead of using a
   constant, set the default value as a function of the
   variable to reduce the
   risk of problems caused by technology advancement.</t>
        <t>For example:</t>
        <ul empty="true">
          <li>
            <t>Where protocols involve cryptographic keys, Protocol Designers should
   consider not only key generation and validation mechanisms but also the
   format in which private keys are stored, transmitted, and restored.
   Designers should specify any expected consistency checks
   (e.g., recomputing an expanded key from the seed) that help verify
   correctness and integrity. Additionally, guidance should be given on
   data retention, restoration limits, and cryptographic module
   interoperability when importing/exporting private key material. Refer to <xref target="I-D.ietf-lamps-dilithium-certificates"/> for an example of how such considerations are incorporated.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-migration">
        <name>Migration Path</name>
        <t>If the New Protocol or Protocol Extension is a new version of an existing one, or if it is
   replacing another technology, the Protocol Designer should consider
   how deployments should transition to the New Protocol or Protocol
   Extension. This should include coexistence with previously deployed
   protocols and/or previous versions of the same protocol, management of
   incompatibilities between versions, translation between versions,
   and consideration of potential side effects. A key question is:
   Are older protocols or versions disabled, or do they coexist
   with the New Protocol or Protocol Extension in the network?</t>
        <t>Many protocols benefit from being incrementally deployable --
   operators may deploy some aspects of a protocol before deploying
   it fully, or may deploy to only some nodes in a network before applying to all nodes in the network. In those cases, the operational considerations should
   also specify whether the New Protocol or Protocol Extension requires any changes to
   the existing infrastructure, particularly the network.
   If so, the protocol specification should describe the nature of those
   changes, where they are required, and how they can be introduced in
   a manner that facilitates deployment.</t>
        <t>Incentivizing good security operation practices when migrating to the New Protocol or Protocol Extension should be encouraged. For example, patching is fundamental for security operations and can be incentivized if Protocol Designers consider supporting cheap and fast connection hand-offs and reconnections.</t>
        <t>When Protocol Designers are considering how deployments should transition to the New Protocol or Protocol Extension, impacts to current techniques employed by operators should be documented and mitigations included, where possible, so that consistent security operations and management can be achieved. Note that transitioning between security mechanisms can be challenging, but it is not desirable to take an easier approach if that leaves data in an open or less-protected
state during the transition.
   Refer to <xref target="RFC8170"/> for a detailed discussion on transition versus coexistence.</t>
      </section>
      <section anchor="sec-other">
        <name>Requirements on Other Protocols and Functional Components</name>
        <t>Protocol Designers should consider the requirements that the New
   Protocol might put on other protocols and functional components and
   should also document the requirements from other protocols and
   functional components that have been considered in designing the New
   Protocol.</t>
        <t>These considerations should generally remain illustrative to avoid
   creating restrictions or dependencies, or potentially impacting the
   behavior of existing protocols, or restricting the extensibility of
   other protocols, or assuming other protocols will not be extended in
   certain ways. If restrictions or dependencies exist, they should be
   stated.</t>
        <t>For example:</t>
        <ul empty="true">
          <li>
            <t>The design of the Resource ReSerVation Protocol (RSVP)
   <xref target="RFC2205"/> required each router to look at the RSVP PATH message and,
   if the router understood RSVP, add its own address to the message to
   enable automatic tunneling through non-RSVP routers. But in reality,
   routers cannot look at an otherwise normal IP packet and potentially
   take it off the fast path! The initial designers overlooked that a
   new "deep-packet inspection" requirement was being put on the
   functional components of a router. The "router alert" option
   (<xref target="RFC2113"/>, <xref target="RFC2711"/>) was finally developed to solve this problem,
   for RSVP and other protocols that require the router to take some
   packets off the fast-forwarding path. Yet, Router Alert has its own
   problems in impacting router performance and security. Refer to <xref target="RFC9805"/> for
   deprecation of the IPv6 Router Alert Option for New Protocols and
   Section <xref target="RFC7126" section="4.8" sectionFormat="bare"/> of RFC 7126 <xref target="BCP186"/> for threats and advice related to IPv4 Router Alert.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-impact">
        <name>Impact on Network Operation</name>
        <t>The introduction of a New Protocol or Protocol Extension may
   have an impact on the operation of existing networks, as well as on the
   hosts, devices, and systems that implement or depend on the protocol.
   As discussed in <xref section="2.1" sectionFormat="of" target="RFC6709"/>
   major extensions may have characteristics leading to a risk of
   operational
   problems. Protocol
   Designers should outline such operational impacts (which may be positive),
   including scaling benefits or concerns, and interactions with other protocols.
   Protocol Designers should describe the scenarios in which the New
   Protocol or its extensions are expected to be applicable or
   beneficial. This includes any relevant deployment environments,
   network topologies, usage constraints such as limited domains
   <xref target="RFC8799"/>, or use cases that justify or constrain adoption.
   For example, a New Protocol or Protocol Extension that doubles the number of active,
   reachable addresses in a network might have implications for the
   scalability of interior gateway protocols, and such impacts should
   be evaluated accordingly. Per Section <xref target="RFC2360" section="2.15" sectionFormat="bare"/> of RFC 2360 <xref target="BCP22"/>, New Protocol or Protocol Extension specifications
   should establish the limitations on the scale of use and limits on the resources used.</t>
        <t>If the protocol specification requires changes to end hosts or network
   infrastructure, it should indicate whether safeguards exist to protect
   both end hosts and devices and the broader network from potential
   overload. Moreover, Per Section <xref target="RFC2360" section="2.16" sectionFormat="bare"/> of RFC 2360 <xref target="BCP22"/>, New Protocol
   or Protocol Extension specifications should address any possible destabilizing events,
   and means by which the protocol resists or recovers from them. For instance, a congestion control algorithm must
   comply with <xref target="BCP133"/> to prevent congestion collapse and ensure
   network stability.</t>
        <t>A protocol could send active monitoring packets on the wire. Without careful
   consideration, active monitoring might achieve high accuracy at the cost of
   generating an excessive number of monitoring packets.</t>
        <t>Protocol Designers should consider the potential impact on the
   behavior of other protocols in the network and on the traffic levels
   and traffic patterns that might change, including specific types of
   traffic, such as multicast. Also, consider the need to install new
   components that are added to the network as a result of changes in
   the configuration, such as servers performing auto-configuration
   operations.</t>
        <t>Protocol Designers should also consider the impact on infrastructure
   applications such as the DNS <xref target="RFC1034"/>, the
   registries, or the size of routing tables.</t>
        <t>For example:</t>
        <ul empty="true">
          <li>
            <t>SMTP <xref target="RFC5321"/> servers use a reverse DNS lookup to filter
   out incoming connection requests: when Berkeley installed a new spam filter that used reverse DNS lookup,
   their mail server stopped functioning because of overload of the DNS
   cache resolver.</t>
          </li>
        </ul>
        <t>The impact of New Protocols or Protocol Extensions, and the results
of new OAM tools developed for them,
must be considered with respect to
traffic delivery performance and ongoing manageability. For
example, it must be noted whether the New Protocol, Protocol Extension,
or OAM tools cause increased delay or jitter in real-time traffic
applications, or increased response time in client-server
applications. Further, if the additional traffic caused by OAM tools
and data collection could result in the management plane becoming
overwhelmed, then this must be called out, and suitable mechanisms to
rate limit the OAM traffic must be considered. Potential options include: document the limitations, propose solution track(s), include an optional rate limiting feature in the specifications, or impose a rate limiting feature in the specifications.</t>
        <t>For example:</t>
        <ul empty="true">
          <li>
            <t>(1) In Bidirectional Forwarding Detection for MPLS <xref target="RFC5884"/> it is
possible to configure very rapid BFD transmissions (of the order of
3ms) on a very large number of parallel Label Switched Paths (LSPs)
with the result that the management systems and end nodes may become
overwhelmed -- this can be protected by applying limits to
the number of LSPs that may be tested at once.</t>
            <t>(2) Notifications or logs from systems (through YANG or other means)
should be rate-limited so that they do not flood the receiving
management station.</t>
            <t>(3) The application of sophisticated encryption or filtering rules
needs to be considered in the light of the additional processing
they may impose on the hardware forwarding path for traffic.</t>
          </li>
        </ul>
        <t>New metrics may be required to assess traffic performance. Protocol Designers may refer to <xref target="RFC6390"/> for guidelines for considering new performance metrics.</t>
        <t>It is important to minimize the impact caused by configuration
   changes. Given configuration A and configuration B, it should be
   possible to generate the operations necessary to get from A to B with
   minimal state changes and effects on network and systems.</t>
      </section>
      <section anchor="sec-impact-secops">
        <name>Impact on Security Operations</name>
        <t>Security Operations (SecOps) is a collaborative approach that combines security and operational teams to improve the ability of operators to protect and manage the network effectively and efficiently <xref target="SECOPS"/>. Security operators detect malicious activity and respond to threats and are a crucial part of defending against attacks alongside the management and operation of the network.</t>
        <t>Protocol Designers should consider the impacts of a New Protocol or Protocol Extension on Security Operations in networks that the protocol will be deployed in.</t>
        <t>Security operators extensively rely upon Indicators of Compromise (IoCs) <xref target="RFC9424"/>. The deployment of a New Protocol or Protocol Extension may change the type, locations, or availability of IoCs. Protocol Designers should outline such changes to ensure operators can manage and defend their networks, systems, and devices consistently.
Consider the operators' requirement for digital forensics from the network or endpoints with critical information found in logs. Logging events schema and guidance for operators should be considered when designing a New Protocol or Protocol Extension to ensure operators have the information they need. <xref target="I-D.ietf-quic-qlog-main-schema"/> is an example of extensible structured logging.</t>
        <t>Tooling required by security operators should be documented in the design and deployment of a New Protocol or Protocol Extension. Operators may require new tooling or methods for managing network traffic in response to protocol changes to ensure consistent availability and performance of networks. Similarly, updating and augmenting existing forensic tools such as protocol dissectors is expected when a New Protocol is deployed, but having to completely rebuild such tooling would greatly reduce the effectiveness of security operators, so protocol extensibility should be considered.</t>
      </section>
      <section anchor="sec-oper-verify">
        <name>Verifying Correct Operation</name>
        <t>An important function that should be provided is guidance on how to
   verify the correct operation of a protocol. A Protocol Designer
   may suggest testing techniques for qualifying and quantifying the impact of the protocol on
   the network before it is partially or fully deployed, as well as testing techniques for
   identifying the effects that the protocol might have on the network after being
   deployed.</t>
        <t>Protocol Designers should consider techniques for testing the
   effect the protocol has had on the infrastructure by sending data
   through it and observing its behavior (a.k.a., active
   monitoring). Protocol Designers should consider how the correct
   end-to-end operation of the New Protocol or Protocol Extension can be tested
   actively and passively, and how the correct data- or forwarding-plane
   function of each involved element can be verified to be working
   correctly with the New Protocol or Protocol Extension. Which metrics are of interest?</t>
        <t>Protocol Designers should consider how to test the correct end-to-end
   operation of the service or network, how to verify correct
   protocol behavior, and whether such verification is achieved by testing
   the service function and/or the forwarding function of
   each network element. This may be accomplished through the collection of status and
   statistical information gathered from devices.</t>
        <t>Having simple protocol status and health indicators on involved
   devices is a recommended means to check correct operation.</t>
      </section>
      <section anchor="sec-messages">
        <name>Message Formats</name>
        <t>Where protocol specifications result in messages (such as errors or warnings) being carried as text strings or output for consumption by human operators, consideration should be given to making it possible for implementations to be configured so that the messages can be viewed in the local language. In such cases, it is helpful to transmit a specific message code (i.e., a number) along with the message text, and to include a language tag (as described in <xref target="BCP47"/>) to enable correct identification and rendering in the appropriate language. Protocol specifications should not assume English as the default language.</t>
        <t>Further discussion of Internationalization issues may be found in <xref target="BCP166"/>.</t>
      </section>
    </section>
    <section anchor="sec-mgmt-consid">
      <name>How Will the Protocol Be Managed?</name>
      <t>The considerations of manageability should start from identifying the
   entities to be managed, as well as how the managed protocol is
   supposed to be installed, configured, and monitored.</t>
      <t>Considerations for management should describe what aspects of the system
   require management and the management functions that need to be
   supported. This includes identifying any assumptions or constraints
   relevant to management interactions, such as the types of interfaces or
   protocols required. These considerations should avoid dependence on a
   specific management deployment model and should remain applicable
   regardless of where management systems are located or how they are
   accessed.</t>
      <t>The management model should take into account factors such as:</t>
      <ul spacing="normal">
        <li>
          <t>What type of management entities will be involved (agents, network
management systems)?</t>
        </li>
        <li>
          <t>What is the possible architecture (client-server, manager-agent,
poll-driven or event-driven, auto-configuration, two-levels or
hierarchical)?</t>
        </li>
        <li>
          <t>What are the management operations (initial configuration, dynamic
configuration, alarm and exception reporting, logging, performance
monitoring, performance reporting, debugging)?</t>
        </li>
        <li>
          <t>How are these operations performed (locally, remotely, atomic
operation, scripts)? Are they performed immediately or are they
time scheduled, or event triggered?</t>
        </li>
      </ul>
      <t>Protocol Designers should consider how the New Protocol or Protocol Extension will be
   managed in different deployment scales. It might be sensible to use
   a local management interface to manage the New Protocol or Protocol Extension on a single
   device, but in a large network, remote management using a centralized
   server and/or using distributed management functionality might make
   more sense. Auto-configuration and default parameters might be
   possible for some New Protocols or Protocol Extensions.</t>
      <t>Management needs to be considered not only from the perspective of a
   device, but also from the perspective of network and service
   management. A service might be network and operational functionality
   derived from the implementation and deployment of a New Protocol or Protocol Extension.
   Often, an individual network element is unaware of the service being
   delivered.</t>
      <t>WGs should consider how to configure multiple related/co-operating
   devices and how to back off if one of those configurations fails or
   causes trouble. Network Configuration Protocol (NETCONF) <xref target="RFC6241"/>
   addresses this in a generic manner
   by allowing an operator to lock the configuration on multiple
   devices, perform the configuration settings/changes, check that they
   are OK (undo if not), and then unlock the devices.</t>
      <t>Techniques for debugging protocol interactions in a network must be
   part of the network management discussion. Implementation source
   code should be debugged before ever being added to a network, so
   asserts and memory dumps do not normally belong in management data
   models. However, debugging on-the-wire interactions is a protocol
   issue: while the messages can be seen by sniffing, it is enormously
   helpful if a protocol specification supports features that make
   debugging of network interactions and behaviors easier. There could
   be alerts issued when messages are received or when there are state
   transitions in the protocol state machine. However, the state
   machine is often not part of the on-the-wire protocol; the state
   machine explains how the protocol works so that an implementer can
   decide, in an implementation-specific manner, how to react to a
   received event.</t>
      <t>In a client/server protocol, it may be more important to instrument
   the server end of a protocol than the client end, since the
   performance of the server might impact more nodes than the
   performance of a specific client.</t>
      <section anchor="sec-mgmt-tech">
        <name>Available Management Technologies</name>
        <t>The IETF provides several standardized management protocols suitable for
   various operational purposes, for example as outlined in <xref target="RFC6632"/>.
   Note that SNMP is no longer recommended for configuration (read-write)
   operations.  Better programmatic alternatives are discussed
   further in Section <xref format="counter" target="sec-interop"/>. This  document formally deprecates the following recommendation from <xref target="BCP22"/>:</t>
        <blockquote>
          <t>a MIB must be defined within the standard or in a companion  document.</t>
        </blockquote>
        <t>Readers seeking more in-depth definitions or explanations should consult
   the referenced materials.</t>
      </section>
      <section anchor="sec-interop">
        <name>Interoperability</name>
        <t>Management interoperability is critical for enabling information exchange
   and operations across diverse network devices and management applications,
   regardless of vendor, model, or software release. It facilitates the use
   of third-party applications and outsourced management services.</t>
        <t>While individual device management via Proprietary Interfaces may
   suffice for small deployments, large-scale networks comprising equipment
   from multiple vendors necessitate consistent, automated management.
   Relying on vendor- and model-specific interfaces for extensive deployments,
   such as hundreds of branch offices, severely impedes scalability and automation
   of operational processes. The primary goal of management interoperability is to
   enable the scalable deployment and lifecycle management of new network functions
   and services, while ensuring a clear understanding of their operational impact
   and total cost of ownership.</t>
        <t>Achieving universal agreement on a single management syntax and protocol is
   challenging. However, the IETF has significantly evolved its approach to
   network management, moving beyond Structure of Management Information
   version 2 (SMIv2) and SNMP. Modern IETF management solutions primarily
   leverage YANG <xref target="RFC7950"/> for Data Modeling and NETCONF <xref target="RFC6241"/> or
   RESTful Configuration Protocol (RESTCONF) <xref target="RFC8040"/> for protocol
   interactions. This shift, as further elaborated in <xref target="RFC6632"/>, emphasizes
   structured Data Models and programmatic interfaces to enhance automation and
   interoperability. Other protocols, such as IP Flow Information Export
   (IPFIX) <xref target="RFC7011"/> for flow accounting and syslog (System Logging
   Protocol) <xref target="RFC5424"/> for logging, continue to play specific roles in
   comprehensive network management.</t>
        <t>Interoperability must address both syntactic and semantic aspects. While syntactic variations
   across implementations can often be handled through adaptive processing, semantic differences pose a
   greater challenge, as the meaning of data is intrinsically tied to the managed entity.</t>
        <t>Information Models (IMs) enable and provide the foundation for semantic interoperability. An IM defines the
   conceptual understanding of managed information, independent of specific protocols or vendor
   implementations. This allows for consistent interpretation and correlation of data across different
   data models (and hence management protocols), such as a YANG Data Model and IPFIX Information Elements concerning the same
   event. For instance, an IM can standardize how error conditions are counted, ensuring that a counter
   has the same meaning whether collected via NETCONF or exported via IPFIX.</t>
        <t>Protocol Designers should consider developing an IM, when multiple Data Model (DM)
   representations (e.g., YANG and/or IPFIX) are required, to ensure lossless
   semantic mapping. IMs are also beneficial for complex or numerous DMs. As illustrated in Figure 1, an
   IM serves as a conceptual blueprint for designers and operators, from which concrete DMs are derived
   for implementers. <xref target="RFC3444"/> provides further guidance on distinguishing IMs from DMs.</t>
        <figure anchor="fig-im-dm">
          <name>Information Models (IMs) and Data Models (DMs)</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="144" width="464" viewBox="0 0 464 144" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,64 L 8,80" fill="none" stroke="black"/>
                <path d="M 96,48 L 96,80" fill="none" stroke="black"/>
                <path d="M 176,64 L 176,80" fill="none" stroke="black"/>
                <path d="M 232,32 L 248,32" fill="none" stroke="black"/>
                <path d="M 8,64 L 176,64" fill="none" stroke="black"/>
                <path d="M 232,96 L 248,96" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="256,96 244,90.4 244,101.6" fill="black" transform="rotate(0,248,96)"/>
                <polygon class="arrowhead" points="256,32 244,26.4 244,37.6" fill="black" transform="rotate(0,248,32)"/>
                <g class="text">
                  <text x="100" y="36">IM</text>
                  <text x="336" y="36">conceptual/abstract</text>
                  <text x="440" y="36">model</text>
                  <text x="272" y="52">for</text>
                  <text x="328" y="52">designers</text>
                  <text x="376" y="52">&amp;</text>
                  <text x="424" y="52">operators</text>
                  <text x="12" y="100">DM</text>
                  <text x="100" y="100">DM</text>
                  <text x="180" y="100">DM</text>
                  <text x="328" y="100">concrete/detailed</text>
                  <text x="424" y="100">model</text>
                  <text x="296" y="116">for</text>
                  <text x="364" y="116">implementers</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="center"><![CDATA[
           IM               --> conceptual/abstract model
           |                    for designers & operators
+----------+---------+
|          |         |
DM         DM        DM     --> concrete/detailed model
                                   for implementers

]]></artwork>
          </artset>
        </figure>
        <t>Protocol Designers must identify the essential operational, configuration, state, and statistical
   information required for effective monitoring, control, and troubleshooting of New Protocols or Protocol Extensions.
   This includes defining relevant parameters, performance metrics, error indicators,
   and contextual data crucial for diagnostics and lifecycle management.</t>
        <t>To ensure interoperability, management protocol and Data Model standards should incorporate clear
   compliance clauses, specifying the expected level of support.</t>
      </section>
      <section anchor="sec-mgmt-info">
        <name>Management Information</name>
        <t>Languages used to describe an Information Model can influence the
   nature of the model. Using a particular data modeling language, such
   as YANG, influences the model to use certain types of structures, for
   example, hierarchical trees, groupings, and reusable types.
   YANG, as described in <xref target="RFC6020"/> and <xref target="RFC7950"/>, provides advantages
   for expressing network information, including clear separation of
   configuration data and operational state, support for constraints and
   dependencies, and extensibility for evolving requirements. Its ability
   to represent relationships and dependencies in a structured and modular
   way makes it an effective choice for defining management information
   models.</t>
        <t>While an Information Model is typically described in English text
   (or sometimes UML) to define the conceptual management requirements,
   authors may choose to express it using YANG Data Structure Extensions <xref target="RFC8791"/>
   as described in <xref target="sec-im-design"/>.  Using YANG for the Information Model can make
   it easier to link abstract concepts to concrete data types in the corresponding Data Model,
   helping maintain consistency between high-level design and practical deployment.</t>
        <t>A management Information Model should include a discussion of what is
   manageable, which aspects of the protocol need to be configured, what
   types of operations are allowed, what protocol-specific events might
   occur, which events can be counted, and for which events an operator
   should be notified.</t>
        <t>When defining management information, it is important to categorize
   data into configuration, operational state, and statistics. Conflating
   these distinct types into a single element makes it difficult for operators
   to distinguish between administratively set values and the dynamic state of
   the protocol. The model should be structured to allow these categories to be
   handled independently.</t>
        <t>What is typically difficult to work through are relationships between
   abstract objects. Ideally, an Information Model would describe the
   relationships between the objects and concepts in the information
   model.</t>
        <t>Is there always just one instance of this object or can there be
   multiple instances? Does this object relate to exactly one other
   object, or may it relate to multiple? When is it possible to change a
   relationship?</t>
        <t>Do objects (such as instances in lists) share fate? For example, if an
   instance in list A must exist before a related instance in list B can be
   created, what happens to the instance in list B if the related instance in
   list A is deleted? Does the existence of relationships between
   objects have an impact on fate sharing? YANG's relationships and
   constraints can help express and enforce these relationships.</t>
        <section anchor="sec-im-design">
          <name>Information Model Design</name>
          <t>This document recommends keeping the Information Model as simple as
   possible by applying the following criteria:</t>
          <ol spacing="normal" type="1"><li>
              <t>Start with a small set of essential objects and make additions only as
further objects are needed, with the objective of keeping the absolute
number of objects as small as possible while still delivering the
required function. Essential objects are those needed to answer the
diagnostic, configuration, and operational questions the protocol is
expected to support; objects that are technically accessible but do not
serve these functions should be excluded. There should be no duplication
between objects, and where one piece of information can be derived from
other pieces of information, it should not itself be represented as an
object.</t>
            </li>
            <li>
              <t>Verify that each object serves a distinct management purpose and cannot
be derived from other objects already in the model. Objects that are
redundant or that conflate multiple concerns should be split or
eliminated.</t>
            </li>
            <li>
              <t>Consider evidence of current use of the managed protocol, and the perceived utility of objects added to the Information Model.</t>
            </li>
            <li>
              <t>Exclude objects that can be derived from others in this or
other information models.</t>
            </li>
            <li>
              <t>Avoid heavy instrumentation of performance-critical code paths or
state that is expensive to query or compute. A guideline is to limit
instrumentation to one counter per significant processing stage or
operational boundary per layer.</t>
            </li>
            <li>
              <t>When expressing an Information Model using YANG Data Structure Extensions <xref target="RFC8791"/> (thereby keeping it abstract and implementation-agnostic per <xref target="RFC3444"/>), ensure that the Information Model remains simple, modular, and clear by following the authoring guidelines in <xref target="I-D.ietf-netmod-rfc8407bis"/>.</t>
            </li>
            <li>
              <t>When illustrating the abstract Information Model, use YANG Tree Diagrams <xref target="RFC8340"/> to provide a simple, standardized, and implementation-neutral model structure.</t>
            </li>
          </ol>
        </section>
        <section anchor="sec-yang-dm">
          <name>YANG Data Model Considerations</name>
          <t>When considering YANG Data Models for a new specification, there
  are multiple types of Data Models that may be applicable. The
  hierarchy and relationship between these types is described in
  <xref section="3.5.1" sectionFormat="of" target="I-D.ietf-netmod-rfc8407bis"/>. A new specification
  may require or benefit from one or more of these YANG Data Model types.</t>
          <ul spacing="normal">
            <li>
              <t>Device Models - Also called Network Element Models,
represent the configuration, operational state, and notifications of
individual devices. These models are designed to distinguish
between these types of data and support querying and updating
device-specific parameters. Consideration should be given to
how device-level models might fit with broader network and
service Data Models.</t>
            </li>
            <li>
              <t>Network Models - Also called Network Service Models, define abstractions
for managing the behavior and relationships of multiple devices
and device subsystems within a network. As described in <xref target="RFC8199"/>,
these models are used to manage network-wide. These abstractions are
useful to network operators and applications that interface with network
controllers. Examples of network models include the L3VPN Network Model
(L3NM) <xref target="RFC9182"/> and the L2VPN Network Model (L2VPN) <xref target="RFC9291"/>.</t>
            </li>
            <li>
              <t>Service Models - Also called Customer Service Models,
defined in <xref target="RFC8309"/>, are designed to abstract the customer interface
into a service. They consider customer-centric parameters such as
Service Level Agreement (SLA) and high-level policy (e.g., network intent).
Given that different operators and different customers may have widely-varying
business processes, these models should focus on common aspects of a service
with strong multi-party consensus. Examples of service models include
the L3VPN Service Model (L3SM) <xref target="RFC8299"/> and the L2VPN Service Model (L2SM)
<xref target="RFC8466"/>.</t>
            </li>
          </ul>
          <t>A common challenge in YANG Data Model development lies in defining the
  relationships between abstract service or network constructs and the
  underlying device models. Therefore, when designing Network and Service
  YANG modules, consider how the status and relationships of abstract or
  distributed constructs can be reflected based on parameters available
  in the network.</t>
          <t>For example, the status of a service may depend on the operational state
  of multiple network elements to which the service is attached. In such
  cases, the YANG Data Model (and its accompanying documentation) should
  clearly describe how service-level status is derived from underlying
  device-level information. Similarly, it is beneficial to define
  events (and relevant triggered notifications) that indicate changes in an underlying state,
  enabling reliable detection and correlation of service-affecting
  conditions. Including such mechanisms improves the robustness of
  integrations and helps ensure consistent behavior across
  implementations.</t>
          <t>Specific guidelines to consider when authoring any type of YANG
  modules are described in <xref target="I-D.ietf-netmod-rfc8407bis"/>.</t>
        </section>
      </section>
      <section anchor="sec-fm-mgmt">
        <name>Fault Management</name>
        <t>Protocol Designers should identify and document
   essential Faults, health indicators, alarms, and events that must be
   propagated to management applications or exposed through a Data
   Model. It is also recommended to describe how the Protocol Extension
   will affect the existing alarms and notification structure of the
   base Protocol, and to outline the potential impact of misconfigurations
   of the Protocol Extensions.</t>
        <t>Protocol Designers should consider how Fault information will be
   propagated. Will it be done using asynchronous notifications or
   polling of health indicators?</t>
        <t>If notifications are used to alert operators to certain conditions,
   then Protocol Designers should discuss mechanisms to throttle
   notifications to prevent congestion and duplications of event
   notifications. Will there be a hierarchy of Faults, and will the
   Fault reporting be done by each Fault in the hierarchy, or will only
   the lowest Fault be reported and the higher levels be suppressed?
   Should there be aggregated status indicators based on concatenation
   of propagated Faults from a given domain or device?</t>
        <t>Notifications (e.g., SNMP traps and informs, syslog, or protocol-specific mechanisms) can alert an operator when an
   aspect of the New Protocol or Protocol Extension fails or encounters an error or failure
   condition.
   Should the event reporting provide guaranteed accurate delivery of
   the event information within a given (high) margin of confidence?
   Can the latest events in the box be polled?</t>
        <section anchor="sec-monitor">
          <name>Liveness Detection and Monitoring</name>
          <t>Protocol Designers should build in basic testing features
   (e.g., ICMP echo, UDP
   or TCP echo services, and null Remote Procedure Calls
   (RPCs)) that can be used to test for liveness, with the option to
   enable or disable them.</t>
          <t>Mechanisms for monitoring the liveness of the protocol and for
   detecting Faults in protocol connectivity are usually built into
   protocols. In some cases, mechanisms already exist within other
   protocols responsible for maintaining lower-layer connectivity (e.g.,
   ICMP echo), but often new procedures are required to detect failures
   and to report rapidly, allowing remedial action to be taken.</t>
          <t>These liveness monitoring mechanisms do not typically require
   additional management capabilities. However, when a system detects a
   Fault, there is often a requirement to coordinate recovery action
   through management applications or at least to record the fact in an
   event log.</t>
        </section>
        <section anchor="sec-fault-determ">
          <name>Fault Determination</name>
          <t>It can be helpful to describe how Faults can be pinpointed using
   management information. For example, counters might record instances
   of error conditions. Some Faults might be able to be pinpointed by
   comparing the outputs of one device and the inputs of another device,
   looking for anomalies. Protocol Designers should consider what
   counters should count. If a single counter provided by vendor A
   counts three types of error conditions, while the corresponding
   counter provided by vendor B counts seven types of error conditions,
   these counters cannot be compared effectively -- they are not
   interoperable counters.</t>
          <t>How do you distinguish between faulty messages and good messages?</t>
          <t>Would some threshold-based mechanisms be usable to help determine
   error conditions? Are notifications for all events needed, or
   are there some "standard" notifications that could be used? Or can
   relevant counters be polled as needed?</t>
          <t>For example:</t>
          <ul empty="true">
            <li>
              <t>Remote Monitoring (RMON) events/alarms provide a threshold-based mechanism.</t>
            </li>
          </ul>
        </section>
        <section anchor="sec-cause-analysis">
          <name>Probable Root Cause Analysis</name>
          <t>Probable Root Cause analysis is about working out where the foundational
   Fault or Problem might be. Since one Fault may give rise to another Fault or
   Problem, a probable root cause is commonly meant to describe the original,
   source event or combination of circumstances that is the foundation of all
   related Faults.</t>
          <t>For example:</t>
          <ul empty="true">
            <li>
              <t>If end-to-end data delivery is failing (e.g., reported by a
   notification), Probable Root Cause analysis can help find the failed link
   or node, or mis-configuration, within the end-to-end path.</t>
            </li>
          </ul>
        </section>
        <section anchor="sec-fault-isol">
          <name>Fault Isolation</name>
          <t>It might be useful to isolate or quarantine Faults. Protocol Designers
   should consider fault isolation mechanisms appropriate to the deployment
   environment. At the network level, this might involve configuring
   next-hop devices to drop faulty messages to prevent them from
   propagating through the network, such as isolating a device that emits
   malformed messages that are necessary to coordinate connections properly.
   At the host level, isolation mechanisms may include process quarantine,
   container or virtual machine isolation, or disabling a misbehaving
   protocol implementation without disrupting other services on the same
   device. The range of appropriate isolation mechanisms will depend on
   where the protocol is deployed and the nature of the Fault.</t>
        </section>
      </section>
      <section anchor="sec-config-mgmt">
        <name>Configuration Management</name>
        <t>Configuration management applies to a broad range of deployment
   environments, including conventional network devices, IoT device fleets,
   containerized workloads, cloud-hosted services, and home network
   equipment. While many examples in this section are drawn from network
   device management, the principles apply equally to any environment where
   the protocol is deployed. Protocol Designers should consider how
   configuration is managed in the environments relevant to their protocol,
   acknowledging centralized configuration management approaches (e.g.,
   intent-based or model-driven systems) beyond conventional per-device
   management.</t>
        <t>A Protocol Designer should document the basic configuration
   parameters that need to be instrumented for a New Protocol or Protocol Extensions, as well
   as default values and modes of operation.</t>
        <t>What information should be maintained across reboots of the device,
   or restarts of the management system?</t>
        <t>"Requirements for Configuration Management of IP-based Networks"{
    {?RFC3139}} discusses requirements for configuration management, including
    discussion of different levels of management, high-level policies,
    network-wide configuration data, and device-local configuration. Network
    configuration extends beyond simple multi-device push or pull operations.
    It also involves ensuring that the configurations being pushed are
    semantically compatible across devices and that the resulting behavior of
    all involved devices corresponds to the intended behavior. Is the
    attachment between them configured compatibly on both ends? Is the
    IS-IS metric the same?
    Answering those questions for a network with one thousand devices is not that easy.</t>
        <t>Several efforts have existed in the IETF to develop policy-based
   configuration management. "Terminology for Policy-Based Management"
   <xref target="RFC3198"/> was written to standardize the terminology across these
   efforts.</t>
        <t>Implementations should not arbitrarily modify configuration data. If a
   Protocol Designer defines mechanisms for configuration, it would be
   preferable to standardize the order of elements for consistency of
   configuration and of reporting across vendors and across releases
   from vendors.</t>
        <t>Network-wide configurations may be stored in central databases
   and transformed into readable formats that can be pushed to devices, either by
   generating sequences of CLI commands or complete textual configuration files
   that are pushed to devices. There is no common database schema for
   network configuration, although the models used by various operators
   are probably very similar. It is operationally beneficial to
   extract, document, and standardize the common parts of these network-wide
   configuration database schemas. A Protocol Designer should
   consider how to standardize the common parts of configuring the New
   Protocol, while recognizing that vendors may also have proprietary
   aspects of their configurations.</t>
        <t>It is important to enable operators to concentrate on the
   configuration of the network or service as a whole, rather than individual
   devices. Support for configuration transactions across several
   devices could significantly simplify network configuration
   management. The ability to distribute configurations to multiple
   devices, or to modify candidate configurations on multiple devices,
   and then activate them in a near-simultaneous manner might help.
   Protocol Designers can consider how it would make sense for their
   protocol to be configured across multiple devices. Configuration
   templates might also be helpful.</t>
        <t>Consensus of the 2002 IAB Network Management Workshop <xref target="RFC3535"/> was that textual
   configuration files should be able to contain international characters.
   For human-readable strings carried in protocols, <xref target="RFC5198"/> provides
   guidance on the use of UTF-8 with NFC normalization for consistent
   encoding of Unicode text; protocol elements that are not intended for
   human consumption may remain in ASCII. Requirements for the encoding of
   device-local configuration files are generally outside the scope of IETF
   standardization and should be handled appropriately for the deployment
   environment.</t>
        <t>A mechanism to dump-and-restore configurations is a primitive
   operation needed by operators. Standards for pulling and pushing
   configurations from/to devices are highly beneficial.</t>
        <t>Given configuration A and configuration B, it should be possible to
   generate the operations necessary to get from A to B with minimal
   state changes and effects on network and systems. It is important to
   minimize the impact caused by configuration changes.</t>
        <t>A Protocol Designer should consider the configurable items that exist
   for the control of function via the protocol elements described in
   the protocol specification. For example, sometimes the protocol
   requires that timers can be configured by the operator to ensure
   specific policy-based behavior by the implementation. These timers
   should have default values suggested in the protocol specification
   and may not need to be otherwise configurable.</t>
      </section>
      <section anchor="sec-acc-mgmt">
        <name>Accounting Management</name>
        <t>A Protocol Designer should consider whether it would be appropriate
   to collect usage information related to this protocol and, if so,
   what usage information would be appropriate to collect.</t>
        <t>"Introduction to Accounting Management" <xref target="RFC2975"/> discusses a number
   of factors relevant to monitoring usage of protocols for purposes of
   capacity and trend analysis, cost allocation, auditing, and billing.
   The document also discusses how some existing protocols can be used
   for these purposes. These factors should be considered when
   designing a protocol whose usage might need to be monitored or when
   recommending a protocol to do usage accounting.</t>
      </section>
      <section anchor="sec-perf-mgmt">
        <name>Performance Management</name>
        <t>From a manageability point of view, it is important to determine how
   well a network deploying the protocol or technology defined in the
   document is doing. In order to do this, the network operators need
   to consider information that would be useful to determine the
   performance characteristics of a deployed system using the target
   protocol.</t>
        <t>The IETF, via the Benchmarking Methodology WG (BMWG), has defined
   recommendations for the measurement of the performance
   characteristics of various internetworking technologies in a
   laboratory environment, including the systems or services that are
   built from these technologies. Each benchmarking recommendation
   describes the class of equipment, system, or service being addressed;
   discusses the performance characteristics that are pertinent to that
   class; clearly identifies a set of metrics that aid in the
   description of those characteristics; specifies the methodologies
   required to collect said metrics; and lastly, presents the
   requirements for the common, unambiguous reporting of benchmarking
   results. Search for "benchmark" in the RFC search tool.</t>
        <t>Performance metrics may be useful in multiple environments and for
   different protocols. The IETF, via the IP Performance Measurement
   (IPPM) WG, has developed a set of standard metrics that can be
   applied to the quality, performance, and reliability of Internet data
   delivery services. These metrics are designed such that they can be
   performed by network operators, end users, or independent testing
   groups. The existing metrics might be applicable to the new
   protocol. Search for "metric" in the RFC search tool. In some
   cases, new metrics need to be defined. It would be useful if the
   protocol documentation identified the need for such new metrics. For
   performance management, it is often more important to report the time
   spent in a state rather than just the current state. Snapshots alone
   are typically of less value.</t>
        <t>There are several parts of performance management to consider:
   protocol monitoring, device monitoring (the impact of new
   functionality/service activation on the device), network monitoring,
   and service monitoring (the impact of service activation on the
   network). Hence, if the implementation of the
   New Protocol or Protocol Extension has any significant hardware/software performance implications
   (e.g., increased CPU utilization, memory consumption, or forwarding
   performance degradation), the Protocol Designers should clearly
   describe these impacts in the specification, along with any
   conditions under which they may occur and possible mitigation
   strategies.</t>
        <section anchor="sec-monitor-proto">
          <name>Monitoring the Protocol</name>
          <t>Certain properties of protocols are useful to monitor. The number of
   protocol packets received, the number of packets sent, and the number
   of packets dropped are usually very helpful to operators.</t>
          <t>Packet drops should be reflected in counter variable(s) somewhere
   that can be inspected -- both from the security point of view and
   from the troubleshooting point of view.</t>
          <t>Counter definitions should be unambiguous about what is included in
   the count and what is not included in the count.</t>
          <t>Consider the expected behaviors for counters -- what is a reasonable
   maximum value for expected usage? Should they stop counting at the
   maximum value and retain it, or should they rollover?
   Guidance should explain how rollovers are detected, including multiple
   occurrences.</t>
          <t>Consider whether multiple management applications will share a
   counter; if so, then no one management application should be allowed
   to reset the value to zero since this will impact other applications.</t>
          <t>Could events, such as hot-swapping a blade in a chassis, cause
   discontinuities in counter? Does this make any difference in
   evaluating the performance of a protocol?</t>
          <t>The protocol specification should clearly define any inherent
   limitations and describe expected behavior when those limits
   are exceeded. These considerations should be made independently
   of any specific management protocol or data modeling language.
   In other words, focus on what makes sense for the protocol being
   managed, not the protocol used for management. If a constraint
   is not specific to a management protocol, then it should be left
   to Data Model designers of that protocol to determine how to handle it.</t>
          <t>For example:</t>
          <ul empty="true">
            <li>
              <t>VLAN identifiers (VLAN IDs) are defined by the standard to range from 1 to 4094.
   Therefore, a YANG "vlan-id" definition representing the
   12-bit VLAN ID used in the VLAN Tag header uses a range of "1..4094".</t>
            </li>
          </ul>
        </section>
        <section anchor="sec-monitor-dev">
          <name>Monitoring the Device</name>
          <t>Consider whether device performance will be affected by the number of
   protocol entities being instantiated on the device. Designers of an
   Information Model should include information, accessible at runtime,
   about the maximum number of instances an implementation can support,
   the current number of instances, and the expected behavior when the
   current instances exceed the capacity of the implementation or the
   capacity of the device.</t>
          <t>Designers of an Information Model should provide runtime information
   about the maximum supported instances, the current number of instances,
   and expected behavior when capacity is exceeded.</t>
        </section>
        <section anchor="sec-monitor-net">
          <name>Monitoring the Network</name>
          <t>Consider whether network performance will be affected by the number
   of protocol entities being deployed.</t>
          <t>Consider the capability of determining the operational activity, such
   as the number of messages in and the messages out, the number of
   received messages rejected due to format Problems, and the expected
   behaviors when a malformed message is received.</t>
          <t>What are the principal performance factors that need to be considered
   when measuring the operational performance of a network built using
   the protocol? Is it important to measure setup times, end-to-end
   connectivity, hop-by-hop connectivity, or network throughput?</t>
        </section>
        <section anchor="sec-monitor-svc">
          <name>Monitoring the Service</name>
          <t>What are the principal performance factors that need to be considered
   when measuring the performance of a service using the protocol? Is
   it important to measure application-specific throughput, client-server
   associations, end-to-end application quality, service interruptions,
   or user experience (UX)?</t>
          <t>Note that monitoring a service must consider the utility to the user.
   This includes responsiveness, smoothness (absence of jitter), throughput,
   and other "quality of experience" factors.</t>
        </section>
      </section>
      <section anchor="sec-security-mgmt">
        <name>Security Management</name>
        <t>Protocol Designers should consider how to monitor and manage security
   aspects and vulnerabilities of the New Protocol or Protocol Extension.
   Likewise, Protocol Designers should consider how some operations (e.g., logging)
   might include privacy-sensitive information, which ought to be controlled
   to avoid access by unauthorized entities.</t>
        <t>Protocol Designers should consider whether a system automatically
   notify operators of every event Occurrence as default behavior or
   should define an operator-defined threshold to control when a
   notification is sent to an operator.</t>
        <t>Protocol Designers should assess whether and which statistics need to
   be collected about the operation of the New Protocol that might be
   useful for detecting attacks (e.g., the receipt of malformed
   messages, messages out of order, or messages with invalid
   timestamps). If such statistics are collected, care should be taken
   to evaluate whether it is important to count them separately for
   each sender to help identify the source of attacks.</t>
        <t>Security-oriented manageability topics may include risks of insufficient
   monitoring, regulatory issues with missing audit trails, log capacity
   limits, and security exposures in recommended management mechanisms.</t>
        <t>Protocol Designers should consider security threats that may be
   introduced by management operations.</t>
        <t>For example:</t>
        <ul empty="true">
          <li>
            <t>Control and Provisioning of Wireless Access
   Points (CAPWAP) <xref target="RFC5415"/> breaks the structure of monolithic Access Points
   (APs) into Access Controllers and Wireless Termination Points (WTPs).
   By using a control protocol or management protocol, internal
   information that was previously not accessible is now exposed over
   the network and to management applications and may become a source of
   potential security threats.</t>
          </li>
        </ul>
        <t>The granularity of access control needed on management interfaces
   needs to match operational needs. Typical requirements are a role-based
   access control model and the principle of least privilege,
   where a user can be given only the minimum access necessary to
   perform a required task.</t>
        <t>Some operators wish to do consistency checks of ACLs
   across devices. Protocol Designers should consider Information
   Models to promote comparisons across devices and across vendors to
   permit checking the consistency of security configurations.</t>
        <t>Protocol Designers should consider how to provide a secure transport,
   authentication, identity, and access control that integrates well
   with existing key and credential management infrastructure. It is a
   good idea to start with defining the threat model for the protocol,
   and from that deducing what is required.</t>
        <t>Protocol Designers should consider how ACLs are
   maintained and updated.</t>
        <t>Notifications (e.g., syslog messages) might
   already exist, or can be defined, to alert operators to the
   conditions identified in the Security Considerations for the New
   Protocol or Protocol Extension. The syslog should also record events,
   such as failed logins, but it must be secured.</t>
        <t>For example:</t>
        <ul empty="true">
          <li>
            <t>All commands entered by operators can be logged via syslog to provide
   an audit trail.  Authentication events, including logins, logouts, and
   failed login attempts, can be recorded using the Secure Shell (SSH)
   Protocol <xref target="RFC4251"/>, capturing the source of each connection.</t>
          </li>
        </ul>
        <t>Different management protocols use different assumptions about
   message security and data-access controls. A Protocol Designer that
   recommends using different protocols should consider how security
   will be applied in a balanced manner across multiple management
   interfaces. SNMP authority levels and policy are data-oriented,
   while CLI authority levels and policy are usually command-oriented
   (i.e., task-oriented). Depending on the management function,
   sometimes data-oriented or task-oriented approaches make more sense.
   Protocol Designers should consider both data-oriented and task-oriented
   authority levels and policy. Refer also to <xref target="RFC8341"/> for more details on access control types and rules.</t>
      </section>
    </section>
    <section anchor="sec-oper-mgmt-tooling">
      <name>Operational and Management Tooling Considerations</name>
      <t>The operational community's ability to effectively adopt and
   use new specifications is significantly influenced by the availability
   and adaptability of appropriate tooling. In this context, "tools" refers
   to software systems or utilities used by network operators to deploy,
   configure, monitor, troubleshoot, and manage networks or network protocols
   in real-world operational environments. While the introduction of a new
   specification does not automatically mandate the development of entirely
   new tools, careful consideration must be given to how existing tools can be
   leveraged or extended to support the management and operation of these new
   specifications.</t>
      <t>The <xref target="NEMOPS"/> workshop highlighted a
   consistent theme applicable beyond network management protocols: the
   "ease of use" and adaptability of existing tools are critical factors
   for successful adoption. Therefore, a new specification should provide
   examples using existing, common tooling, or running code that demonstrate
   how to perform key operational tasks.</t>
      <t>Specifically, the following tooling-related aspects should be considered in the operational considerations section,
   prioritizing the adaptation of existing tools:</t>
      <ul spacing="normal">
        <li>
          <t>Leveraging Existing Tooling: Before considering new tools, assess whether
existing tooling, such as monitoring systems, logging platforms,
configuration management systems, and/or orchestration frameworks, can be
adapted to support the new specification. This may involve developing
plugins, modules, or drivers that enable these tools to interact with
the new specification.</t>
        </li>
        <li>
          <t>Extending Existing Tools: Identify areas where existing tools can be
extended to provide the necessary visibility and control over the new
specification. For example, if a new transport protocol is introduced,
consider whether existing network monitoring tools can be extended to
track its performance metrics or whether existing security tools can be
adapted to analyze its traffic patterns.</t>
        </li>
        <li>
          <t>New Tools: Only when existing tools are demonstrably
inadequate for managing and operating the elements of the new specification
should the development of new tools be considered. In such cases,
carefully define the specific requirements for these new tools, focusing
on the functionalities that cannot be achieved through adaptation or
extension of existing solutions.</t>
        </li>
        <li>
          <t>IETF Hackathons for Manageability Testing:
IETF Hackathons <xref target="IETF-HACKATHONS"/>
provide an opportunity to test the functionality, interoperability,
and manageability of New Protocols or Protocol Extensions. These events can be specifically
leveraged to assess the operational (including manageability) implications
of a New Protocol or Protocol Extension by focusing tasks on:  </t>
          <ul spacing="normal">
            <li>
              <t>Adapting existing tools to interact with the new specification.</t>
            </li>
            <li>
              <t>Developing example management scripts or modules for existing management
platforms.</t>
            </li>
            <li>
              <t>Testing the specification's behavior under various operational conditions.</t>
            </li>
            <li>
              <t>Identifying potential tooling gaps and areas for improvement.</t>
            </li>
            <li>
              <t>Creating example flows and use cases for manageability.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Open Source for Tooling: If new tools are deemed necessary, or if significant
adaptations to existing tools are required, prioritize open source development
with community involvement. Open source tools lower the barrier to entry,
encourage collaboration, and provide operators with the flexibility to customize
and extend the tools to meet their specific needs.</t>
        </li>
      </ul>
      <section anchor="sec-ai-tooling">
        <name>AI Tooling Considerations</name>
        <t>With the increasing adoption of Artificial Intelligence (AI)
   in network operations, Protocol Designers
   must consider the implication such functions may have on New Protocols
   and Protocol Extensions. AI
   models often require extensive and granular data for training and
   inference, requiring efficient, scalable, and secure mechanisms
   for telemetry, logging, and state information collection. Protocol Designers
   should anticipate that AI-powered management tools may generate
   frequent and potentially aggressive querying patterns on network
   devices and controllers. Therefore, protocols should be designed with Data
   Models and mechanisms intended to prevent overload from automated
   interactions, while also accounting for AI-specific security
   considerations such as data integrity and protection against
   adversarial attacks on management interfaces. These considerations
   are also relevant to Performance Management (Section <xref format="counter" target="sec-perf-mgmt"/>)
   and Security Management (Section <xref format="counter" target="sec-security-mgmt"/>).</t>
      </section>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document does not have any IANA actions required.</t>
    </section>
    <section anchor="sec-oper-mgmt-consid">
      <name>Operational Considerations</name>
      <t>Although this document focuses on operations and manageability guidance, it does not define a New Protocol, a Protocol Extension, or an architecture. As such, there are no new operations or manageability requirements introduced by this document.</t>
    </section>
    <section anchor="sec-security">
      <name>Security Considerations</name>
      <t>This document provides guidelines for Protocol Designers for
   considering manageability and operations. It introduces no new
   security concerns.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <referencegroup anchor="BCP22" target="https://www.rfc-editor.org/info/bcp22">
          <reference anchor="RFC2360" target="https://www.rfc-editor.org/info/rfc2360">
            <front>
              <title>Guide for Internet Standards Writers</title>
              <author fullname="G. Scott" initials="G." surname="Scott"/>
              <date month="June" year="1998"/>
              <abstract>
                <t>This document is a guide for Internet standard writers. It defines those characteristics that make standards coherent, unambiguous, and easy to interpret. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="22"/>
            <seriesInfo name="RFC" value="2360"/>
            <seriesInfo name="DOI" value="10.17487/RFC2360"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC8791">
          <front>
            <title>YANG Data Structure Extensions</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Björklund" initials="M." surname="Björklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document describes YANG mechanisms for defining abstract data structures with YANG.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8791"/>
          <seriesInfo name="DOI" value="10.17487/RFC8791"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="I-D.ietf-nmop-terminology">
          <front>
            <title>Some Key Terms for Network Fault and Problem Management</title>
            <author fullname="Nigel Davis" initials="N." surname="Davis">
              <organization>Ciena</organization>
            </author>
            <author fullname="Adrian Farrel" initials="A." surname="Farrel">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Chaode Yu" initials="C." surname="Yu">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="18" month="August" year="2025"/>
            <abstract>
              <t>   This document sets out some terms that are fundamental to a common
   understanding of network fault and problem management within the
   IETF.

   The purpose of this document is to bring clarity to discussions and
   other work related to network fault and problem management, in
   particular to YANG data models and management protocols that report,
   make visible, or manage network faults and problems.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-terminology-23"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="CHECKLIST" target="https://github.com/IETF-OPS-DIR/Review-Template/tree/main">
          <front>
            <title>Operations and Management Review Checklist</title>
            <author>
              <organization/>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="IETF-OPS-Dir" target="https://datatracker.ietf.org/group/opsdir/about/">
          <front>
            <title>Ops Directorate (opsdir)</title>
            <author>
              <organization/>
            </author>
            <date year="2025"/>
          </front>
        </reference>
        <reference anchor="IETF-HACKATHONS" target="https://www.ietf.org/meeting/hackathons/">
          <front>
            <title>IETF Hackathons</title>
            <author>
              <organization>IETF</organization>
            </author>
            <date year="2025" month="May" day="01"/>
          </front>
        </reference>
        <reference anchor="SECOPS" target="https://niccs.cisa.gov/resources/glossary">
          <front>
            <title>NICCS Glossary</title>
            <author>
              <organization/>
            </author>
            <date year="2025" month="August"/>
          </front>
        </reference>
        <referencegroup anchor="BCP186" target="https://www.rfc-editor.org/info/bcp186">
          <reference anchor="RFC7126" target="https://www.rfc-editor.org/info/rfc7126">
            <front>
              <title>Recommendations on Filtering of IPv4 Packets Containing IPv4 Options</title>
              <author fullname="F. Gont" initials="F." surname="Gont"/>
              <author fullname="R. Atkinson" initials="R." surname="Atkinson"/>
              <author fullname="C. Pignataro" initials="C." surname="Pignataro"/>
              <date month="February" year="2014"/>
              <abstract>
                <t>This document provides advice on the filtering of IPv4 packets based on the IPv4 options they contain. Additionally, it discusses the operational and interoperability implications of dropping packets based on the IP options they contain.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="186"/>
            <seriesInfo name="RFC" value="7126"/>
            <seriesInfo name="DOI" value="10.17487/RFC7126"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC5706">
          <front>
            <title>Guidelines for Considering Operations and Management of New Protocols and Protocol Extensions</title>
            <author fullname="D. Harrington" initials="D." surname="Harrington"/>
            <date month="November" year="2009"/>
            <abstract>
              <t>New protocols or protocol extensions are best designed with due consideration of the functionality needed to operate and manage the protocols. Retrofitting operations and management is sub-optimal. The purpose of this document is to provide guidance to authors and reviewers of documents that define new protocols or protocol extensions regarding aspects of operations and management that should be considered. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5706"/>
          <seriesInfo name="DOI" value="10.17487/RFC5706"/>
        </reference>
        <referencegroup anchor="BCP72" target="https://www.rfc-editor.org/info/bcp72">
          <reference anchor="RFC3552" target="https://www.rfc-editor.org/info/rfc3552">
            <front>
              <title>Guidelines for Writing RFC Text on Security Considerations</title>
              <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
              <author fullname="B. Korver" initials="B." surname="Korver"/>
              <date month="July" year="2003"/>
              <abstract>
                <t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak. This document provides guidelines to RFC authors on how to write a good Security Considerations section. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="72"/>
            <seriesInfo name="RFC" value="3552"/>
            <seriesInfo name="DOI" value="10.17487/RFC3552"/>
          </reference>
          <reference anchor="RFC9416" target="https://www.rfc-editor.org/info/rfc9416">
            <front>
              <title>Security Considerations for Transient Numeric Identifiers Employed in Network Protocols</title>
              <author fullname="F. Gont" initials="F." surname="Gont"/>
              <author fullname="I. Arce" initials="I." surname="Arce"/>
              <date month="July" year="2023"/>
              <abstract>
                <t>Poor selection of transient numerical identifiers in protocols such as the TCP/IP suite has historically led to a number of attacks on implementations, ranging from Denial of Service (DoS) or data injection to information leakages that can be exploited by pervasive monitoring. Due diligence in the specification of transient numeric identifiers is required even when cryptographic techniques are employed, since these techniques might not mitigate all the associated issues. This document formally updates RFC 3552, incorporating requirements for transient numeric identifiers, to prevent flaws in future protocols and implementations.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="72"/>
            <seriesInfo name="RFC" value="9416"/>
            <seriesInfo name="DOI" value="10.17487/RFC9416"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="BCP14" target="https://www.rfc-editor.org/info/bcp14">
          <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
            <front>
              <title>Key words for use in RFCs to Indicate Requirement Levels</title>
              <author fullname="S. Bradner" initials="S." surname="Bradner"/>
              <date month="March" year="1997"/>
              <abstract>
                <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="14"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
          </reference>
          <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
            <front>
              <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
              <author fullname="B. Leiba" initials="B." surname="Leiba"/>
              <date month="May" year="2017"/>
              <abstract>
                <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="14"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC3444">
          <front>
            <title>On the Difference between Information Models and Data Models</title>
            <author fullname="A. Pras" initials="A." surname="Pras"/>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <date month="January" year="2003"/>
            <abstract>
              <t>There has been ongoing confusion about the differences between Information Models and Data Models for defining managed objects in network management. This document explains the differences between these terms by analyzing how existing network management model specifications (from the IETF and other bodies such as the International Telecommunication Union (ITU) or the Distributed Management Task Force (DMTF)) fit into the universe of Information Models and Data Models. This memo documents the main results of the 8th workshop of the Network Management Research Group (NMRG) of the Internet Research Task Force (IRTF) hosted by the University of Texas at Austin. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3444"/>
          <seriesInfo name="DOI" value="10.17487/RFC3444"/>
        </reference>
        <reference anchor="RFC6291">
          <front>
            <title>Guidelines for the Use of the "OAM" Acronym in the IETF</title>
            <author fullname="L. Andersson" initials="L." surname="Andersson"/>
            <author fullname="H. van Helvoort" initials="H." surname="van Helvoort"/>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <author fullname="S. Mansfield" initials="S." surname="Mansfield"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>At first glance, the acronym "OAM" seems to be well-known and well-understood. Looking at the acronym a bit more closely reveals a set of recurring problems that are revisited time and again.</t>
              <t>This document provides a definition of the acronym "OAM" (Operations, Administration, and Maintenance) for use in all future IETF documents that refer to OAM. There are other definitions and acronyms that will be discussed while exploring the definition of the constituent parts of the "OAM" term. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="161"/>
          <seriesInfo name="RFC" value="6291"/>
          <seriesInfo name="DOI" value="10.17487/RFC6291"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-oam-characterization">
          <front>
            <title>Guidelines for Characterizing the Term "OAM"</title>
            <author fullname="Carlos Pignataro" initials="C." surname="Pignataro">
              <organization>Blue Fern
      Consulting</organization>
            </author>
            <author fullname="Adrian Farrel" initials="A." surname="Farrel">
              <organization>Old Dog Consulting</organization>
            </author>
            <author fullname="Tal Mizrahi" initials="T." surname="Mizrahi">
              <organization>Huawei</organization>
            </author>
            <date day="28" month="January" year="2026"/>
            <abstract>
              <t>   As the IETF continues to produce and standardize different
   Operations, Administration, and Maintenance (OAM) protocols and
   technologies, various qualifiers and modifiers are prepended to the
   OAM abbreviation.  While, at first glance, the most used appear to be
   well understood, the same qualifier may be interpreted differently in
   different contexts.  A case in point is the qualifiers "in-band" and
   "out-of-band" which have their origins in the radio lexicon, and
   which have been extrapolated into other communication networks.  This
   document recommends not to use these two terms when referring to OAM.

   This document considers some common qualifiers and modifiers that are
   prepended, within the context of packet networks, to the OAM
   abbreviation and lays out guidelines for their use in IETF documents.

   This document extends RFC 6291 by adding to the guidelines for the
   use of the term "OAM" with qualifiers.  It does not modify any part
   of RFC 6291.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-oam-characterization-17"/>
        </reference>
        <reference anchor="I-D.ietf-nmop-network-incident-yang">
          <front>
            <title>A YANG Data Model for Network Incident Management</title>
            <author fullname="Tong Hu" initials="T." surname="Hu">
              <organization>CMCC</organization>
            </author>
            <author fullname="Luis M. Contreras" initials="L. M." surname="Contreras">
              <organization>Telefonica</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <author fullname="Nigel Davis" initials="N." surname="Davis">
              <organization>Ciena</organization>
            </author>
            <author fullname="Chong Feng" initials="C." surname="Feng">
         </author>
            <date day="13" month="February" year="2026"/>
            <abstract>
              <t>   This document defines a YANG Module for the network incident
   lifecycle management.  This YANG module is meant to provide a
   standard way to report, diagnose, and help reduce troubleshooting
   tickets and resolve network incidents for the sake of network service
   health and probable cause analysis.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-nmop-network-incident-yang-08"/>
        </reference>
        <reference anchor="I-D.ietf-core-dns-over-coap">
          <front>
            <title>DNS over CoAP (DoC)</title>
            <author fullname="Martine Sophie Lenders" initials="M. S." surname="Lenders">
              <organization>TUD Dresden University of Technology</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Cenk Gündoğan" initials="C." surname="Gündoğan">
              <organization>NeuralAgent GmbH</organization>
            </author>
            <author fullname="Thomas C. Schmidt" initials="T. C." surname="Schmidt">
              <organization>HAW Hamburg</organization>
            </author>
            <author fullname="Matthias Wählisch" initials="M." surname="Wählisch">
              <organization>TUD Dresden University of Technology &amp; Barkhausen Institut</organization>
            </author>
            <date day="16" month="September" year="2025"/>
            <abstract>
              <t>   This document defines a protocol for exchanging DNS queries (OPCODE
   0) over the Constrained Application Protocol (CoAP).  These CoAP
   messages can be protected by (D)TLS-Secured CoAP (CoAPS) or Object
   Security for Constrained RESTful Environments (OSCORE) to provide
   encrypted DNS message exchange for constrained devices in the
   Internet of Things (IoT).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-dns-over-coap-20"/>
        </reference>
        <reference anchor="I-D.ietf-suit-mti">
          <front>
            <title>Cryptographic Algorithms for Internet of Things (IoT) Devices</title>
            <author fullname="Brendan Moran" initials="B." surname="Moran">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Øyvind Rønningstad" initials="O." surname="Rønningstad">
              <organization>Nordic Semiconductor</organization>
            </author>
            <author fullname="Akira Tsukamoto" initials="A." surname="Tsukamoto">
              <organization>Openchip &amp; Software Technologies, S.L.</organization>
            </author>
            <date day="22" month="July" year="2025"/>
            <abstract>
              <t>   The SUIT manifest, as defined in "A Manifest Information Model for
   Firmware Updates in Internet of Things (IoT) Devices" (RFC 9124),
   provides a flexible and extensible format for describing how firmware
   and software updates are to be fetched, verified, decrypted, and
   installed on resource-constrained devices.  To ensure the security of
   these update processes, the manifest relies on cryptographic
   algorithms for functions such as digital signature verification,
   integrity checking, and confidentiality.

   This document defines cryptographic algorithm profiles for use with
   the Software Updates for Internet of Things (SUIT) manifest.  These
   profiles specify sets of algorithms to promote interoperability
   across implementations.

   Given the diversity of IoT deployments and the evolving cryptographic
   landscape, algorithm agility is essential.  This document groups
   algorithms into named profiles to accommodate varying levels of
   device capabilities and security requirements.  These profiles
   support the use cases laid out in the SUIT architecture, published in
   "A Firmware Update Architecture for Internet of Things" (RFC 9019).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-suit-mti-23"/>
        </reference>
        <reference anchor="RFC9937">
          <front>
            <title>Proportional Rate Reduction (PRR)</title>
            <author fullname="M. Mathis" initials="M." surname="Mathis"/>
            <author fullname="N. Cardwell" initials="N." surname="Cardwell"/>
            <author fullname="Y. Cheng" initials="Y." surname="Cheng"/>
            <author fullname="N. Dukkipati" initials="N." surname="Dukkipati"/>
            <date month="December" year="2025"/>
            <abstract>
              <t>This document specifies a Standards Track version of the Proportional Rate Reduction (PRR) algorithm that obsoletes the Experimental version described in RFC 6937. PRR regulates the amount of data sent by TCP or other transport protocols during fast recovery. PRR accurately regulates the actual flight size through recovery such that at the end of recovery it will be as close as possible to the slow start threshold (ssthresh), as determined by the congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9937"/>
          <seriesInfo name="DOI" value="10.17487/RFC9937"/>
        </reference>
        <reference anchor="RFC7574">
          <front>
            <title>Peer-to-Peer Streaming Peer Protocol (PPSPP)</title>
            <author fullname="A. Bakker" initials="A." surname="Bakker"/>
            <author fullname="R. Petrocco" initials="R." surname="Petrocco"/>
            <author fullname="V. Grishchenko" initials="V." surname="Grishchenko"/>
            <date month="July" year="2015"/>
            <abstract>
              <t>The Peer-to-Peer Streaming Peer Protocol (PPSPP) is a protocol for disseminating the same content to a group of interested parties in a streaming fashion. PPSPP supports streaming of both prerecorded (on- demand) and live audio/video content. It is based on the peer-to- peer paradigm, where clients consuming the content are put on equal footing with the servers initially providing the content, to create a system where everyone can potentially provide upload bandwidth. It has been designed to provide short time-till-playback for the end user and to prevent disruption of the streams by malicious peers. PPSPP has also been designed to be flexible and extensible. It can use different mechanisms to optimize peer uploading, prevent freeriding, and work with different peer discovery schemes (centralized trackers or Distributed Hash Tables). It supports multiple methods for content integrity protection and chunk addressing. Designed as a generic protocol that can run on top of various transport protocols, it currently runs on top of UDP using Low Extra Delay Background Transport (LEDBAT) for congestion control.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7574"/>
          <seriesInfo name="DOI" value="10.17487/RFC7574"/>
        </reference>
        <reference anchor="RFC9877">
          <front>
            <title>Registration Data Access Protocol (RDAP) Extension for Geofeed Data</title>
            <author fullname="J. Singh" initials="J." surname="Singh"/>
            <author fullname="T. Harrison" initials="T." surname="Harrison"/>
            <date month="October" year="2025"/>
            <abstract>
              <t>This document defines a new Registration Data Access Protocol (RDAP) extension, "geofeed1", for indicating that an RDAP server hosts geofeed URLs for its IP network objects. It also defines a new media type and a new link relation type for the associated link objects included in responses.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9877"/>
          <seriesInfo name="DOI" value="10.17487/RFC9877"/>
        </reference>
        <reference anchor="RFC9552">
          <front>
            <title>Distribution of Link-State and Traffic Engineering Information Using BGP</title>
            <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
            <date month="December" year="2023"/>
            <abstract>
              <t>In many environments, a component external to a network is called upon to perform computations based on the network topology and the current state of the connections within the network, including Traffic Engineering (TE) information. This is information typically distributed by IGP routing protocols within the network.</t>
              <t>This document describes a mechanism by which link-state and TE information can be collected from networks and shared with external components using the BGP routing protocol. This is achieved using a BGP Network Layer Reachability Information (NLRI) encoding format. The mechanism applies to physical and virtual (e.g., tunnel) IGP links. The mechanism described is subject to policy control.</t>
              <t>Applications of this technique include Application-Layer Traffic Optimization (ALTO) servers and Path Computation Elements (PCEs).</t>
              <t>This document obsoletes RFC 7752 by completely replacing that document. It makes some small changes and clarifications to the previous specification. This document also obsoletes RFC 9029 by incorporating the updates that it made to RFC 7752.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9552"/>
          <seriesInfo name="DOI" value="10.17487/RFC9552"/>
        </reference>
        <reference anchor="I-D.ietf-ippm-ioam-integrity-yang">
          <front>
            <title>A YANG Data Model for In Situ Operations, Administration, and Maintenance (IOAM) Integrity Protected Options</title>
            <author fullname="Justin Iurman" initials="J." surname="Iurman">
              <organization>University of Liege</organization>
            </author>
            <author fullname="Tianran Zhou" initials="T." surname="Zhou">
              <organization>Huawei</organization>
            </author>
            <date day="12" month="January" year="2026"/>
            <abstract>
              <t>   In Situ Operations, Administration, and Maintenance (IOAM) is an
   example of an on-path hybrid measurement method to collect
   operational and telemetry information.  The collected data may then
   be exported to systems that will use it to, e.g., monitor, measure,
   or (re)configure the network.  Integrity Protection of In Situ
   Operations, Administration, and Maintenance (IOAM) Data Fields (RFC
   YYYY) defines IOAM Options with integrity protection, also called
   Integrity Protected Options.  This document defines a YANG module for
   the management of these Integrity Protected Options.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ippm-ioam-integrity-yang-05"/>
        </reference>
        <reference anchor="RFC5218">
          <front>
            <title>What Makes for a Successful Protocol?</title>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <date month="July" year="2008"/>
            <abstract>
              <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success. It is hoped that these observations can serve as guidance for future protocol work. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5218"/>
          <seriesInfo name="DOI" value="10.17487/RFC5218"/>
        </reference>
        <reference anchor="RFC2439">
          <front>
            <title>BGP Route Flap Damping</title>
            <author fullname="C. Villamizar" initials="C." surname="Villamizar"/>
            <author fullname="R. Chandra" initials="R." surname="Chandra"/>
            <author fullname="R. Govindan" initials="R." surname="Govindan"/>
            <date month="November" year="1998"/>
            <abstract>
              <t>A usage of the BGP routing protocol is described which is capable of reducing the routing traffic passed on to routing peers and therefore the load on these peers without adversely affecting route convergence time for relatively stable routes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2439"/>
          <seriesInfo name="DOI" value="10.17487/RFC2439"/>
        </reference>
        <reference anchor="RFC1958">
          <front>
            <title>Architectural Principles of the Internet</title>
            <author fullname="B. Carpenter" initials="B." role="editor" surname="Carpenter"/>
            <date month="June" year="1996"/>
            <abstract>
              <t>The Internet and its architecture have grown in evolutionary fashion from modest beginnings, rather than from a Grand Plan. While this process of evolution is one of the main reasons for the technology's success, it nevertheless seems useful to record a snapshot of the current principles of the Internet architecture. This is intended for general guidance and general interest, and is in no way intended to be a formal or invariant reference model. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1958"/>
          <seriesInfo name="DOI" value="10.17487/RFC1958"/>
        </reference>
        <reference anchor="RFC6298">
          <front>
            <title>Computing TCP's Retransmission Timer</title>
            <author fullname="V. Paxson" initials="V." surname="Paxson"/>
            <author fullname="M. Allman" initials="M." surname="Allman"/>
            <author fullname="J. Chu" initials="J." surname="Chu"/>
            <author fullname="M. Sargent" initials="M." surname="Sargent"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>This document defines the standard algorithm that Transmission Control Protocol (TCP) senders are required to use to compute and manage their retransmission timer. It expands on the discussion in Section 4.2.3.1 of RFC 1122 and upgrades the requirement of supporting the algorithm from a SHOULD to a MUST. This document obsoletes RFC 2988. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6298"/>
          <seriesInfo name="DOI" value="10.17487/RFC6298"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-13"/>
        </reference>
        <reference anchor="RFC8170">
          <front>
            <title>Planning for Protocol Adoption and Subsequent Transitions</title>
            <author fullname="D. Thaler" initials="D." role="editor" surname="Thaler"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>Over the many years since the introduction of the Internet Protocol, we have seen a number of transitions throughout the protocol stack, such as deploying a new protocol, or updating or replacing an existing protocol. Many protocols and technologies were not designed to enable smooth transition to alternatives or to easily deploy extensions; thus, some transitions, such as the introduction of IPv6, have been difficult. This document attempts to summarize some basic principles to enable future transitions, and it also summarizes what makes for a good transition plan.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8170"/>
          <seriesInfo name="DOI" value="10.17487/RFC8170"/>
        </reference>
        <reference anchor="RFC2205">
          <front>
            <title>Resource ReSerVation Protocol (RSVP) -- Version 1 Functional Specification</title>
            <author fullname="R. Braden" initials="R." role="editor" surname="Braden"/>
            <author fullname="L. Zhang" initials="L." surname="Zhang"/>
            <author fullname="S. Berson" initials="S." surname="Berson"/>
            <author fullname="S. Herzog" initials="S." surname="Herzog"/>
            <author fullname="S. Jamin" initials="S." surname="Jamin"/>
            <date month="September" year="1997"/>
            <abstract>
              <t>This memo describes version 1 of RSVP, a resource reservation setup protocol designed for an integrated services Internet. RSVP provides receiver-initiated setup of resource reservations for multicast or unicast data flows, with good scaling and robustness properties. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2205"/>
          <seriesInfo name="DOI" value="10.17487/RFC2205"/>
        </reference>
        <reference anchor="RFC2113">
          <front>
            <title>IP Router Alert Option</title>
            <author fullname="D. Katz" initials="D." surname="Katz"/>
            <date month="February" year="1997"/>
            <abstract>
              <t>This memo describes a new IP Option type that alerts transit routers to more closely examine the contents of an IP packet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2113"/>
          <seriesInfo name="DOI" value="10.17487/RFC2113"/>
        </reference>
        <reference anchor="RFC2711">
          <front>
            <title>IPv6 Router Alert Option</title>
            <author fullname="C. Partridge" initials="C." surname="Partridge"/>
            <author fullname="A. Jackson" initials="A." surname="Jackson"/>
            <date month="October" year="1999"/>
            <abstract>
              <t>This memo describes a new IPv6 Hop-by-Hop Option type that alerts transit routers to more closely examine the contents of an IP datagram. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2711"/>
          <seriesInfo name="DOI" value="10.17487/RFC2711"/>
        </reference>
        <reference anchor="RFC9805">
          <front>
            <title>Deprecation of the IPv6 Router Alert Option for New Protocols</title>
            <author fullname="R. Bonica" initials="R." surname="Bonica"/>
            <date month="June" year="2025"/>
            <abstract>
              <t>This document deprecates the IPv6 Router Alert option. Protocols that use the IPv6 Router Alert option may continue to do so, even in future versions. However, new protocols that are standardized in the future must not use the IPv6 Router Alert option.</t>
              <t>This document updates RFC 2711.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9805"/>
          <seriesInfo name="DOI" value="10.17487/RFC9805"/>
        </reference>
        <reference anchor="RFC6709">
          <front>
            <title>Design Considerations for Protocol Extensions</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="B. Aboba" initials="B." role="editor" surname="Aboba"/>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <date month="September" year="2012"/>
            <abstract>
              <t>This document discusses architectural issues related to the extensibility of Internet protocols, with a focus on design considerations. It is intended to assist designers of both base protocols and extensions. Case studies are included. A companion document, RFC 4775 (BCP 125), discusses procedures relating to the extensibility of IETF protocols. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6709"/>
          <seriesInfo name="DOI" value="10.17487/RFC6709"/>
        </reference>
        <reference anchor="RFC8799">
          <front>
            <title>Limited Domains and Internet Protocols</title>
            <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
            <author fullname="B. Liu" initials="B." surname="Liu"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>There is a noticeable trend towards network behaviors and semantics that are specific to a particular set of requirements applied within a limited region of the Internet. Policies, default parameters, the options supported, the style of network management, and security requirements may vary between such limited regions. This document reviews examples of such limited domains (also known as controlled environments), notes emerging solutions, and includes a related taxonomy. It then briefly discusses the standardization of protocols for limited domains. Finally, it shows the need for a precise definition of "limited domain membership" and for mechanisms to allow nodes to join a domain securely and to find other members, including boundary nodes.</t>
              <t>This document is the product of the research of the authors. It has been produced through discussions and consultation within the IETF but is not the product of IETF consensus.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8799"/>
          <seriesInfo name="DOI" value="10.17487/RFC8799"/>
        </reference>
        <referencegroup anchor="BCP133" target="https://www.rfc-editor.org/info/bcp133">
          <reference anchor="RFC9743" target="https://www.rfc-editor.org/info/rfc9743">
            <front>
              <title>Specifying New Congestion Control Algorithms</title>
              <author fullname="M. Duke" initials="M." role="editor" surname="Duke"/>
              <author fullname="G. Fairhurst" initials="G." role="editor" surname="Fairhurst"/>
              <date month="March" year="2025"/>
              <abstract>
                <t>RFC 5033 discusses the principles and guidelines for standardizing new congestion control algorithms. This document obsoletes RFC 5033 to reflect changes in the congestion control landscape by providing a framework for the development and assessment of congestion control mechanisms, promoting stability across diverse network paths. This document seeks to ensure that proposed congestion control algorithms operate efficiently and without harm when used in the global Internet. It emphasizes the need for comprehensive testing and validation to prevent adverse interactions with existing flows.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="133"/>
            <seriesInfo name="RFC" value="9743"/>
            <seriesInfo name="DOI" value="10.17487/RFC9743"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC1034">
          <front>
            <title>Domain names - concepts and facilities</title>
            <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
            <date month="November" year="1987"/>
            <abstract>
              <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="13"/>
          <seriesInfo name="RFC" value="1034"/>
          <seriesInfo name="DOI" value="10.17487/RFC1034"/>
        </reference>
        <reference anchor="RFC5321">
          <front>
            <title>Simple Mail Transfer Protocol</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <date month="October" year="2008"/>
            <abstract>
              <t>This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete. It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions. Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5321"/>
          <seriesInfo name="DOI" value="10.17487/RFC5321"/>
        </reference>
        <reference anchor="RFC5884">
          <front>
            <title>Bidirectional Forwarding Detection (BFD) for MPLS Label Switched Paths (LSPs)</title>
            <author fullname="R. Aggarwal" initials="R." surname="Aggarwal"/>
            <author fullname="K. Kompella" initials="K." surname="Kompella"/>
            <author fullname="T. Nadeau" initials="T." surname="Nadeau"/>
            <author fullname="G. Swallow" initials="G." surname="Swallow"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>One desirable application of Bidirectional Forwarding Detection (BFD) is to detect a Multiprotocol Label Switching (MPLS) Label Switched Path (LSP) data plane failure. LSP Ping is an existing mechanism for detecting MPLS data plane failures and for verifying the MPLS LSP data plane against the control plane. BFD can be used for the former, but not for the latter. However, the control plane processing required for BFD Control packets is relatively smaller than the processing required for LSP Ping messages. A combination of LSP Ping and BFD can be used to provide faster data plane failure detection and/or make it possible to provide such detection on a greater number of LSPs. This document describes the applicability of BFD in relation to LSP Ping for this application. It also describes procedures for using BFD in this environment. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5884"/>
          <seriesInfo name="DOI" value="10.17487/RFC5884"/>
        </reference>
        <reference anchor="RFC6390">
          <front>
            <title>Guidelines for Considering New Performance Metric Development</title>
            <author fullname="A. Clark" initials="A." surname="Clark"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <date month="October" year="2011"/>
            <abstract>
              <t>This document describes a framework and a process for developing Performance Metrics of protocols and applications transported over IETF-specified protocols. These metrics can be used to characterize traffic on live networks and services. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="170"/>
          <seriesInfo name="RFC" value="6390"/>
          <seriesInfo name="DOI" value="10.17487/RFC6390"/>
        </reference>
        <reference anchor="RFC9424">
          <front>
            <title>Indicators of Compromise (IoCs) and Their Role in Attack Defence</title>
            <author fullname="K. Paine" initials="K." surname="Paine"/>
            <author fullname="O. Whitehouse" initials="O." surname="Whitehouse"/>
            <author fullname="J. Sellwood" initials="J." surname="Sellwood"/>
            <author fullname="A. Shaw" initials="A." surname="Shaw"/>
            <date month="August" year="2023"/>
            <abstract>
              <t>Cyber defenders frequently rely on Indicators of Compromise (IoCs) to identify, trace, and block malicious activity in networks or on endpoints. This document reviews the fundamentals, opportunities, operational limitations, and recommendations for IoC use. It highlights the need for IoCs to be detectable in implementations of Internet protocols, tools, and technologies -- both for the IoCs' initial discovery and their use in detection -- and provides a foundation for approaches to operational challenges in network security.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9424"/>
          <seriesInfo name="DOI" value="10.17487/RFC9424"/>
        </reference>
        <reference anchor="I-D.ietf-quic-qlog-main-schema">
          <front>
            <title>qlog: Structured Logging for Network Protocols</title>
            <author fullname="Robin Marx" initials="R." surname="Marx">
              <organization>Akamai</organization>
            </author>
            <author fullname="Luca Niccolini" initials="L." surname="Niccolini">
              <organization>Meta</organization>
            </author>
            <author fullname="Marten Seemann" initials="M." surname="Seemann">
         </author>
            <author fullname="Lucas Pardue" initials="L." surname="Pardue">
              <organization>Cloudflare</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   qlog provides extensible structured logging for network protocols,
   allowing for easy sharing of data that benefits common debug and
   analysis methods and tooling.  This document describes key concepts
   of qlog: formats, files, traces, events, and extension points.  This
   definition includes the high-level log file schemas, and generic
   event schemas.  Requirements and guidelines for creating protocol-
   specific event schemas are also presented.  All schemas are defined
   independent of serialization format, allowing logs to be represented
   in various ways such as JSON, CSV, or protobuf.

Note to Readers

      Note to RFC editor: Please remove this section before publication.

   Feedback and discussion are welcome at https://github.com/quicwg/qlog
   (https://github.com/quicwg/qlog).  Readers are advised to refer to
   the "editor's draft" at that URL for an up-to-date version of this
   document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-quic-qlog-main-schema-13"/>
        </reference>
        <referencegroup anchor="BCP47" target="https://www.rfc-editor.org/info/bcp47">
          <reference anchor="RFC4647" target="https://www.rfc-editor.org/info/rfc4647">
            <front>
              <title>Matching of Language Tags</title>
              <author fullname="A. Phillips" initials="A." role="editor" surname="Phillips"/>
              <author fullname="M. Davis" initials="M." role="editor" surname="Davis"/>
              <date month="September" year="2006"/>
              <abstract>
                <t>This document describes a syntax, called a "language-range", for specifying items in a user's list of language preferences. It also describes different mechanisms for comparing and matching these to language tags. Two kinds of matching mechanisms, filtering and lookup, are defined. Filtering produces a (potentially empty) set of language tags, whereas lookup produces a single language tag. Possible applications include language negotiation or content selection. This document, in combination with RFC 4646, replaces RFC 3066, which replaced RFC 1766. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="47"/>
            <seriesInfo name="RFC" value="4647"/>
            <seriesInfo name="DOI" value="10.17487/RFC4647"/>
          </reference>
          <reference anchor="RFC5646" target="https://www.rfc-editor.org/info/rfc5646">
            <front>
              <title>Tags for Identifying Languages</title>
              <author fullname="A. Phillips" initials="A." role="editor" surname="Phillips"/>
              <author fullname="M. Davis" initials="M." role="editor" surname="Davis"/>
              <date month="September" year="2009"/>
              <abstract>
                <t>This document describes the structure, content, construction, and semantics of language tags for use in cases where it is desirable to indicate the language used in an information object. It also describes how to register values for use in language tags and the creation of user-defined extensions for private interchange. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="47"/>
            <seriesInfo name="RFC" value="5646"/>
            <seriesInfo name="DOI" value="10.17487/RFC5646"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="BCP166" target="https://www.rfc-editor.org/info/bcp166">
          <reference anchor="RFC6365" target="https://www.rfc-editor.org/info/rfc6365">
            <front>
              <title>Terminology Used in Internationalization in the IETF</title>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <author fullname="J. Klensin" initials="J." surname="Klensin"/>
              <date month="September" year="2011"/>
              <abstract>
                <t>This document provides a list of terms used in the IETF when discussing internationalization. The purpose is to help frame discussions of internationalization in the various areas of the IETF and to help introduce the main concepts to IETF participants. This memo documents an Internet Best Current Practice.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="166"/>
            <seriesInfo name="RFC" value="6365"/>
            <seriesInfo name="DOI" value="10.17487/RFC6365"/>
          </reference>
        </referencegroup>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC6632">
          <front>
            <title>An Overview of the IETF Network Management Standards</title>
            <author fullname="M. Ersue" initials="M." role="editor" surname="Ersue"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <date month="June" year="2012"/>
            <abstract>
              <t>This document gives an overview of the IETF network management standards and summarizes existing and ongoing development of IETF Standards Track network management protocols and data models. The document refers to other overview documents, where they exist and classifies the standards for easy orientation. The purpose of this document is, on the one hand, to help system developers and users to select appropriate standard management protocols and data models to address relevant management needs. On the other hand, the document can be used as an overview and guideline by other Standard Development Organizations or bodies planning to use IETF management technologies and data models. This document does not cover Operations, Administration, and Maintenance (OAM) technologies on the data-path, e.g., OAM of tunnels, MPLS Transport Profile (MPLS-TP) OAM, and pseudowire as well as the corresponding management models. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6632"/>
          <seriesInfo name="DOI" value="10.17487/RFC6632"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC7011">
          <front>
            <title>Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information</title>
            <author fullname="B. Claise" initials="B." role="editor" surname="Claise"/>
            <author fullname="B. Trammell" initials="B." role="editor" surname="Trammell"/>
            <author fullname="P. Aitken" initials="P." surname="Aitken"/>
            <date month="September" year="2013"/>
            <abstract>
              <t>This document specifies the IP Flow Information Export (IPFIX) protocol, which serves as a means for transmitting Traffic Flow information over the network. In order to transmit Traffic Flow information from an Exporting Process to a Collecting Process, a common representation of flow data and a standard means of communicating them are required. This document describes how the IPFIX Data and Template Records are carried over a number of transport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process. This document obsoletes RFC 5101.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="77"/>
          <seriesInfo name="RFC" value="7011"/>
          <seriesInfo name="DOI" value="10.17487/RFC7011"/>
        </reference>
        <reference anchor="RFC5424">
          <front>
            <title>The Syslog Protocol</title>
            <author fullname="R. Gerhards" initials="R." surname="Gerhards"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This document describes the syslog protocol, which is used to convey event notification messages. This protocol utilizes a layered architecture, which allows the use of any number of transport protocols for transmission of syslog messages. It also provides a message format that allows vendor-specific extensions to be provided in a structured way.</t>
              <t>This document has been written with the original design goals for traditional syslog in mind. The need for a new layered specification has arisen because standardization efforts for reliable and secure syslog extensions suffer from the lack of a Standards-Track and transport-independent RFC. Without this document, each other standard needs to define its own syslog packet format and transport mechanism, which over time will introduce subtle compatibility issues. This document tries to provide a foundation that syslog extensions can build on. This layered architecture approach also provides a solid basis that allows code to be written once for each syslog feature rather than once for each transport. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5424"/>
          <seriesInfo name="DOI" value="10.17487/RFC5424"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="I-D.ietf-netmod-rfc8407bis">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="Andy Bierman" initials="A." surname="Bierman">
              <organization>YumaWorks</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <author fullname="Qin Wu" initials="Q." surname="Wu">
              <organization>Huawei</organization>
            </author>
            <date day="5" month="June" year="2025"/>
            <abstract>
              <t>   This document provides guidelines for authors and reviewers of
   specifications containing YANG data models, including IANA-maintained
   modules.  Recommendations and procedures are defined, which are
   intended to increase interoperability and usability of Network
   Configuration Protocol (NETCONF) and RESTCONF Protocol
   implementations that utilize YANG modules.  This document obsoletes
   RFC 8407.

   Also, this document updates RFC 8126 by providing additional
   guidelines for writing the IANA considerations for RFCs that specify
   IANA-maintained modules.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netmod-rfc8407bis-28"/>
        </reference>
        <reference anchor="RFC8199">
          <front>
            <title>YANG Module Classification</title>
            <author fullname="D. Bogdanovic" initials="D." surname="Bogdanovic"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <author fullname="C. Moberg" initials="C." surname="Moberg"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>The YANG data modeling language is currently being considered for a wide variety of applications throughout the networking industry at large. Many standards development organizations (SDOs), open-source software projects, vendors, and users are using YANG to develop and publish YANG modules for a wide variety of applications. At the same time, there is currently no well-known terminology to categorize various types of YANG modules.</t>
              <t>A consistent terminology would help with the categorization of YANG modules, assist in the analysis of the YANG data modeling efforts in the IETF and other organizations, and bring clarity to the YANG- related discussions between the different groups.</t>
              <t>This document describes a set of concepts and associated terms to support consistent classification of YANG modules.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8199"/>
          <seriesInfo name="DOI" value="10.17487/RFC8199"/>
        </reference>
        <reference anchor="RFC9182">
          <front>
            <title>A YANG Network Data Model for Layer 3 VPNs</title>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <author fullname="A. Aguado" initials="A." surname="Aguado"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>As a complement to the Layer 3 Virtual Private Network Service Model (L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network (L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.</t>
              <t>The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9182"/>
          <seriesInfo name="DOI" value="10.17487/RFC9182"/>
        </reference>
        <reference anchor="RFC9291">
          <front>
            <title>A YANG Network Data Model for Layer 2 VPNs</title>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="O. Gonzalez de Dios" initials="O." role="editor" surname="Gonzalez de Dios"/>
            <author fullname="S. Barguil" initials="S." surname="Barguil"/>
            <author fullname="L. Munoz" initials="L." surname="Munoz"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document defines an L2VPN Network Model (L2NM) that can be used to manage the provisioning of Layer 2 Virtual Private Network (L2VPN) services within a network (e.g., a service provider network). The L2NM complements the L2VPN Service Model (L2SM) by providing a network-centric view of the service that is internal to a service provider. The L2NM is particularly meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices.</t>
              <t>Also, this document defines a YANG module to manage Ethernet segments and the initial versions of two IANA-maintained modules that include a set of identities of BGP Layer 2 encapsulation types and pseudowire types.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9291"/>
          <seriesInfo name="DOI" value="10.17487/RFC9291"/>
        </reference>
        <reference anchor="RFC8309">
          <front>
            <title>Service Models Explained</title>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <author fullname="W. Liu" initials="W." surname="Liu"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>The IETF has produced many modules in the YANG modeling language. The majority of these modules are used to construct data models to model devices or monolithic functions.</t>
              <t>A small number of YANG modules have been defined to model services (for example, the Layer 3 Virtual Private Network Service Model (L3SM) produced by the L3SM working group and documented in RFC 8049).</t>
              <t>This document describes service models as used within the IETF and also shows where a service model might fit into a software-defined networking architecture. Note that service models do not make any assumption of how a service is actually engineered and delivered for a customer; details of how network protocols and devices are engineered to deliver a service are captured in other modules that are not exposed through the interface between the customer and the provider.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8309"/>
          <seriesInfo name="DOI" value="10.17487/RFC8309"/>
        </reference>
        <reference anchor="RFC8299">
          <front>
            <title>YANG Data Model for L3VPN Service Delivery</title>
            <author fullname="Q. Wu" initials="Q." role="editor" surname="Wu"/>
            <author fullname="S. Litkowski" initials="S." surname="Litkowski"/>
            <author fullname="L. Tomotaki" initials="L." surname="Tomotaki"/>
            <author fullname="K. Ogaki" initials="K." surname="Ogaki"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used for communication between customers and network operators and to deliver a Layer 3 provider-provisioned VPN service. This document is limited to BGP PE-based VPNs as described in RFCs 4026, 4110, and 4364. This model is intended to be instantiated at the management system to deliver the overall service. It is not a configuration model to be used directly on network elements. This model provides an abstracted view of the Layer 3 IP VPN service configuration components. It will be up to the management system to take this model as input and use specific configuration models to configure the different network elements to deliver the service. How the configuration of network elements is done is out of scope for this document.</t>
              <t>This document obsoletes RFC 8049; it replaces the unimplementable module in that RFC with a new module with the same name that is not backward compatible. The changes are a series of small fixes to the YANG module and some clarifications to the text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8299"/>
          <seriesInfo name="DOI" value="10.17487/RFC8299"/>
        </reference>
        <reference anchor="RFC8466">
          <front>
            <title>A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery</title>
            <author fullname="B. Wen" initials="B." surname="Wen"/>
            <author fullname="G. Fioccola" initials="G." role="editor" surname="Fioccola"/>
            <author fullname="C. Xie" initials="C." surname="Xie"/>
            <author fullname="L. Jalil" initials="L." surname="Jalil"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This document defines a YANG data model that can be used to configure a Layer 2 provider-provisioned VPN service. It is up to a management system to take this as an input and generate specific configuration models to configure the different network elements to deliver the service. How this configuration of network elements is done is out of scope for this document.</t>
              <t>The YANG data model defined in this document includes support for point-to-point Virtual Private Wire Services (VPWSs) and multipoint Virtual Private LAN Services (VPLSs) that use Pseudowires signaled using the Label Distribution Protocol (LDP) and the Border Gateway Protocol (BGP) as described in RFCs 4761 and 6624.</t>
              <t>The YANG data model defined in this document conforms to the Network Management Datastore Architecture defined in RFC 8342.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8466"/>
          <seriesInfo name="DOI" value="10.17487/RFC8466"/>
        </reference>
        <reference anchor="RFC3198">
          <front>
            <title>Terminology for Policy-Based Management</title>
            <author fullname="A. Westerinen" initials="A." surname="Westerinen"/>
            <author fullname="J. Schnizlein" initials="J." surname="Schnizlein"/>
            <author fullname="J. Strassner" initials="J." surname="Strassner"/>
            <author fullname="M. Scherling" initials="M." surname="Scherling"/>
            <author fullname="B. Quinn" initials="B." surname="Quinn"/>
            <author fullname="S. Herzog" initials="S." surname="Herzog"/>
            <author fullname="A. Huynh" initials="A." surname="Huynh"/>
            <author fullname="M. Carlson" initials="M." surname="Carlson"/>
            <author fullname="J. Perry" initials="J." surname="Perry"/>
            <author fullname="S. Waldbusser" initials="S." surname="Waldbusser"/>
            <date month="November" year="2001"/>
            <abstract>
              <t>This document is a glossary of policy-related terms. It provides abbreviations, explanations, and recommendations for use of these terms. The intent is to improve the comprehensibility and consistency of writing that deals with network policy, particularly Internet Standards documents (ISDs). This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3198"/>
          <seriesInfo name="DOI" value="10.17487/RFC3198"/>
        </reference>
        <reference anchor="RFC3535">
          <front>
            <title>Overview of the 2002 IAB Network Management Workshop</title>
            <author fullname="J. Schoenwaelder" initials="J." surname="Schoenwaelder"/>
            <date month="May" year="2003"/>
            <abstract>
              <t>This document provides an overview of a workshop held by the Internet Architecture Board (IAB) on Network Management. The workshop was hosted by CNRI in Reston, VA, USA on June 4 thru June 6, 2002. The goal of the workshop was to continue the important dialog started between network operators and protocol developers, and to guide the IETFs focus on future work regarding network management. This report summarizes the discussions and lists the conclusions and recommendations to the Internet Engineering Task Force (IETF) community. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3535"/>
          <seriesInfo name="DOI" value="10.17487/RFC3535"/>
        </reference>
        <reference anchor="RFC5198">
          <front>
            <title>Unicode Format for Network Interchange</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="M. Padlipsky" initials="M." surname="Padlipsky"/>
            <date month="March" year="2008"/>
            <abstract>
              <t>The Internet today is in need of a standardized form for the transmission of internationalized "text" information, paralleling the specifications for the use of ASCII that date from the early days of the ARPANET. This document specifies that format, using UTF-8 with normalization and specific line-ending sequences. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5198"/>
          <seriesInfo name="DOI" value="10.17487/RFC5198"/>
        </reference>
        <reference anchor="RFC2975">
          <front>
            <title>Introduction to Accounting Management</title>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <author fullname="J. Arkko" initials="J." surname="Arkko"/>
            <author fullname="D. Harrington" initials="D." surname="Harrington"/>
            <date month="October" year="2000"/>
            <abstract>
              <t>This document describes and discusses the issues involved in the design of the modern accounting systems. The field of Accounting Management is concerned with the collection the collection of resource consumption data for the purposes of capacity and trend analysis, cost allocation, auditing, and billing. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2975"/>
          <seriesInfo name="DOI" value="10.17487/RFC2975"/>
        </reference>
        <reference anchor="RFC5415">
          <front>
            <title>Control And Provisioning of Wireless Access Points (CAPWAP) Protocol Specification</title>
            <author fullname="P. Calhoun" initials="P." role="editor" surname="Calhoun"/>
            <author fullname="M. Montemurro" initials="M." role="editor" surname="Montemurro"/>
            <author fullname="D. Stanley" initials="D." role="editor" surname="Stanley"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>This specification defines the Control And Provisioning of Wireless Access Points (CAPWAP) Protocol, meeting the objectives defined by the CAPWAP Working Group in RFC 4564. The CAPWAP protocol is designed to be flexible, allowing it to be used for a variety of wireless technologies. This document describes the base CAPWAP protocol, while separate binding extensions will enable its use with additional wireless technologies. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5415"/>
          <seriesInfo name="DOI" value="10.17487/RFC5415"/>
        </reference>
        <reference anchor="RFC4251">
          <front>
            <title>The Secure Shell (SSH) Protocol Architecture</title>
            <author fullname="T. Ylonen" initials="T." surname="Ylonen"/>
            <author fullname="C. Lonvick" initials="C." role="editor" surname="Lonvick"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>The Secure Shell (SSH) Protocol is a protocol for secure remote login and other secure network services over an insecure network. This document describes the architecture of the SSH protocol, as well as the notation and terminology used in SSH protocol documents. It also discusses the SSH algorithm naming system that allows local extensions. The SSH protocol consists of three major components: The Transport Layer Protocol provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User Authentication Protocol authenticates the client to the server. The Connection Protocol multiplexes the encrypted tunnel into several logical channels. Details of these protocols are described in separate documents. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4251"/>
          <seriesInfo name="DOI" value="10.17487/RFC4251"/>
        </reference>
        <reference anchor="RFC8341">
          <front>
            <title>Network Configuration Access Control Model</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
              <t>This document obsoletes RFC 6536.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="91"/>
          <seriesInfo name="RFC" value="8341"/>
          <seriesInfo name="DOI" value="10.17487/RFC8341"/>
        </reference>
        <reference anchor="NEMOPS">
          <front>
            <title>Report from the IAB Workshop on the Next Era of Network Management Operations (NEMOPS)</title>
            <author fullname="Wes Hardaker" initials="W." surname="Hardaker">
         </author>
            <author fullname="Dhruv Dhody" initials="D." surname="Dhody">
         </author>
            <date day="29" month="August" year="2025"/>
            <abstract>
              <t>   The "Next Era of Network Management Operations (NEMOPS)" workshop was
   convened by the Internet Architecture Board (IAB) from December 3-5,
   2024, as a three-day online meeting.  It builds on a previous 2002
   workshop, the outcome of which was documented in RFC 3535,
   identifying 14 operator requirements for consideration in future
   network management protocol design and related data models, along
   with some recommendations for the IETF.  Much has changed in the
   Internet’s operation and technological foundations since then.  The
   NEMOPS workshop reviewed the past outcomes and discussed any
   operational barriers that prevented these technologies from being
   widely implemented.  With the industry, network operators and
   protocol engineers working in collaboration, the workshop developed a
   suggested plan of action and network management recommendations for
   the IETF and IRTF.  Building on RFC 3535, this document provides the
   report of the follow-up IAB workshop on Network Management.

   Note that this document is a report on the proceedings of the
   workshop.  The views and positions documented in this report are
   those of the workshop participants and do not necessarily reflect IAB
   views and positions.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-iab-nemops-workshop-report-04"/>
        </reference>
      </references>
    </references>
    <?line 1535?>

<section anchor="sec-checklist">
      <name>Operational Considerations Checklist</name>
      <t>This appendix provides a concise checklist of key questions that Protocol Designers should address in the "Operational Considerations" section of their specifications. Each item references the relevant section of this document for detailed guidance.</t>
      <t>This checklist is intended for use by document authors and the working groups that develop protocol documents. A separate list
of guidelines and a checklist of questions to consider when reviewing a document to evaluate whether the document address common
operations and management needs is provided in <xref target="CHECKLIST"/>.</t>
      <t>The decision to incorporate all or part of these items into their work remains with Protocol Designers and WGs themselves.</t>
      <section anchor="documentation-requirements">
        <name>Documentation Requirements</name>
        <ul spacing="normal">
          <li>
            <t>Does the specification include an "Operational Considerations" section? (<xref target="sec-oper-manag-considerations"/>)</t>
          </li>
          <li>
            <t>Is this section placed immediately before the Security Considerations section? (<xref target="sec-placement-sec"/>)</t>
          </li>
          <li>
            <t>If there are no new considerations, does the section include the appropriate boilerplate with explanation? (<xref target="sec-null-sec"/>)</t>
          </li>
        </ul>
      </section>
      <section anchor="operational-fit">
        <name>Operational Fit</name>
        <ul spacing="normal">
          <li>
            <t>How does this protocol operate "out of the box"? (<xref target="sec-install"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What are the default values, modes, timers, and states? (<xref target="sec-install"/>)</t>
              </li>
              <li>
                <t>What is the rationale for chosen default values, especially if they affect operations or are expected to change over time? (<xref target="sec-install"/>)</t>
              </li>
            </ul>
          </li>
          <li>
            <t>What is the migration path for existing deployments? (<xref target="sec-migration"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>How will deployments transition from older versions or technologies? (<xref target="sec-migration"/>)</t>
              </li>
              <li>
                <t>Does the protocol require infrastructure changes, and how can these be introduced? (<xref target="sec-migration"/>)</t>
              </li>
            </ul>
          </li>
          <li>
            <t>What are the requirements or dependencies on other protocols and functional components? (<xref target="sec-other"/>)</t>
          </li>
          <li>
            <t>What is the impact on network operation? (<xref target="sec-impact"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What are the scaling implications and interactions with other protocols? (<xref target="sec-impact"/>)</t>
              </li>
              <li>
                <t>What are the impacts on traffic patterns or performance (e.g., delay, jitter)? (<xref target="sec-impact"/>)</t>
              </li>
            </ul>
          </li>
          <li>
            <t>What is the impact on Security Operations? (<xref target="sec-impact-secops"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>How does deployment affect Indicators of Compromise or their availability? (<xref target="sec-impact-secops"/>)</t>
              </li>
              <li>
                <t>What logging is needed for digital forensics? (<xref target="sec-impact-secops"/>)</t>
              </li>
            </ul>
          </li>
          <li>
            <t>How can correct operation be verified? (<xref target="sec-oper-verify"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What status and health indicators does the protocol provide? (<xref target="sec-oper-verify"/>)</t>
              </li>
            </ul>
          </li>
          <li>
            <t>How are human-readable messages handled? (<xref target="sec-messages"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>Do messages contain codes that enable local language mapping for internationalization? (<xref target="sec-messages"/>)</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="management-information">
        <name>Management Information</name>
        <ul spacing="normal">
          <li>
            <t>What needs to be managed? (<xref target="sec-mgmt-consid"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What are the manageable entities (e.g., protocol endpoints, network elements, services)? (<xref target="sec-mgmt-consid"/>)</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Which standardized management technologies are applicable? (<xref target="sec-mgmt-tech"/>)</t>
          </li>
          <li>
            <t>What essential information is required? (<xref target="sec-interop"/>, <xref target="sec-mgmt-info"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What operational, configuration, state, and statistical information is needed? (<xref target="sec-interop"/>)</t>
              </li>
              <li>
                <t>Is an Information Model needed, especially if multiple Data Model representations are required? (<xref target="sec-interop"/>)</t>
              </li>
              <li>
                <t>What is manageable, what needs configuration, and what protocol-specific events might occur? (<xref target="sec-mgmt-info"/>)</t>
              </li>
              <li>
                <t>How are configuration data, operational state, and statistics distinguished? (<xref target="sec-mgmt-info"/>)</t>
              </li>
            </ul>
          </li>
          <li>
            <t>If YANG Data Models are defined, what type is appropriate? (<xref target="sec-yang-dm"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>Should Device Models, Network Models, or Service Models be specified? (<xref target="sec-yang-dm"/>)</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="fault-management">
        <name>Fault Management</name>
        <ul spacing="normal">
          <li>
            <t>What faults and events should be reported? (<xref target="sec-fm-mgmt"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What essential faults, health indicators, alarms, and events should be exposed? (<xref target="sec-fm-mgmt"/>)</t>
              </li>
              <li>
                <t>How will fault information be propagated? (<xref target="sec-fm-mgmt"/>)</t>
              </li>
            </ul>
          </li>
          <li>
            <t>How is liveness monitored? (<xref target="sec-monitor"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What testing and liveness detection features are built into the protocol? (<xref target="sec-monitor"/>)</t>
              </li>
            </ul>
          </li>
          <li>
            <t>How are faults determined? (<xref target="sec-fault-determ"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What error counters or diagnostics help pinpoint faults? (<xref target="sec-fault-determ"/>)</t>
              </li>
              <li>
                <t>What distinguishes faulty from correct messages? (<xref target="sec-fault-determ"/>)</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="configuration-management">
        <name>Configuration Management</name>
        <ul spacing="normal">
          <li>
            <t>What configuration parameters are defined? (<xref target="sec-config-mgmt"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What parameters need to be configurable, including their valid ranges? (<xref target="sec-config-mgmt"/>)</t>
              </li>
              <li>
                <t>What information persists across reboots? (<xref target="sec-config-mgmt"/>)</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="performance-management">
        <name>Performance Management</name>
        <ul spacing="normal">
          <li>
            <t>What are the performance implications? (<xref target="sec-perf-mgmt"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What are the hardware/software performance impacts (e.g., CPU, memory, forwarding)? (<xref target="sec-perf-mgmt"/>)</t>
              </li>
            </ul>
          </li>
          <li>
            <t>What performance information should be available? (<xref target="sec-monitor-proto"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What protocol counters are defined (e.g., packets received, sent, dropped)? (<xref target="sec-monitor-proto"/>)</t>
              </li>
              <li>
                <t>What is the counter behavior at maximum values? (<xref target="sec-monitor-proto"/>)</t>
              </li>
              <li>
                <t>What are the protocol limitations and behavior when limits are exceeded? (<xref target="sec-monitor-proto"/>)</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="security-management">
        <name>Security Management</name>
        <ul spacing="normal">
          <li>
            <t>What security-related monitoring is needed? (<xref target="sec-security-mgmt"/>)
            </t>
            <ul spacing="normal">
              <li>
                <t>What security events should be logged? (<xref target="sec-security-mgmt"/>)</t>
              </li>
              <li>
                <t>What statistics help detect attacks? (<xref target="sec-security-mgmt"/>)</t>
              </li>
              <li>
                <t>What security and privacy threats do management operations introduce? (<xref target="sec-security-mgmt"/>)</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-changes-since-5706">
      <name>Changes Since RFC 5706</name>
      <t>The following changes have been made to the guidelines published in  <xref target="RFC5706"/>:</t>
      <ul spacing="normal">
        <li>
          <t>Change intended status from Informational to Best Current Practice</t>
        </li>
        <li>
          <t>Indicate that this document updates RFC 2360 and add the relevant updated text</t>
        </li>
        <li>
          <t>Move the "Operational Considerations" Appendix A to a Checklist <xref target="CHECKLIST"/> maintained in GitHub</t>
        </li>
        <li>
          <t>Add a concise "Operational Considerations Checklist" appendix (<xref target="sec-checklist"/>) with key questions that should be addressed in protocol specifications</t>
        </li>
        <li>
          <t>Add a requirement for an "Operational Considerations" section in all new RFCs that document a technical specification for a New Protocol or Protocol Extension or describe their use in the IETF Stream, along with specific guidance on its content.</t>
        </li>
        <li>
          <t>Update the operational and manageability-related technologies to reflect over 15 years of advancements  </t>
          <ul spacing="normal">
            <li>
              <t>Provide focus and details on YANG-based standards, deprioritizing MIB Modules.</t>
            </li>
            <li>
              <t>Add a "YANG Data Model Considerations" section</t>
            </li>
            <li>
              <t>Update the "Available Management Technologies" landscape</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Add an "Operational and Management Tooling Considerations" section</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="sec-ack">
      <name>Acknowledgements</name>
      <t>The authors thank the following individuals and groups,
whose efforts have helped to improve this document:</t>
      <dl>
        <dt>The IETF Ops Directorate (OpsDir):</dt>
        <dd>
          <t>The IETF OpsDir <xref target="IETF-OPS-Dir"/> reviewer team, which has been providing document reviews for more than a decade, and its Chairs past and present: Gunter Van de Velde, Carlos Pignataro, Bo Wu, and Daniele Ceccarelli.</t>
        </dd>
        <dt>The Area Director (AD) championing the update:</dt>
        <dd>
          <t>Med Boucadair, who initiated and championed the effort to refresh RFC 5706, 15 years after its publication, building on an idea originally suggested by Carlos Pignataro.</t>
        </dd>
        <dt>Reviewers of this document, in roughly chronological order:</dt>
        <dd>
          <t>Mahesh Jethanandani, Chongfeng Xie, Alvaro Retana, Michael P., Scott Hollenbeck, Ron Bonica, Italo Busi, Brian Trammel, Aijun Wang, Richard Shockey, Tina Tsou, Lars Eggert, Joel Halpern, Johan Stenstam, Dave Thaler, Harald Alvestrand, Greg Mirsky, Marco Tiloca, and Jacqueline McCall.</t>
        </dd>
        <dt>The document shepherd who has gone beyond normal shepherding duties to improve this document:</dt>
        <dd>
          <t>Alvaro Retana</t>
        </dd>
        <dt>The author of RFC 5706:</dt>
        <dd>
          <t>David Harrington</t>
        </dd>
        <dt>Acknowledgments from RFC 5706:</dt>
        <dd>
          <t>The following acknowledgments apply to RFC 5706, the predecessor of this document. Some individuals listed below as reviewers of RFC 5706 are now authors or contributors of this document.</t>
        </dd>
        <dt/>
        <dd>
          <t>This document started from an earlier document edited by Adrian
Farrel, which itself was based on work exploring the need for
Manageability Considerations sections in all Internet-Drafts produced
within the Routing Area of the IETF. That earlier work was produced
by Avri Doria, Loa Andersson, and Adrian Farrel, with valuable
feedback provided by Pekka Savola and Bert Wijnen.</t>
        </dd>
        <dt/>
        <dd>
          <t>Some of the discussion about designing for manageability came from
private discussions between Dan Romascanu, Bert Wijnen, Jürgen Schönwälder, Andy Bierman, and David Harrington.</t>
        </dd>
        <dt/>
        <dd>
          <t>Thanks to reviewers who helped fashion RFC 5706, including
Harald Alvestrand, Ron Bonica, Brian Carpenter, Benoît Claise, Adrian
Farrel, David Kessens, Dan Romascanu, Pekka Savola, Jürgen Schönwälder, Bert Wijnen, Ralf Wolter, and Lixia Zhang.</t>
        </dd>
      </dl>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Thomas Graf">
        <organization>Swisscom</organization>
        <address>
          <email>thomas.graf@swisscom.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA8W9WXPcSJYm+s5fgcsy6yJrIkJrbqrpzKIoKZNdWmgis7Jn
xsbGEBGIIEoIIBqOIBWZrfk19/k+3qf71n9szu7HAYTE7J6xm9aLSAIOX46f
/XxnOp0edWVXFc+yH3flsqjKugjZqmmz86YO8Iu2rNfZu23R5l0Jv8nyepm9
yet8XWyKusvKOrt4ef0qu9oWi3JVLvipo3w+b4vbZ/7Ff/Cv6eDy+LJZ1PkG
5rBs81U3LYtuNW22Ib9bT9vV4qtvHn49L8P04dOjo9DBBP5HXjU1PN21u+Ko
3Lb0r9A9fvjwu4ePj/K2yJ9lxwfnfHx0t3529OHu2VGWTbON/Z5+bOyt3o80
yODhkC3SlcAGPMvmi+1RMw9NVXRFeJbh/I9222VOPz1+8vXDo7Cbb8oQ4JVu
v4WV4B4eHS2aJez2s2wHy//2aFs+y/5b1ywmWWjari1WAf613+A//vvRUd20
G/jmbYHLyJ6fXz5+TP96/+r822++e2T/fvL0If37YvpiRvtab5rttCvaTVk3
VbPePzs6KuuVH+38p5fnf319cXVNL2ZCHodp4H1xWxZ32flNsfhQlaGjt3C1
sNiHj7/iQfJ2XcDW3HTdNjx78GBddje7+WzRbB7g2qfvLq+mLy7eP+CxptfF
ZlvBCA9g3cWDTV7WRzBMfLJse3MLGfyuWHQNzLHITuBklmV7ep+ZwJ/zrs0X
H4qWNmjWtOsH67bZbR/wKA/yebPrHtgEfjo7/+vZ9U/v3l49Gx3w7u4uDrQp
ig7O9MENfCDvbmD3HviJ0935yf5Gf8p38G9ZH9BYuxbySNcyfQj/8wgndfXy
HPZkfC51uViE2aIM+Wzd3D5oi9Ds2kURHqyrJoS83fvJvL04P7/KfvR/8d/7
Fj8GhPbo26+BZmyWU3pwtasqvsLPi7op4YZXeRkK+hssIa/LX4l4nmUvb4t2
390QW7m8ogcKOOAKrg29+ZfCHkAeMKuLbviRf2oK/EL7YewL52VYNH7gvy/o
0b8s8A9Ic8MBz5ZtmdfZq7xti2pkzHfVMnvRrIlx7So8Uv+BnN7+S1Mtl80a
PjDbfRh+4irflEWbPYcj2pVj33jbfChzP2ygN2ZzfuN/rMs2r5bNX2p8bnwZ
53kLx5ddlusayLptRr7yvNoV2auircfXQv8EulvQSH+Zw9MreHi2SB/GJ7b8
lb+s8UWeD/y3a8tIf6Ov9yf9HjYemEc9Mtn/ev3Sb8gCnpq1sNO/dgV+cLao
kWvWXVvOd90oOV7fNJs8ZD+CYBkZ/+oOuLDOXD7S0RuzNbzxlyB/p9UdTafT
LJ8H5BYdXobsLbC9y7YBJt1UzBb1p+zlx66oA7PLtgDaDl22LAJsWbHM7oD7
ZcsdEW8iQLJmBd8vYP71An/Oq7LbZ3VRLOGtrhF5VDhhhI9vZsTti65tVmWH
m3xYcPUEVlaGDIRRs+3KTV7RONfw/e2u3Tah4OnAIyCgdyzvA05j2za3MEYG
ZLnM60WBv2OGQJ/DUVpi5AX8AlZ1d5N3cUp51Z9THkB96GAmN80OLtqcNiZf
LoFfBdwuOPbsri1pZTqVgLoH7hXrHyAo8g38DB+yyeZZ8GoJqTXpkcEvxk4M
fg1ntQCqov0t22wXitkR747fDpPyKGtJ0E9g5SC6FjjVEncbBBk8UO1pzaQF
yB2CvxId1DCjz+xNVyxu6vJfdoWcJPwIBBw2YZZdwBKrQJdc1AuaBmoYRCwy
ORwN/tq0++zNxfNsATuFn5plr0r4XrWf4FRKuETNcrfAz/D5/csOJCpPoYE/
L6rdEgnPaVYw2VSRO85CQXSLZ4PrgungOeGA40dVrEDh/A8cSnbCM8PtBs5d
3OYw3/9y9vZH/OSbBhTacDoBAiqrQqgWn4RVwEj5tshAMuAo5SqrG5px73rg
3YUf6w6oqFjOmAdsyuWyKo6Ojv4AKoHsG636tz/A+qe0lZ+IWt6tYPoTJuB7
LRK/twQJWAFFLCcwKdKmQDDu1jc9VgF0uAaNrcbjuWnucE/2QFFVBfcHxthW
zR6GwNeFa8B4kbaWs3syDBwgEh1+tcFFZTd5u6RH83ZxUwKVdrsWqSnb1UDx
eYCD4O8tirbLmQa2umLmhMDPmxIpbpPv4X8/6LTxsxM3o4kyFXcttnnblYsd
CHb45LJcrfCHDre1rOEQdm3BzKyBzQu7VofO5yWy1AmRo791RX1btk3NfMM2
QB6nb4OFgTurhwB8abkj64gXM8YehE8GYpRiW+FpFdU2nv4LlgrMOrNfmvaD
MIgfUQkN2ckvP4ZT+2w68QF3TwUHMDy5emXK+cbJL8s7uhq0p9ubHC8G81he
ohwhnFj4PDP87bcf4OYjO/z0iWaI8nhvTKrsyG7qhLr+93FBz8T+nRwMhxln
Yr+Lg+Ew/1uZ2Iw3W6dG1LhoQFXO5g1s32e2LuVodCvOlsuSH67oKvhT1EP6
7bcr+dbj2aOnqAnAPqBo+QsZm3Cw8KdjchqQYAVGCIpe0cHuoLhplyH7BUQ2
0DXtqZdHLeqERb3g25BIJz5euMJdkQPZwKRIgdDZ4Q7dNGhklov0itJ7bhcG
qhWMHGzv8ROwQuTWMPQUSIWdDqgvfPo0Ix2INwIZnlxj9xLuw5QfgMfxW692
LZxn299NoD84JFjDrsOHRTWy5RP/rOBqBb4FwLdaZhygYiJrnBjPjFyQ7gLa
7iWMsAs8L1k6CTc5fuZNtzwMnMwdsJY4Siha+hPKgRXylUbWhjdrXYRpAKIs
pnKJ8YQ3DbFRYOYV3v8//EEYwAtdLIs/3ADc1U+fY4igmgGpAFGtU6+THpmw
wMOMDpaci++JecMCKD9R94y1IEvbo456hyJrXuC+rKriYzkHpYBVA2QgGSj2
5S39ke9viRRNM2ASY573EqiwRX0uvfIowoTjZMgraRr924cLLj6irsuUcHB5
qrKMsRA4KJh7wLOGx3D3SD6pxI8EQ3O6yW8LUHa6fA635gaFFlxXIK6m9/G+
eFUCZC6HakleAddbgopRgIqxq2FNoWua5ax3xMumID8GqC5yteFV0oPb4gbX
cItSBfQWuvKwIcCEEvY1wq8umB+QokoEE8zcgIUYl/gACpCaEjZtNCHgyGDg
KA3jFdr/MfQ1A5uLqktIBzWaOUwAV7sSd7P4rEGzhVPIwVzlQ7jNWxLGpKgU
dMPRSwmXEWQ7qWj4fjw4J2zGtpf2FraTeRm9nq3Kj3C4wGB3TGhtxj49HGtZ
AI8BuqbbcHjWNJBsH5wL3S2b0yz7qblD1wypTiCzRm02pxzhcvN6fw+1g7f1
DPaCNmsJd3hZ8AGiphCVRl062sP+dlZFcpmGx4FTyYLIpfJXePtF3uUsWifZ
fNcx17alsAmEfGke7W09ArpDizIQheB08KjgMEj9XGWNOHZ7Bye6E3O/0GyK
PucDcg7FgPiHLLQtFg2wl1+JiS6JD7CYngOHL0Ax92T4JZkIJF7Bh9G4oGtx
19CdWVQwlwoZGjphl+7sxYT26s1hg60mq/eeBmNQ9rmc2aLdH+kSihdEPAOs
+RxerpIojffuIIfJtmyg4Mis66oNIqor7y8ZSat4IVS8oCBS6YrG/xpIrMLZ
wcNg96FSAA8krFW2ilaVIZ8FlkgOBlT3DnpqjM3hJHfsnOlryKIVTLKwW4Dg
CwOu7n1VUbHvDRUvB1z757jJXbMtF3pBcFAyMVWXkm3A8e5z1qI7nIHCi1qQ
qA25/KhqQ3JByAx3FDCnHQCrwnme6EDESWR7nGgEQf1be9THcGT2TMEYZl4h
gXvL08tk4gLOQiWru0muON9iITx+Q55Cfk3ndFNs6Nz5m6Ejs414NU2vd917
pN+g/EB2r/oLq1H4Im4Xrx04Qgk2eEAxVMHa8Tl4F6RQ2QAJLcoWBkd2SOrf
RaKWrdp8UyAt006AeBLlXazoru/JG/GX5DVNed3Cn9FMV6dm3/oXU9I0UmT2
SNfChpG1wjkDOyVWD/uHrBeU+HKzbQKuFI2zmx1dN/Iy4qxRFeY7hwKWGeiI
qS3fsGMHdWtx83knCEodXqDZaMwxwIjTpU3iwbFLBqmBX1y4q2OuTaaQsFuv
0T98siXTAM5rb9LqdPT+qsrgbiofzUIlGNkFjle6qYhkKmmUUG7KKif1P0cJ
LKPwtgTZF3KooJHV3aDzcLAL0ckw3IiA1q3ISObv2ZUOlzII5Q+kEMFJ9CPS
v8jlRh/ndfGxwzM/NNRvv/0AZuo3YKZSEJAPg+cepfwGxltHx1iHXjo5i8Aq
HNwlFP96GN6HlWy4jsRSlD/EtHdBV1jVBLrKJNJYPz3AqCIVJRz3pqjQhZzd
5bwRKa/qKz2qCwZmmKzRiGdxlikNpI40nOMC/T7ksXTTK1Ss00UlpQwDBEvV
nopsjq952UZ6UOpZZAV8bI4wIdMxSg4z2HbxXuFlN5oiypUrXLG/Spchh3B4
X5hb2pjENdCKQM8pKqyH31zn26DK6gKNYWO1hwIlINCaXYthGprkFI+2DCDH
WUOC79yQSy+vxVZiA35v5GA7NBNiMiWYuGDhYhw9hdczaR2Ebha8SCdN9EeC
p3J8hKiV4k0TcqbGh3d0mqPfS3y7ePTq0pnFxJARV5OtRQ1noU/8TkK9+QLs
x02DtiStwBzynxNFTiuxL9JCZAFspub38YuCZCqqlVzo1Zg8gW+ze5G+kJqY
cKNquYDie8fVoX4938uuXhKrKTq0E8mRBiZ6QYq1mEGJWU32D1FJ1+7Q744b
0R42cGjXN+X6hgQq+iuJEPDm8l3LzaKRHTIWWXxEDaJkf8vndjuSNQ49nepG
MJOR+EQkEopT0DpYm9MQRRKh+Lzszm+bEvUxkJjtwQiGegdJvCFzIA7Evm1R
S4TohDfQrxJmzMf+CzNEkJBROP4ONzxblFE6JlQZlRGyQyTaY1k5ErlE70vR
qj4mDhhTMAeb64NAhyJAqGX3EphQSjSRyvh0Uu8NDlF8vMl3AS2XP4thEmkm
9cTwV3750bFsdoGlqoYZOZ8TaZt8r5qYWgHkg12qx2S1w9sAq1x1qMuzT7Zv
AuPnWzY9gA5gFDjZNWw8xffE9hhkFMEv4OdTusuopKacjOILeFyiBnH0G9Z+
lqGzuufoJK8vGeOaMoUPYHDDOJ5uy0Q0sNwC6nEGIF5u82qH01NDMyEDUat1
kkxJqg8SQ60/s9ekKk6G7m/LDkPH99A9gdwEnamwIFLbUa8Vw3reNkjB9Old
Tb62u5sGtBlUEhOSnmSW1IHrNA8Z74GFGqYvMF0QJtnlHxIOMGRPMBcWI7sa
zCwO3V7HJDh1XcNvAhigB1xuFrnpe4Z9rAkPPZD9PVG+TS8z0aB6tS074AvI
pOGagPqxDBJFkh1GzfXR02R71RHCzwW6XzRZ0fNvWmQZjahinizFbsMMKI2S
mN25QPmMrigeimLPbX4H7KZtNuZk5vgXvkgewcHms6eajC6NX/Ni4BeFuLYs
oyQMNKUZsla0GqO+PUlCJG0RKRBH01uN/JBOvRUPQNlRCiN/v3QOtD9l2TmG
+Z+BuVDABh/MhdQ9xxdeXzwDo2KDqkz2Gl0FJpfxVt/s4A/TBtlIp85I/BvQ
4n7L2g7nScHNHRXuEwoEg7S+wwWi9G5W3Z2E/9HxLq+fFLP1DF0NAfcajhkj
ahOn4KGutIfT3HCMkJg1TjpMhBeFPdz9jxOdjjh+gJ+DxEf/ATzcoXNHrfQc
PQD4lei6tss0t2WptzF6tG+Letng3PRPW06MCExOJFdhZHmfn2Z5VGAWw9iA
rQVN0djMhXxABYVVVzqSfGaWvYUb3sFGbDsMZEdtCLcIjjNEbr8BPoTKlznZ
9dSj1vQMDllCVC77geWwuHIoACP5ZPTvAMIC/+G2Gl5cku8d00yjvzAaXUgv
pIrQAzhCwetFHwep0DIa8YFd2FGOBQnkMpDHBlh9JewhDiN6YVBHIIkh4pTz
qgg6Q/Lvsp+r6BZAZv3RnHhgaU2aLPuVWAbDFspgIx9tC2DiKKQmIqjRMbnZ
SHRFPonCMP2sDMhOJGKvu0ojURJvx5OrijXaNh2Fq0/ksFAiFuEU91ACmXFA
ehSTg6NBWusLeKmdFYSkTxpUCxxlibSygUXjQcYFSwoD02QNVzvqazwIxkx1
HDG8s3yeMXOaachYRosKNI7nHTuy6SuQXSohgCU/efoUZMREgrYikeAXjvj4
T5v1ppuiduK426t8V3W/hx3SC845/YzTBNmDZ8IefXTkmKCnQepF1ys759kz
VxVtF9w8c7gHG9I1miqPAwRUA1qmUd74jfpg4cLjr0hjqPaWlMpsHiQwLwxX
v9rQBvgQtlOsbX2Dw4P7X1uyJylOpH/I1ffJmvJpZAgdRuTpgquh59KKlB9v
SXPoyE0P/Iq1HL8dvcQnovW7fG+mpcZlSLzn6LbEbWXmvxEb3q4Q2ADoPGbb
pudZEIGzCzDVmGigFATbhTn4pNV6kuPdleQQ9LT954QAhfL4l5sp+3p5+2Vg
FeApxQ9OIArvxEIfz7Ilegxek9HEiK4fhWP7SXwIezo3iuejM8glW+CPUQKt
TB2KUselZUT/mObHStQ0LoECRGDFonBH4cJiXux7TBJlZ2lTE/8nQpWoUv+L
HCwmCVJuOaGq1mcd8YibF3fESBTlRh5YbpA6nrXII+kC6xyU9GJOEjC6W3Zb
sgFFJlgn7vZVmxvnz1ANZkta9BZRWNjNDeIPQ+KnwPrZNMkyVWwumuuYqwJX
pgM5Zx9Ra1r2WuxkYM2/FjoMPlfBejCe0TvzibhjgIxL0ZfXBb5NWhplIBV5
bfdv7+5uh8LHNkaYUDSwiP2kloYd+LuzN75mZpKdLYGtlshPYm7Bm5hbIFfs
68ffPfr0SSYDvzLeLOVQTb7BBB1kSrh+Ggsul/hLaZGWFOol1WZe1sq0nh3J
rx/N4gw5DskczHInaIFgXPF4H4pi6wZ1VNDuaoqP5jFYNeM4m2bdga1Zsnak
eqa8O9PJPJ71tmgwI/4+lurgGFbLIrb/cFbON7I3ltCbF9mlTfMBx+aQEgo0
LX9RZsEflXE5S08+btN/MktO082d3CPooasx8QbtRZZnIEzyUq7GbrtuQScN
s/hZmiaZ0mV921S3BQtDjhZzukhBtxJ+BAIOpHhROt2HIt0PpWd3WsxfCtC0
abxqr+u4Tux0WMmWBMfxQT/BsXCwEL8ZdvO/o39n4BP3/Afux4REpaQiUnAz
qkO9qD4ZgEGi8F2jTFBmmEa0Mkqv6MoN2sl1A+YskOUxfK9fB4h89vjdP7w5
lkA5eYaq3BnidiHjtaZ9aFrk4PDPwKk2vqgEaWOLLAGjrpTzQ164fmaeqqRs
uk0sHY9MO03W473F82ITaI9E5KIyKc9OLAUh8MABGglBVeWm7Ehvn/T4eCPr
Qp2ranZLnQ+cj91J+mtk1BiDLlSi8nnhAzfoULAr2HubYpZvrx68vb6kL5j2
mz7Iugxxs2Od2bFx78TbMRTuKvNZvoG2FpCRVRwELVhr/9iZZ7sy7w0KxTpv
2+bOphUW8Hk7fFA75hRMf9/AZiYuhR9SJVrWP8XwECoa0z2I2U+f/EBwcL9H
AR91IpCSar4HSabFaJNlpGRFVXjFR+4qEoMPFziflWSXtN6nIS4E9Sjixpjb
wPwd7CpwuY8Y4BCjvqdcKKW+/JhvKFGBE2tsgWUMgSij9q4Yedu2ITsB8/7U
52pkd8U82zYgu1hhfA6Himv6Gf+Pe+/5z/CeDPdjm29vKI20/9SP+BSNw16L
qenQkmCh6aYZaWnAyjcbqv+JQ5xdXpz6s0xjGnKOSxAZyx1ay3lGFajRdN0W
DWwUMQdNe/3lR5UM5v72oQzSuPr5sPAfbPV9KlFssteWXat5vs/G+AxpTmmc
Td2lTjRI6sckndmkRx+TzNimRmVy0sc/H6ajpOTMpsnc+L3zzHKe+rBcXby/
w0xwTlT6bE6TJsnzEMispkSG09QBzVf/rKr6/tNBydqBbGYOIiVHhyOOxyvH
qww4aUNyMH5/TRdFXleD6LwFDZP6o3x5i3oQe2y3u7neEpTFdALoVJbc3tH9
YIe70dP4psREt5hMtG3gW3u+KU6fvC1GPjahPXER6GRfeGiXtYYnSIElibuo
QeDjDifsdiBCYBL49Ol0JCB54pwz7rmYfpv38yzHz3ri0k85+0sTt60Q012A
GKSL2axHLDPvm6gZw+oU0UsipdkV1gx4S9Xn7SWxvbzqJVrG8DgzcP5MW0Q7
MGhqiKbQS7Aaj2kYxVRKFI+Nz8YhrRrzaDcbSaw7XJ+q5zX8gM/jkpopYcMH
Et1mtKdwHAXKxgm/w0fEyi2nXffuA27hTbm+qfYxm+Rz1xcHPJx4iSR8z4MW
WrHPpP4aCkPfFAfTb4PmjLaIAzD0xMwsqO49HmwbUnCTXi41P4RTzYgA7pSE
sYxutaskIB7nOQc1YsXOXjY7WKunDPibvdCQVFZaEhuyi5gtqVGr+ySvZ1jm
iXlgbcDIs5VWubE/S1m8VBcepwAjLYbSHbHeYkYZRzVFbJKgMQYCY+CYDaBh
uZK9Igql9y6LowbLzU6dkzbAO5ucsqqwXASe+6erd2/l1/j4m9eT7PzFi9fs
x8csO/F1U6n/Bg3enSVUUAjRJd9Q6GWTRkopA9zu5FE2ciuFO7IopEgH+ztP
SNmRTEab8inenaPMsToSFC4jVbylnN2TXQ0ZSZqLimPtWOGLOhdaDBx31JH7
ZeesdKuexFJF5wjH8QpWU7Ai/Ozo6HvQWCjPQyqKpDSLkhuaqmruyEvR1NOY
gcEpBqs4DPGRvqCkYkF8WdOAuQIFPshFUktgTOhUTtMFfAxoEFX3PsKEpp8l
FhGmyk2XdZjiDOCnnMIU3yfPhF3ZTTddyRENNLy/++7JN58+yQ/ffPXNU/en
b7/5Bn9iTzP95quvHiNtf5/9yN4v2C5b520OdEE50G1eB7QKsOoBmCwdW5h8
cbLK+QpMm5iSI5iyR3Dj4JOS843+CIyyY2YZV3jg5fRCTitmLDq2pAwTkuJw
fFiehltZNc3WvDvqKizALm0tnIgrPQMpls693G430xJdhBY6E8OTpF6t9MFE
mirrTFyBlgOLmcPyI7zDPKr2/TwLXVTvZiE7weu1g6+57DmkdVcvHqmNfAP3
rhQxBYBKTO4of4Cm7Yd2xcD94uKRTMHMAJXIGDHTgDw4zV0duOa3J9rDjGWY
8mtiZMIzYvEqq+KqLZo+5EgjCRPlAfjnVpxtiD004txHPbeTujaYL3Hopo45
G361rpiUom1gqKFCMa3QWkz1QyYFSqIaLNXy7ljpmbnU5qiQNVIgGsNMsNer
cr0Tn67LLqDoqKvnNJM/Omv2pkBSMYHwwfSUhXlfrIZ/G2bwGE18gSRYqy4+
FnwOTpkwmVrvqmoasFxYwuFaE3svc/F5U1ZFSxhXTEFvG1I2emnsL/E8xba0
DzpDJB/6EijLwdXhRSXNgRkkh67Gxn0sjb2U6LGTSsJXddNT3tP0x57aj1A4
U6VJZZkWJSaJLRnIRGJ9dU/KDQxfZiL8F1PJcG5Stg0fxWKgoheZS9TzaMZY
3iCFW3G46LX1r1DWDjqV2eqSJfEQojJqJq2Vaum7fwz9ivVOP4/OaorBdSFB
k2CibgsxU4lo0zFSR8kYEd/XtBdEAU5BTdWNQO6ZeAkm8jdOjFCFm9RsCzKR
CXaz99EBqiyAhf1P+A/+fHzdX1pSKdBbaEKxdo3ZHUmZPIltccTeRZvQs+y/
8STtyLI18gScwX8/5hkdSfiDDcYFHQiLatLN1fwVo2hJWqCSFOfmiu9iDNcp
JppqdO4z6AXBpRwP0pE5X3vsemquQFKJgQNp5baaq0HmfB/zZLAUs8LjfYzp
euphH6nqOWLfo03QHRZyzcsKeL/Pwf4dXretvhvZ40XfnjAflZ0kZ+TTu3Cg
8NgScw/Jab1qRKH4QqWS4G4p0pUmvDpzN3pNqgoz75e4eaB3l+gA4AMTo83W
zxVFdOfEUBqkqFMAjGUtBtrKTuw+Jlze0Z+ZD8JThgnFu+WxK0bri2kqgedP
oRLK3/siHgiHlX97BvZog0PDD98zDUfzndJVNPAghXG4DtavtVQyIpvxIMaw
GbtB6zesiimtkKOMpKQq/XvKl4OjI8AHVPaITAVrQyBdZE4j1XYz9BvyOGrd
o4cesbQUFEhTXl3Nia2SIIkEAiGv5SZ87/Jfiev40fqz1ZleWZ4F89fvfbWw
z585uXpzcappIqEg40fLd5B4fHnw9xk8fA4mRSaJuP26eZxZqYX3Eh1PiVtn
kyw75vpXuRUA5oGqafp+HZetEE+bmaAdl4mj/z/ozCBS8C79M/xH4v7+SDTf
jxb2fw9aX5QhOPTLZUnB5UvKdtW7GL9qu4G/qXebOc8KXZFBsAVptFQY/gFr
67JfkAXdz6mVvWJEOJ7YuZDfy2ik/ODjHeK+piXFKp17apVW/AJ6AKNEjSNd
8T46/zh6hqdgFVXekApaL4E5k2xds4uVbSRSsID22Rt7xZeARxQLjp3hwMbz
hbMNzayyqrSJpmz0NDC4tzecXstmtFUfLYv5jurSMfCL+bZSgZSYR1bokEuu
KogkjCb2XGHsLOzy1YqLQaxuQvIgwG5pF4K+SrUyUkoNO1yxnaZbIypw2bps
KcwXYBlEOGW3JeYcl78WeGvE14oGz35Ml/aGbBDDnHAO04IkkpsCEvb40bdg
QrkKdAczRDONTmcBksQMF3UCymGiHpLyjdSrRpft+Y+X2arKt9kSfo2nyTN4
/PTJdzCDu1x1bykuqpoFpd6RrbxqyW+/2HNGG42DRatUPoED9yLc2R2x0gIW
s6cL0rWUWEIn1wiEXiGnQdXBDaxlS84pur5qQk20soLTf3PRx1ZVCeTMG4w0
R3y2EWVzkVOexCqvQpGu2OJEEvRBrF+5TIsbhTnK0C2by7OTdADcJZ68QROi
dLHkoikCEkn5DsmJJg0VWplB05brUm71UpmG6III95NXVW55txeYMQ1q4FXR
7baGskgPiTVcC6Swz1LXq1Us9TcbBADWX86y4zMPXcixNsNOkHlqOOZYqOXR
d199i75HVYaezL6dSA76qGA6wypF0n3Vo8NSWb0gWGiNZc/ZFo4CRf4MF3Pg
6TRI4NZHOUPrpivJM73c1/lGkjJ6JcZUPhDL3O7Pn1HECI6EgtAeOwf/vPl4
rICLprqmvO1wKWcMJO5FR6BPgVIlaeDRzSy/I8+9hTjjBs38vZ+IWsYkxu9x
tr/kglN6FNre6EXQJ5jxwrIQSmXBniGwNok80KXMBRT2uPmUxbuGl7v+EuyE
V4rm+eIDJnug0sB7uUAHRK1f4O9Winyo0LuJ/0EC6XjAe7KycTJcKeqqkLkc
Iq09BWqRwbk+mLIHyf2GH8N/sPFbg+UuRpWz+1wRqlYg6qEx6nHOiY8cLkX/
Qg/fjoVdWyQeRJ4oepQ9pg2JRs4qoOC+K3kUlDMRHbu6xLxtODlaWeYrmoVp
4eWhj8AScdlwJVLCYaOLTzhm8QCNFkveKGLDPE8CYSQPTh7MU0uPklaBBF2Y
YF+0+22HGUKYagSG+RrL1m42rjx7uBPEPfxHmmpJZRT2Mu7g8bxtPhT18Uz0
sITeZfmU90xsYZXfir8KhVPR3rLrGxUv+RYrxceEDM01VHDtycSAEzjmJyV2
yByeWfR7pOTpdVtus2uc7sn76+tTvaj9P/4N7xO6DfCpv529P9X5kvJ4fX6J
s6vV1td8TOC/p1HIO15qzJ8y0WRydBJTK4M4nRi6JHxEjCJ1cnRkPGAlkScA
JqOc0HFEKrvSD+UJ7Ach37L8pS3DB8lsI6VP5TK6q+K1FJqOfqsRzYUNM48P
JxnBCTV9KPbhC1zWdGtUOSh4gjEqJguTtrDecsk/utI3VAspcUJdpgYvxxr3
ti1vkXPiLIggqZZtOWEOuSk7Kz9HF0mjOF8D3qiCAFmZ3QVXssrxb2IHWmOA
Xp7trlNk549gZi+5utaVHgIVnDKFsFpbtPAV3hNKq66V6VnsbNbDSbVwWBSJ
7M1jBkfxaAQpkqgdL5P3kRJvtXwhOTSOkZnZ4YuKCYMFYT5aaiEB6+J/+a0G
ho2FAHmVwHjGkGAFdBSmSxzwptxtpgjGzK7EIkhNVBoXRNN4JKNGAjGwV1sq
iF+KqvamXMsSL1ELZdVso7/85LzY98LZCJLoJ4U3UlkXo1o1835NQ+NAgMKt
5zWnLsTLxaxpGCLpoT+Rlg/rdnakPkLEawnqn1vGEXmcNStEyrbTFJpFk8aO
KciLMepqb6aRJHDESp8HyOPkuaQgqZOCWhecGKDclLX6kpACMDCtGbk6ktxP
UbYHfzW5lXizkalZ+JEkAZcSEOCBT0mBM6Js0TP0WZHUimuDddlywMojM4Iz
PxsW6rJdiRfoPkQkeRksiX8gEnyD3CR+eg4Mb1WKY5OdPSSpyX6r7DSIrU+n
rL1LfrzEv/DPHORPUvacB2nVtC6KRIfRMQ72RAtDZRhUqZEV03A1KbYeVFDH
IqOb6x8IM9We9NU0XP1ESJKsBvbzE0fzWzhIgBC4wnw9nsQ9tjwm0NemZ0ZY
sHh/02qxyRB7yoqCmG1ggkPiZUgjIXK9fKprVufiIOVtiHoauYYkUWCf5MI6
mD4iO7YVY4xJGhhQUWetUR4r5SmC4xsStoMLjoU5rDatm2YZEdTsLFymJjF6
YZp8vvfcd4fTY6mBPU0WLv+CLGP2KYAdTzROnH84KSmr0R3QZeAeHII9Yn1C
fBdULXhT5FuGzsw5pKgaHGavTJvVKogaEP/kI14jnyFM0ib2I/sPM2sfNtP0
CdS3xTxxaPPYiIpgled7xwTG8mg5dsZAcJyNZ0kh4qcRCx8bemUR/IYRIA+d
hQdyl+J7OM/iFg+avccU17KV4/YoF7cxnRqnvpEbYCFFvSbcgggEJSgnZasa
LRb/kQjOAzYvUlxjJAf6cFXkCG9Oug8nEcP8KQEdbccpXlxGuxZ/JndMwKOJ
U5YoWtResG/Zo28eqn5yyBnojhsFCSJbRgEr+kmS/g8PviO2dukFbPbKshWw
ymQLSgY+LA5ufP7TfVEku4hy6PJphBCTMdjc2+4IxJDVlrS+N6ZQUDhIJiV2
lGbiIMt2aVy9j5N0GxmbEx7Ghmf1GG1pilW7LBJCkabaHjm+3oLMpTTAMB7a
ni02WgI5XVU7zc0nmaaeMm5Qw97Kri0XlhGgRtyilDo5U0KqvVxjh9AwL2Al
JSafxOJtX7ZNJXXyAVmU5IpobgWpUL0N5MICzNAihbS3uwxr1oghL3leLD6k
DQpW8gdKV/rc6njCknGTxDLpHi0PWorXNx7TlyJFUqoK/7gq2r+Jsq50ePL+
6m+Xp9Ed//jxw6/g3lk5BAXSuIgbz6hqmg+St5Lhm9nl2fVPwF5CoKqzmvvN
lPxleS1CxdMrlCJNgRgqzVR4UubXOhLrDuxbRnSfBgObi6zbgcCo+LSoBpAy
YWkiUmg+y57vyCjF8BBCTJGJIEXowPuoClIWkcvNu8Os6pqBEC8uQWIuPhRS
dhrpi3QZZIYl6tbSpQvlG3rf/y/ad3WBLGMMDPgSfk3TD3KOyNxlx8ui2E7l
S2VNKiScy3HStOSOckaIaplPWLLS2N0l/ZNXyuWTx7L/BLdxLB5lMpvlqB89
ehJzah9/8+gRVqDgR1fcF8qhlmB0gjwOFJsQh8ZE3ABMCTF1vIeQquCOjiRU
sKDGyw5c3IiQbOzUZcTiHs+y/1LAjXjPI5zhoiirRihJ7CZ2tJS1YwfyTee9
YketCMdZX/R89y1dAcGrWCLkx8LjfQCN3H6dzuMdZwkO+4sJt425E09n30rq
xDePHn/9F26nKILOwHXRJ7qkElsBYMfJwVefJl/VYAlHNpvaMCZiTb9ESuiJ
iKtd+pZV9w3TCvQeO1p1ezXFLSq1nte6liNcxUC+SyNjQX4w1Ac6FC6HzlJU
jMgd+zl13M3G0Ce15sFlquCMyG/4zcPvGFhhk/+d+KalBVqbjAisEKi0tRKE
MQKPFG9eNAYtKK1kN0t8AQMtQSHHybviTTJVQE/YkSZlFIT/BKKR61NjBCQs
uJmD2LAkOqgOvlV8jGH8uncvvwCsmdhTAWwATKQP0dM3ps+gU6YLflf7Xn2F
jeICG75cvIYFua+G1aSWHTKeKM3OCTWSu2Zr4PcEaJNZ1LXzKFhcAL9sUAUJ
Ue59+8133yEzbLhUkoxnpsK/Y5HFai/bzCPC9WR2OuuJ4cn9LpPUOO7mleTi
SSoHXkYCZGCxxUHZqnCJe4ljgJVIIt1BzrpcMqQWyxUVlCbUiRCsGjGFejA2
tE9Kjwn2tEJNLglFkdgyRk0uYdbJfftqJDNsci9bNu0gHbVca15DO0UnqEmi
kmm1yNl3uZMyDPa26p8jUAjhf3iX5AG/grkzoisDEWuYYzl8Br6YqUsj5v9b
jqg6U0K+KtY76oxFPFKRgmDzaJOx0UL8DANd3WopJ8cKBZnDgHFQwzclReNE
iIMzy940bdEQnvbgjL7+4hnRUPc4pl5NAF1bNXORj3REe+QGoXKW6FBEzJ2A
RnXkKXYaMFQpO41OgltKfxBH/ob9GxT9p1Ag9VFYi7tRYrUxNkY5dezlJyRr
YocCsfkE1B/pzHAr2dNxnAoTPATrliA0PbORdWlLqLM4dUnexGOUxh4O+cbU
HCbMO6CxWfZL2RGUhSRA+SiNxM2HA/HFF0cAJajgrdwB09eschgjWGMICe9o
eAQTZnDAyHSGc7x34wQ6uF4pihPy3gjra4ep65IVyFp9A9jQMaMKFWt2oL/d
Ispjq5CEvBd8U32mgBWgIMCiggDKELFsfIPpMMDtu5nUUyULU6BhyTVB1V1p
yVvM1PRiuTRAxLikmEdDuV7CTmJD1F6GhM6KoVGC6qx0cmAETZPHE03kiwdG
voJkcfGsUh5G27114kRnhS+9eHuliTAPn1BJngY7izVW2qtlTnwZk8Ywuajh
2BxjTx40Xa/eXF9qUtiTx2CM2DYQX8eKD/iBp4BG1W4rsP0C6t2Q4QdnI5Bl
6nWkzC1gJ8/Yz/q8aD+AYrHXQ0WJRjZZ2OYbGS4TwPtiOfJVze4r0YmPlU40
Swx3btFU8v2C5gWFfIn4hTGrEQHjESlhkzASUWBdtTOEHo4ncz+kjpj4z5QW
juBFXBBCHnGqeDTkRDUA222knykxR4QvInTu5kgvHOJWY1P2gQ0FDLMZFH8S
gz4yhQgEon4KjO9ieTC2MBnzzh7BfOM6eDc1qQLlY5WTZvZ3DC+3avdPKVFC
Zn/kaZmjh/a+QDUVnFkBby+qkssICJrIvzmLHR7FveEqvXWjYoDf5nxEchzd
ow7ilKWEMAZhgz7xvMprdMExLR8h6cCmVRuKpnNRCGa96wEyEQP5qw4n/emc
1xcOk1K2SDOiz9EEZdpDUgDFzni6pqKJbv4s9Tg6fWyiXUFiGzoCTjsJp8qY
C/YQy7bFKRHmZ5FL3SZzj179Mjej4JYXv+PFkQLrk0enGCZ7Xlr5LczlVfQ2
vKCqCjXo31y+Vpb31bffPsVaWgo9fx8VHcZr51y8jC5Km2/LZfb81QvNfpCG
HyeW/bgkyQujPNkgWi2q9fRmlbdrL5oxvQXOt8pe53P4v1eMobikcDuM9/rq
MpxqDXfkAdHx7JutiHHNOs1SAohsbi7QE/N95kiNeziUFjEwVz7VfGksUlRt
oK/ve4YMzkwkNBu0HVfGYCIz+ee/x6N4fIpRDKdQYuSgWYu+pzM+UXcflRWj
NkEchHRIXH0MxyBlTNXK0zALeVEFUmZVoSOSd2pRUL9PGMDvkoKp0fyenJLL
xHECKgtrtjfkIyCDqKgppaNk4B2WIOR4QtRiGMTKD1JuK+RKCWgqFRxPkUoW
nl+nlZdyBURPMvzwnq+M2TzfbrgAyGU3CMW80ONO8G4IkC9E9Soy+dmYQpHg
EkhS1pPvNFpzuJ8rA6w6CSJT8sgsnO0iFSEI3rNBHcJpK5HDDnQh0a5mAgGQ
1h2faRaD+91zb61JNZi70qI2D9oJuSIYfEiyCM7wp+cMCYBOJpy7olOb4kc3
jzMl8Ai95iukzk696NOzArQIJZp49bDirdkKvNTYwyfwy3dbYDGlYoXn80aC
LhbNk2AkgoQWIYYNe4UscINzkiV4GG1zKzX30bsQ46PRsnVBzEQ1dtiTui3l
oiRkHDRWX56/u7xirOEkLoqDS9UbbC+8QQgPDLa51+wykOmiijuHakttaEHH
LV1bOuweU9O1ybEDSEDk+A5EFmIEgXITNNP2EMrNKJjpPa0mK9u/pwf2ADVE
7F8XbjR7tF95AY/PUlqJ+yrOu1vp/Iml1A3CmpMbo+GSHgyQttjitMhOLppz
oCtxmj99/FQbZ/eR2+7nXdZ0WrL/wGSbgBzwwl9gPIzY8Ouj/GnM3Zo4cqgh
Rlz2IteeqeJzQZIQBT+6sA2o0/tlYvwek+rP/ena+H9MYjrcBHhdSgoGLn/h
GiQY0EOLEnrbkPOSawCx+R2mo6dtgQQSHkXmLHvdrNfR1WIQPvCIpS5GDK40
jcFbATeFD/bez6E5sq/kl+TU4DhjEmQoEGdJmiJs0GL6L7CKKfplpzzzMdgS
jdBSObo1v6p44Wg+gc7NoWORbyApwpDUR/M3DESRwqd8zr+XkmeGEJu2BEfZ
18ncMPsLTKBmKXUI2qvdXNkiiMvaGSiN8zENiNnlkSTXhGKYTuKSYcgUjVht
hJeE+WhUDawItflurUAvFspRUhU7zIHuCUQIKLjUKykk8CzSRTDZtjJksS8V
Zp6gg4iDLOSjKzrmP/NdWYlDWjeOa+/XyNTpEU22jsKklm4EwyOnpBubbxro
H7sG2CQIw2t/ozxhaiHCecKD8BrVQHI6sRYjOT3GMsZ7jdUiSFeItxNzpKg0
lRLLaUhxE/GnE7kTsw0x63LACDnUtbfmoqh+0z7H3Cakvn/B4r6VwRPDjwSL
b2A15opIxEpjHqxekiKnEVFeH4WQUSHeVS6/NQkGjs+J3OoCz2+ZGaI1DSWc
C4I0PYciQaRQBF0iuVJ8eF8hne6UTZYdXjyjdC4Yj77JzY3ZA8cnVsTaBjoE
eAfZrilFr5gT7DJm63Uh+k5P8tmHWT5TTzCdrHlsTz8nBG0t2iNOKImzK5bT
rpkWY/rMPVi+mIVs1ZHP0KtziPJNPyXJlUbIuP6pNKkXw2VKXg+f30D8npLN
FOZWwIz123RDSgsvCji7y+lXh//9loRYThSAFVMp5zxSRXX44b50I9XlHd06
t+i44Ynr1nK5BXE7xpesw7SwAnd4LtGYiYT32UJNyDZ5exxqiCQOcgGKNbPw
37atl8RzSsaItqU7GaIgPJwe0PRMIRn2nKtIPL0MNxG3W/bEtxlCK2kXs9vQ
Ag9DbWdNpYzoxER1SXQwvs0/sQwRoJoY1rNxs5sCO91rUI602doIi9kD63Ql
++wjcAhHqqgaq1h8GPJiNtneSObSK5quGmmSz4T2WVrD04+jRV+gvpKdqJQl
6DfyjMA5oE4GWjfnBS3yti0Z1pCAOtABD38mD8muw6whtcEFUAyPnlqXJYDv
SW5/v7iFWwowT4r28YrdcUnJs3k4tCrV+V/isvTuImZKdII0eNjAANY7eIiy
2Flv5yT2AeCM1hQl7WjlBBYNVqaVs4L6WbFD6pTtucgNLNEMtk0c6B5CVGeS
dfka2G9wze6tRd/TbzBfipQwcrcqYWh3WgU8Jpu0Fh+IrNc3l46rvjxAHA6E
kjIPi+xlvaaIuERltFLNhjo6enWgyY7gHhI216/KGsLOHIFJmymMkn79NYGG
/iFLQSRsrs8LQSFZKiiExzS2pKNeUigGHRPQDK3+6tAypwveUwFYZEmPJSY1
aWyRqBQqabTpRQQo4JwCzFMPJjIsBjRxdCtNUlnCqr7QAwAyxb3wHVwtc4Zw
ClxlCPFYsiA5VsZGQc+r0HM0WNebTHpV66xtHW1XLPuJM37XMBrvwQR9Cksn
xVMRgKUPxpdrzx0f/9NgqsfrY40txnXV9pp9Nh9Y2/dK0itpb4y0NdLP2hli
jNlKLrMbCaNQOnFMLpJwJMisSsyBuz6wjbnCW+Y9HdfQ+24xrNIsCN45Fsz7
ZrQ0ES09oNRQ12QUC0TY1OTde6Z4+r8QR5Smf244o2112ZjWcwKPELRJ2g9q
uJzTH5KPCOqa8ewEG/EkCXVp6Vg7pW9pS4QtSOnpsuUix5b9CvLzZCQiPclg
fgwrqVSBeX4lHD1+Glh8b4Z5O3CvOUfriSbU9j4i8AYyfO+P1EuOPYofsTcM
R4ClNmWinoKJN4t1P02lTv7q3yYQF3w/rgOZoiwjJG5iGQLPj6QbqsJAqk3H
SnHXxCXYW3DXgH9sOzhJKpkjWowDeZAyAlLlJ2QUimGi5wQLSrmSjvNaQCkA
ExAu5O/TYO9nBgi1HmWxz1Dpm3i6m0t5WowbatXuQb05iCbA5Vq5aANj4KAp
atM9vaa+XyhreVLyUpOkp3ibKtx8Qv7bipuFtVAt9+0lLsVRf9GT+aElZUBg
O7/PNAOPOAtsx7WFwiucDS6UOiRJuPvGrLJ9SciCKrqwhPD+7T0cfNiBIJXV
iZuLErsebaUNFXoh+rtKiSaHnk4iHmxzRMph8+HMjBEjkiRDyMUjko3leXC7
Tvt8qqL+e316OPQ7BL0hkOLYp6Vv+1CHojq/yw3J3tbivBCUS6Ey5ZcfD9qP
MaRMSUpo2Eg6+INFM7Xuv952MVO7IVgRyqcvV4ywLwWRKb8ERSYvjVlTcA0D
gZSZOrOE8vOEJmPtyNuX1+fv3r46NWiGp9K7zgNNlpK0Kj33pIiScsOwv5lA
jDqLhOtMYPaDBCm8zLoXbtnGrkfeCEWHmxQeWBEoW3EWF6bpwh6/+2t2Aopv
g/sFRH9qWTWIr2XTSYzO69Q/ZMLBg2K5TOw0dZdTLrj4IcJm25+d6mMK/Azj
gp6cOa+V/R1LD0vAU0FLn71yBDDEJqPlqeWR6QXyN2IYuJVoGQNXZUtQHYNG
zrlChvAxyZYq62Sa4tHacOtOlIsFKRZxW5p6CmucYtpjb2eCc2aS9w8tkmfS
WXzMegxYnob+tBoEDYlm6QyCk6SCeqowEIOxTEqzezXErEgHzSKxnIUPQmI2
+8i9ksnjdqkTJkidJGm+5JePCdTc9ZaXJp5xWxVXI2M6Auuhd4L8KvC4FESW
9EWpeLTsycTXgYILq30Lt//EhXQA+TNulaF4JQToz0iH/vP4GAJiFE2uGHSk
YKRa/7lr/4VdBbnXJsIkL4uJFI2mfHrqTYAaFyFMDTPiyVbJWceXHSM1R0uv
UVSTavtARHSERygtF4X7APtkA7QEW2sjp6y7oDhcr7afsLSI1dB38IkJqhgR
+aUXc3GjsUwTrzo3eaUsHB1z5G3n4uAPSuHPmfU1cGL82iEmeXMcfdnRGCfI
061C7gUkFM5VsIZwYzioIaaWiZdeWywkaPO7Fi3sMPEdKajyhwOyvrfi10+o
awOMFEuZr96+ueRS5AzZTNEmzjjxZzkOf4LYxlPC+j7tpcRm2fOC8gK30pSN
igh97we6XlY8xM5n9puUdQQZ7nU4FpM75sGtlDNqsZhUdUQEbVuCxG0ZUPdz
wLn/AXzZrAeErQ1FgGmSH0+aYCMmUnfDQ5fmIHAo3olmIkhknDglaM9LQ5+J
yH09DBvF6uOt6yudA8gbTDfTQDeRD7rWBDnC/MBg2BkuVq/nUL5oEdFwWXLS
rjJsrx95p4vPDB16DbjZ34RFGtlT1jIb/Sa5QKJ5JAjcHjFjuPtpu5wie92n
GdU0613H8juZkrYBVTwEFIBO4ZTOm+6F2zIf7w0ZtGQv7DCaLPYB0mmKl0oG
0JRraCyRBGmpLcmosZbOdDuQcE0d5Q3SjKiSU50sFD3Rwt1khVLsz9mDVLlP
HRXF5QYbHZm/czGtYsXebZHMn1fIDqobUOBaNGNg7+cgKrHOjtZO/VVR6+Y6
8YK4nquM4rA3VxkbUnnaQoOS8QrpTAp7s8HNXjeYH7samKo9kk6qmTupWBKI
Q98CLavKVbHYL6rUI8LZ3INm2Er+sXMs60uUEyA2K1Bp61D6Smu/XLYjJYhW
aNF05HXhFlPNHfoIbsqtFLtQFAlHikB7+botZLLR3E4dVNhAVAEMvUPWAVH0
lBYSUhhRTVuKFtryElVVS2CjHR5qz3h5bzkTf49JYR5B+wB4toTeyXnwmJC0
bx8zljZKphm1zWqlBadfoSIDC3GUrIJWJFvX0hBHmhl995VmS8ZGXBqAF5sq
ManEPHv/8uoa1dlD5hj+3dtj3z58qt9JlGunvRpOVbmixjMm/gpJExyK6wlC
osCxgJYgOMSWhuPbislRR7HrbjPFTG64isBunUb/+hdoJpgdrlJR7/vFZfYK
BGwCff6SUNJwoJOLy1cX/6yb8c1DrG+nzVjhO+Km1W0P+wBKExw3eVI1k8q7
y3SgryjTjQYyZyKWnZX1jtN0sCTBeFjbVFbwQ0y1uBEmNiRW1WB7DIR0AC2w
oyJBuk0L0mXo/nMrXo03zERsxKcIojDyDJaR/egdWlZsE2CvFewz5UK2+TLf
co8zy0qexA+rtw/PljP08TuUp4MKv9zwYqJBBIyoCiti4Bju6FFihhHpUV0Z
a6nUq0j+8b3uUTxwbWN38SacGmJEDyiVYlqaMtfGiQ9p7Qxu9htRt6xvrbQZ
RwE84KXR6WlTQqPG8CZ9K7Y++BlKPiL5XndkvpTkG3FZ1JzfRVMGMnIeLQo8
VpZLQFtqipD4YcnksoZ5gTvm3VDcZUzTP42XLGfWFe82IzLj3UovXiWwM1KM
rpk7CFFH4o+MtH7xJm03kp4zPsja435nMNZSdFPGgNrVBCNpMo4tTPkDA/kJ
kRE0nlKa5kVI2gGi3oLepLyW1V4Kp9HvaXH3ThOS4irxYl28mYhxr1qS27mT
F29OWc+UrqQa6Yg9GNWjLMwrxSmLGX8I3B3ReYWcNyAPSY7CXeCEZ/TFxiJ7
oSWkto+UZgJGQov224s3gXoxGiQPs/1X7H58hOdE1+4Nm7GB6cJdi3m1gyWV
muAagbtMPadMA1IfBaC/wSosUBhfyFzFd0tapk8uIFAXZr1Pnj596rHiVVj5
/LklZyzuykCoZ7gT9FVc4hH3HsryPNyuJWpC/8HC0v+m0+/d8h7kc9yVhcT8
/Jv/mo38l+7BP8QdOPpPU/sv/vM/Hf3r2ID/evQiTiv+U/6lM8Q9fGAAWYP5
Hfqvv8XSlQmM0D+AbjEtN9PlBthwVxX/eHyQ2+LpJq1EYZNPj7G5JUHB5xXs
wD8eL+gLxwdBtEi+adiak/1CsNoz01En/UgfOaSk5C1mDLEKESdsicBkQmie
aBLsk6Jx8fiy8xsuedMJi79fPCXrN0Rnw5qMfwmyxwjOZKwQZiJML+YoefhN
zFQhE5BqCaWOgdPJ83XdMGLJISNCHNbGPvqCbzImBXrnayza45oqHiybGqrl
VIzqvKgooKDd3mMyp+YHcwdC6rNFXlgFlR3vauPcWXjCTFCvJeWF0R2404Yk
YSA37pMuyRp4u9oVzl/nQSOlK+ws+1kCfxGk0klQqn2TT7OsZBc68fBJ/EKI
I0qI04DALJXCNGj2mZGw1OpZHzwH2izwGUSLRz4fFE55F9iyxAGJEHkSI2lL
qMU/fIxWAb7pzZGJa8GBiNQd7qkyYziwlrU+5wNP9B2tumeLMxRI6i5TMHXZ
sYbSC+bJddYmGKr2KIKLWAcpBByH+X0qN80WLURXBEBqCbpqQuaampE7WcRw
pvoTmrkKveHQ2Mi/5gwdcVYgTeBQCKTCTUkoj9exmcVNo64XYweJsyAxOyV2
4lw/oySMHoX9VlTl5IQ1LQx5BZlAEhLG1ICQ/fzm9SlfkBW3biy8CHfT8vvG
LGjX3WhFAyyp4YIEoQpcNMe/o6IY7ezIIoHcGGhHg4QD8uSytimLTvSzyh2k
cbW/4viV1niNdFcTtLqy/pCZ7Ja1BomtsvZBpMg3UfyqpE1TCRnVAhv7m2hE
ic+w5EaJHphcYTddc1VXSyJwr0nfe4UP2YwzvDc+w+hAH3ZONWNfimbUIeNg
LauXgmacPSaTJXlvOBbdDWVN3rVK+iR1feQHbbTosZPCI+uQ0CAoic5F/mjN
WUSVJ7BLinm5h1w4mDRci2zWVCxs0XMuVfrsxdLQYBLtQR89IsT8WphhRMlb
PRVjhD8l6gZwFXTGVLnLpQ6F6KCLzgiLwq3iFdNcAWMYaKOhfOnS4izhUU6f
NQLLl1heqtiZiBxddL5HCEWqOUnK2pmo8z7WjFybYIrb63gco0xzaI8QsXjH
NPmSTS32EjhzV5vLWAJaZFS2THif65zUudAWPQYsCyUuode3mf+dvRsXy4Kz
qUaZ490AwowNrpHhOeDJw6qWxRyitPqNAXsWB0TQ8GyFeJ4EEkZpFmraivs/
yPiUeplrTFfSpdRA1HfCD9mLRnMm5D3O+GBum1NBAyVz4Dh0wegpAxQv/Qs6
/g/SojokCdyuz0p/gzhN7EVje2OZ6DZTqjlEjKZTIB4qQIeP/pAioWHUvWZ1
XPZEXkKGh/vFIFiKbm5Yh4PHnwvPIEWCnErKgW7A4C1iY9+RNxWKdDg2eWd5
NlSShoVnSzsBAS3XPrAHyVO3aIiLiDtCmwO39wcSYX8MQz1DlCNTc3Cl1J9C
hSuDNcAWLTTHMBmDNOY/jHjExMCyYnGVqqMdPyU4GbIPRbFVLX04JPniJZxL
gWolJo8IkQY+MZqHEUKOcT7CjmmU4U2J+LnEo5B9Ya1PNPvcpaSORIqLEDgZ
jT9Pdqy4AOyNtpDm0ZOY7M9/lBQ0v0RgLui21wxQh15h4wWZYx7icjnOAnyZ
YmmUz+WS1LMsc1anRGtm2cvh6ih/swk6Y2K5dbiL3Xfwv2jeDSzgvgqtXRdC
KuxL2y2PxyiK9p9tOgZlxXVvzLU5A5oPeddJKpAOR84gocqYre5A6T8yALqm
w3gxni13FhDV8ZQvy4yspAlNM+B627JYSEVWpExRJ3zmnw4neGP4Vui95pEf
qC88dZFnYAyxCbisJrfJ8aSY/T+eaWEo7xoVQgnHVg9Z1AK8ac3JEZmg7Lu9
7K1BJm+kIh2cFSuILdR3vZOL1LdEfzcDpyrQ/IrkggkdhQz1wh8OpIt526Cp
lKBnRLjpJ7NYBgGKWrlU7qiw+QJ1NVZ+EUGqgF4lbWfXReQIXadHURswIJ7G
0xk2WmFlOKHdEVLQ5onajjkurpEsj/gJb319hU0QqUDhpshv9y47yNzszoEz
tZwFysOjHqDuU6yCaSN0vIMcAYJlwo1tBVoUOxhhEnBEUOHQMUPs6Fj9iVDv
ENWmCeTYh0tduAZnsS78BjjGMaf4CAN8ZVW+JyQyeObrmejYzgEwqnX9XvsP
EX3gWs/3xo7RclZVj0Bs04ww5YE0Q+8NPp2oT8tKzYbT4xIRlV4Ttd2lHxO5
LOZ7J7VINpDNiz85SBv2ohhsQV10MNS0XS2+ffrwm3kZOJvpG922CHEfBQ4v
cTDHCd0e2sHrtiiyF9z5VXftCYVyGQWAwlq5LcanbU3G9q4udpi5rsq+Ho2o
Dv3oTq/QifWHPWiK0+WGtAdamcf16Y2grVkZU8/lWk5Y/T3ihFvjRGZs+iE8
cFSs7CFBchRLShTxJSpEXrcPOnaZehqOPCD3k9lXAhL92VOFezlYz1GWQDw0
bdpXiBT1lrOtmCvqAbvdFp/dEdWSvODsHtmCKSFSKryb5mJLmE0ekkKd6Mga
ZEAfNGLrFHZrdST8pZdrFLSKSwKHHKqJbXKdfXqUCHF/ABaVJHg6dvAR69Pw
uwJQ8BD85ehW8P09E/IcKVblEbhBDI3CjhiZPadfrkpRQPt4uqKQZ5a270hS
D0kP4rOndCXvyympy02vv4bisxQABA/Piv77lM01k3pp5HB4kAhJA7s719o2
yRW0PG+K8I04hL99RNDXPFTXP2v1qkvVjW/zq5ThVxXVEHhRinUN1MaQUSjf
yifEsXC0Kh86nKTaTWI0FdHASzYxg8/Jlimrlwy38vWTv12+Tc+LBzt5/eTt
G0MuevTtY/GH00uPBy/B8/hLe+ExSjAlh/Ske+RwDty/2QCB9ehByXyV5sN+
++QhgZD375hJDbrdOqZtl95c9jLxl+hsXC91fWtKZUzJndJIPw+jM31N1+bM
ErtOrl6fccTPuTe3DRyhddr06fF1dzrjARmNjRHPrSosJYX4e52mA+VHSqv2
U2zpaQxijvoGWseWlzdJKVf4wgpMXCr0RwMXsyV8rzZXfyQN5mCXsbCBLpmk
bVJ3VNAvelRnJUoJ1dkVEtJLTh2p7sqo7tvHeOl6VNd//vEVpwsYSP1TKcZG
n7EsybJrkIz60kVSE+gAKwlkmLuUbcxxz5hR3BCUQtwVO7XPeRjKi2EHgOao
SiEImX7o4pn0kaXeRq6rSz/i2JV0xXTYBFZk4CAdBtwx+gpRy/XVeG7OYiXA
nCQTRJsU+yuRa279UaY2l4d4G/QKlll5utIOf65rxUASH2UJU++Vk5H2H+HR
dVxMDUKQuhs0rAUo4Sjz/f76ZEDJPpQvueAkcT4n8f/QjE4j2j/pwy6yxC1B
+eNy72W5pFc5YysSwVGWil9nZyXAU+yadxkqFp46yjQWcCJnLYXqWsyaKjCn
KkIEcz9CbaPB4qiTNaCjLKaWw9ClJOMq7utIVpVuQM6xPVpizE7CgzDg8R1h
yBj2roAlslOmbYB3dQJTdcTZjmvf7w2df2EE1yvqBZTZdTTMGkPCvFKVydks
ncP9ZkAus2wQIEBL0ZFojjK9eSqDEmXh83YPhu5fUaWqi9+z+bDaUNgezIcD
OSAa49IsEJIKQp8UDzfn2StpCT/Ac5HSb40KM+2wGeFq7dpmm6+1pc6BUgDN
Bws+AZLuEw7BngjBK6UEK1+f4vMPlGUN00UoaIzewzyCSBnWGi9joKNHw801
n0be5QC0BcdEoQ+5+r+PzQ8MpwxpFSh5slcHJnv/XgC44FfSMz2at65CPG7/
jJFESq5uQVNJ6qzDvl7AnteYltYzURhmApRAycsZkMAP2tsjfdGrsVSFlwKV
aj5GvM2K8D7ai1KhPjgIm4JsE7l0HVenppMY7zNBdL7zpLdi0h0MMDPoFQog
AUFGIxhe0mtBHlN5EMfg4zAIA9vt+Z6dlnpcdPY2IgWUaBh0t2voEGO/cJP4
lbkCI0g6BL+/RqeaAECgRxFsPSoEXv6Ag1wJVoatYb3GihuCahaJEuGZTCyj
pxKeqX1thrvHvHIWQLmYgdzeh9tGIddmwkiBpkVppXIz0Bq22vwbCZfxPqtm
zV0GB3HueOinpE8wVfkaZma0HMFkPP37I6tpSTY3da1ZIaklOQzz1+Hv0qfB
aHaW7q8gP8RzV7cR9p8BMVpwH58dpW4ZvH+MEvPr6S0Wa5J3+ATP+hQ4aLsu
ST4SQyGPMB31uZRIotMZQ33MjoXO5s1H7nCFRtIPEsF6rfCNLxIx/Ca2JpH8
L/7Fl3pyMnwkfBDoCHErBbxPq3zxZaGAi3OgADjQZpL9/OKSCKzNrs/5d666
hhjyDu7Ee8aIuETbY4n8+BxUcB7x/eV5OD1N3NHKeWgfqGpAFuoDVFtx5pKs
q6VDlnbFxkc2AtgQuQ15DuLm0GY7BMwkAiQ5FpTrwLsLb8jFKWvfvYa7ZjCY
MrHNHZd8w26Sgd4IG5dGYqR/IuaEaJ+OG2rIgqO8Qj4WuPZoQQRxahAWmlpD
GXbAcdopOaTTufHREbfX0ztl+Akpa0aocT2fkGRRs4gmBGm5SLHBTCM3hvH7
KccgVnAS9kqV5Qt1vGN6Qf6hqH3vUzsC360nboqU0sesCJkVzSBivydNf7e5
Nm93BVKCrMq+HllP4FA+nav4WmOhd57AEJNOSF28kAFIk6W9rI2ZAOs9n1GR
uPsvt7HCEVrmPIh7xGo3ETMxEuCk4m1m4YFXvKXYUszrJJCT6ZL+8kkh4eUO
OeS3RLsSEtYOBWVNiMkYWgriKxjPCer1yDYuy+5BWYwlO4jM6VckgCGDlC9z
MLAS7ZycTmi+Z3YNOphdV4bo4zyrWl16JkzhXfljXnOwSlBWKHGhaaiUlzzt
dYNQ6MVn0bCdBZBLPyxZsz2ww/KMi1XMVLKgkkLVgtLARSvZmQ2BOjbGK8zR
29+miYNxSHLr3CzGPvFcx8fKzfoz4x+Z29LWJI1eKc0Md7xYJnjz1NlCmsBL
CNYlRMeVK7gkOpObbN/sRrOxiHD3DswB8baxyYT+hrWPXxjfDkkGdwy2vVpO
WclxDIIEhpIQJYIs5a5wEU1v8QwTlWqaRBMgpkTmajYEs3/BjGq592p2rMGj
4766ylFjca6jDPshe2fgDWaN246bOMegOX/yh0ONnkR+Osl+8v7Nu7enMuMH
YgDFSNfB/dLsF6D7OW3a+waO/Zy6BJ0BI92D9SzshbBtprn80rSHwWv6BFl3
c+wpJbCy1F+KkxHSkjKuOWDGxgoddgM1hoD+Dq5NEV5BjiHUorClKHe+lguu
Y+jcsMcuA0/wNFucpvRACuIArPZU5NQlvJG4S1uusY8vV0hzC2jmxhxuniv7
ReWtbMHW1tyuzoHHuco55ERVJcfvVO+DDb2AlziMYQoAmapZMvIQHT6rYWZN
YDJR3/w5nXz+sCxtalXWKoaoIAZTgEWlQ6ANzpQrQx+3zuEquClT22EhMT6b
i9BUQ6FVwm9NZJkgiAGQkt4ile5fWP8ulRhGmTadWI9vMwZYad/3mpYDE5XU
iZhizBqlNU2dZWedd2eysTbh7AgBJ2HcQQsjCquui4/d9KbZGpgCEhx8d8D/
nKWLiqul5KjNxuIvQgFHGCLNMuRFUvGFCEXOssFWQyzUK0HEix/V5KWkO4vT
cWJDOOIsW/QHcvdg3g9suqmbMbrLlF8p0SUJO7jTnIg1hpprQVYabLnk1Svk
jgw6iao9rxHokb17vNExbytFe7qTRpHwarvbcnESsQ01UawfqlRc8t5xom9L
qZ54hR2xjK7zjrPaxG9Nnipjei6lLHYUUYUlLaIh6pZ6nrRgfeAdZEJTD2HW
f76vgjKJ5Ry8jQs7SPIhqU9paqRMVrN78CBgCjbXSnGrqiik+sGOlYBx8A1s
5IfBiarZLadIOcWyZyjeoHR1EUxD0dDq7A36XgsNKWl+UlDLF72vbX4nUDFu
oAECyEROBtZY0liUiYkf5FLqhry8bj/4PNXSHzvS+yLKy+a4syLkb0OBZHYa
DyKBm+0IhMLyw0g5WXyomztg2xQNd4CLva+kFEEIEEVwNiEHIEVZIDMZcUUE
x1SxUhUSIqEIbOXAO5waD1qoMdgXcwf6nnjschg0qHLxpR6ir0vrkkrF++AS
xsbq7GYypEhXCrAhdClfyeHz851/J2ZSqAFOLiKqIm+LOchccys4O6RBdCbC
bLa/DmBpWQ88fu+KimiJB7kC4lRfyulJjDAc/0aBUE78evQEY6cK2xS8ZWv1
8qPk4jgBDZdW0sQwtELYrpJ3+4FvLEGjYXxSxEipm+8ZNGVs0+QhA1o8ygYX
iqrblkGJVdKvOUItrGC7A2ME3ZTom/INYTNWSChGIUI99CrnB+lCQWACcdBi
adkcWmJOLIVsqo4hhQVmIOlTLeMypD07na0JMI2G1omhG8deSmobunz+jqMq
OsBMCi94FAqCbjg4ZjlHGw9AbzPFsglrsA1Wkxvm4mp6cSUluCY+yYcJJgQm
Y/NmYdZuzK/WDDeWH+THayjg0oD15hpEEY5Zp0nCYa+9txhwDWxSgh6kPAeu
NzC+SfgypNNTCF9SLfhWDPmuB1A9viZ7EUHguB7ykl99Thcq3rPjI0ssePLo
u2/hRt0hO2mxlSr5tzwkA06pc+PKwZPdTfKNlyLVMT1oEY9f385L4OoIj4O8
ibta9C8MuyFG/bsGzbFJPaE9fR4TvHxbP4IsU7O6vy5txhnj7gnmxkId40No
XqoMURe7bImCYlGOk/JPQgvjclqU5/IM79bbg9zDMPkDAdEjaYhQpG2a65hc
t57XQXGia8ZKXCpWH3Wk8E5pud5MX6y1FCUpk+yoci3DA7ZPriWF/vz1Bdmd
Od5SA5PouI/Crs/YsBcmz9DU88GHtTaAEf8kqUVXpy3MxHftMlBSyG+8d2JN
SEaOdolMEQqlrC5ncEs0J/fcdTVwSoKGdV2iBuGduvQEIvaPlGYyMalvZYEJ
Xclitk46hjSDbkhVvZWH0dZOMVejlx8zpO3+HJxRp+Eof8/UWYcu0HVd/mqC
QqkaCZIECvGsbQSei5EuXWvZu5WHG31qxCOJymJ9Qk1YJK6dfA8OOAXNbcwU
YnySu5sGvbsttY3JCGEzprdGXRoduWnRufsEXSvLbeTrLHiZbgTxlKVAZSSr
kcGNkm1Pv+Qus1LELmm1nLzUZwmuss/NgJuuN8ZTEaBomQ/fdgjK9qqxEIop
oJNUup5uFLM4b6ewGngvrwu8TQzLqq23imo7OxCMQ3aTkKgxZirrIuBzrewu
k8DQsJuM7H5/+rNUkSRuU8DOEx4jz1BgcDSMEBt6UGafktHjhw8fZxdnz2Py
Z1RJf0EdFJ0fIi+/evKVyEtWd5j7DSmUGKDTrVUEiUnJbmftx4JJS8hXyPEs
LjVq1jM1Xq4NfrTxjwveAQkIQBkLc4VzIHbuAHI6hqjEVf98/Wr6LWsvb1+d
C8CzdoVJcafYpl40Cnv1c11SrQuu/M+ur55lrpk/pumiHid8nDsQ+bZEnEe/
4S3Jzq7OLy5m2cBiYHvSJhHJf0yrlr3HObA0o3Z0u856uoZFw5lPqGqRy814
Z5Tw8ei02Nk5UKq9Teuww01L/FVfodsN657CeFM0npp2cEsFEJsanHO/t9gt
TGoF56634QyLKgWaZSWWgGbWo8C1YEuK/A6ayIMoiGmn0MRJJB5P/9/ZUdlX
Gzut4vd3VNZ2ynJKv6+j8ojEIeZ7/+7S1lr6S14AY3WJXYUbUFJKPtsBqOiT
KtjYg5jbjqRoDdYQhixxz9jN6lWypE8l9Sm9KGcEAvGvsD+fLpoys3KjrDtl
wPO9OzgWN5ynSMdixRrOUImWn7ybujS1gIC/6LzepFz0vBnSxzJaSOOLVmGG
HIVQ66OThbyld2VIj0bRtCMe5MBBmS8Wzjt5n/NXvDlnh3jGQeeGUoDQ6DDi
t07b5GqEhQzhMiSZHFRZH5oJu2bzsdfHvuk+yHR8fIFkt9xZPsPoFhyLVHn8
3TdfJU4Xba0m0XFtd5R0lIoRPp4jZ25J4gdzKgYLVwsrh2uogLwddk2zEA9G
6REHs9Ku0AgvjFFQRPAiDP6SmJ4AccXGviz947wpmxm9s5ZwGafkUnbcBQ2F
zVMp1po7HWqgzLIp9lCO2PjkSeDtYO3EUaj1HNMmAHw7Jb20NxKy7kZGimim
Qs6XDl5sQM9YuuoI+hWnzqX92ChxgVCwy+JuFEPFAtPqCuYWbM6rjiJRDY2t
c2V2ClK/9zUwouLbuRFEAcMZ1mKj85LxRkxSzd8sB9xMu11yGdP+07m7kjFE
FxfTDUH4TS9j0BdO87f4h+TgcP4q+UkQUTvp0hn7h6GuMTHu/hy0mZtNzvHl
N9QTmrfllx+zk+dvfvnxdEJ4lrJLCTW4aH/HmKrIitWB2nGltW9xNbIKtY5Z
DeXNLLUfr3YRKKUvmyACY18Qp9/44AppVVJ91ri4lK9P50wybdATiuRbs+wl
JqXO/bakC5Z7RRKQBdmiyjnjzUIs2qx94i1C637C+ah/PoruX5WInznx6L8o
0NlTaAhDcmlwCn+2wgltAElMUrAttKcsD1QmBF9w0y+zaKlLTzqBP6uQU0A5
o5WyCE6EL71YCfgd+fCfGRowDx1mtUm1qDlBBw706DqYYEejzRykJRJK9HYh
xLo7Jh4lcET7qsAsYhro2B46VrkNwgR2hZ7Axt6SXT6EQ1Tnl1zS0lmuSVDJ
JzeaB9+lKA6v3cVlyh/j1cFBTi4uL9+cwhXUu0cOWNT89TCt9UJyqhGkhsOU
hmNALbYRY9FRmEL3YemJoSBcyDW0ZjqWLmFtAbQY17UotkpB7pWujY3cfGIH
ufl+yDMn1OIEdrllL4IHL3Ztggl1ULbTRKcdlWW/Wa22rr5mD1PEnfLUwe8f
JA1NL2XdgDJMMbNTv+okp3BIUvb77L20cgkTQkntU7ywEsguJAhHG+o+SAp1
Xzgk0aUuJlwOW8xIbimJiHKjWnPdKbwgpWI6ZxWBStFNFHwNegQ2sM63oHgQ
LEjDeWGU1mVJpUBK1MOCNGeTPdpMSIIP5hIcX4yXoM+SvfPQqVbrF1O5nDnF
nQtIk/Kd2h6Yl459TSV39oqhxdNYS+o+ppp9rL089NGD4zsn8uks+6mgiygQ
Ub1si1hjc4+M/RtCitkn0BvAwJfYK+SBNQ3xG02+wUWsvpEkqBJhCclyOr/8
mQFSfhVtV1pyOa/JJG2g3ifMJRaWLTV9qvO1PcOoPosuL11FPPOuWup+D9DB
dVWG9YuTQaGaqOouFjDuiaETJCB7JtQ5gF6OtUl3xp8mbUBSr96kWe62iqQe
YEr0KfkjUtHDeT7UVDWxPKQgSFQ/GYA5myFAJSQPW/ChoPwFhq4R7dPQovTv
wWIB8e9iH+kjmDK15ciqZdcTi3c5ztGxw7KRXqU3vcURK1ipeIkTaQnqHzb1
BJHZgHO6XI8Y/SnrIDhQ0ylHRa1hIuzorh3o/wqMYI/1UZKTp9W/yjPy/YXi
5L1SIWmWknUoOVbevcENdRkMih9ir6I9GJ9KmzWzx1BBr2KXNvZtSuoq7IEO
i0nyeWhq7SK8yT+Wm92GGaki4fJgZHf94Epu9hil22axq0SnDCQdheU+e38Z
uS+4MRDjAHPxKQD9o7pt5QnpuEYmrD6oOkBH0/LauI8S0K3jDg29HVJPhelW
hzL+KS+Mwf5yvui0f38WbwRHD2qGIxofw/vBGUhULDXURlnS8RbBr34t2sZ6
qpXydeXwNGE/OaO4Sis/YzYhCMppuGNkfMwaq/JlwRIXdOzAnoVcejYtqTAS
W3lwK+Z4sTw0IyPS1XvX90KItcD5R7SfQSM3ZSg/mD14qCthwpYNPqTGFMQb
a+hAyFCudthY94DktaNgQyUqmkeJZ4ldkovll5p1U1oQ7ZtD+hTORoJvpGe3
t/jHgbPJV3MhVUGYWLckBGzBbLjTPowhjRPFga2pqjWC52QL9wj5cw1kRWJt
VOQQURdxBOEptg7KMBxZjNB54uWuilUnlJxgL6iMJVXC4eUOnCeU60/hBRj4
YDr1316fvY2qKox7Qr+5eBFOhQewK0VcrWak4AWjJEni3o/w56cPv3uqjjIF
Z5A+H8e3cDrTcnnsGHfEF3Iwh48eT+ewDTIH3mjhxPS763yNFbrIY3bsL7RU
zeNHsxlO4fiAhBccpFS+g2r4aZx1aR6Uu23aQ53rq+OmjIv3Qluvs5OAC3+6
krvCe8V05jSnRuFNv4jYnOAOOkBFIIkWhcWGc+lYDHIKHQuMqGBE4NVBs0zu
nsIB7IlJTLEYRkaI+slBLsH2lgwRP82sgsdXR20zrjwbgmX/QdlHRphN9/Lw
RmoliOxWH5d3uHGyHQ7wVRyGn9sXtS8ObIutpAyRaY7TrwaQUwIGw+MAAaux
c38KVqXyAAVbIu9QG7J6wj0nTTMbspI0h1CSS7Fl0t4g1Xst/b6sjarsd3Ao
k+Gls6at9lxb/J1XuGTRz2erBTAj9EpuRNPlpBJyUBOA56QfczmvuaWyU8I0
5/zarqtfv5+fG737HHWh5r15iHk0SbPAvtjX82Xfp9UmekFFKYlllzoMxKeL
bqfdlnwG7KyR+hQxt6wqFtvkbqfzPVVppH9w8D1SerHddT+MU6+iEKXUG24X
n/6P7+Kw863MJTrX/YaR4D6wZ049jHX7ce0T6aU75b68TN2hWUifNL/NiQpr
vjxD40HtkOoxtBaxIYHHpkJbknZ48vM/nxoGgVSzOPeFwwxCl08SRVaQVPGm
4cgjvWa0iFory8MGDLMbKkQ+yedBgVr/jrmdLXkDbCOU7bESdiwLJIe6LeBY
j1SiS1dqJQ5CS2o/uvDSPYFDoiUu8VvCm9Px+IC2hgp9u6tq7V4j9j1z3i/5
amjzXpcfCgwET+47OQoYuowFcddIA8BTzifg4imtECpv88V+iporJXGkWgA7
RfAIung3GOBOjaKc4GdZXUDmDxYz4/ZgPYTy+3tDs6iosZJxbbxIHkPyizWE
vBNDaQxFgtEequV6ZyakLzWIqd2+UYPZKzbcVLVTq+XUNKiWgqJFPSz6y0r2
qHANiw31pTVjH/sQ4orJbYDbHds2KFNiSaIBE/TKmCoRE27GSItvsDi9cRRx
J3GjF0VYoAz1D0Yt3Y10ed9ySEglFlGPSMNJIj+pcAMjn1y3qH8hf1tZg7FZ
MrWgZOjAWAinZNyQ6etWy63zZI1o7iZY3IRhIEQnBmzhExgGvTPIG9NheqD0
+ZFEKLKAMX4XilqitVSTmfT2kkpU5O68O5oSL3wDW0zUsWVwTIncakhIr1hb
hg+C680tjksxi72Dui3Wu4qDlmUIO928TSlgxphCgEmeJebPYQdQVfPMvhYF
xBxjhAxFqBJlnUA/OWsxJqff+4La+HhBLF2bQ2Ak5yRZgzVB3x7YVXwcsBzP
5ZrhOi5Rl0ZGKEG8X0rM2ID7ckachmbbUCuCk/Ozy1/OLmPf00eYADKH2X2Q
DosekAo2vamwinYhI8kw5Nw+uwQblbLS5W/nEc6TZmWzuHa4EDqPX67hdeLb
z/cKE2Wsw3sZRu11SbEcNIbjTACE9W/BJml2oeKEIWegkVPgzrDAGlEUfOaB
wIYccpppJtIc6YRAm5X8yQA1bK7+6ceEgTVYzYhVLTJZ5IGuXpIB05q42GmX
4x0FV9TAulHmOEWV/jTLrjlwlEaBc+7J0VRFrDnpfXxj3UCdKlgVHH5CYBAU
gmVVrAvJVaIQFCtH4olmMCGqYifbAXPywH6TD/m8QBfdiFgm8OU8fBAOEkU0
mQXUB4vyRXwlx+KmWDDXODt/7dvhWjbxPe5qr1u0QlYTODdBGwjOR3BJ475E
qlcpYosDbsMTVGU3rUGJVDKWV39/NctBiOOABSe5m/8A1YyCir2klobYd7ef
yNwTGjDgXgQxLGI1InFZCxN/KDilawFHJhSfArO0eYQlV2g9CjojjgZMIJfa
Bu0c4kFM5c4IOfadhKbfSuwCYWgL4KMldYVlt79S0+/aSKQfTWrxJZOKZq3D
jaKOSbtpleinsWVWAps00b5BMcI9OYBi11mBhIbfXFRb/HKmtvcw3nXPesUg
BxRoYkuyAFW5FAaxNf87aYPiglcshgaU5cAwTaXBMgoRLg9KL/jvrKpi2RGq
B20vA1o3CRXygpv4ygwjvTMheJGPTR4SYrfgQYyi6KTh/2Py+MRCYW5NqMoU
m21HoQRBl8W9UCCiuPnw/24wS+7k6uqn02SvWcg+ffzVI0SABi2ki2Zx1JlI
vYpQBuJHs6yXsVbOlOwfE2NAO5bwsQTenPYZGUwugB3T9LofKEfSPCjXSIjX
PZKPM25eOSvPHF+SREOhmnleoVNgqZUn/VqQuHDRlUQAzhjfTywnWJhU9nL8
mcCryXWOS1XNU4QVlkFhuduX3tUgrtCnDUOKTzkrUPEHIWW/P0Un8lbSOcW7
7M5NMyUEtkVTtpMZkn/Vj+nL4Ck6RcknFDU5VJnTPwYKA6dfIcnuP6PS4cB2
YMXGCg8HuQHcOwU1f4oNP1baCoF7FVOEpy9LCOKJ4qMIQYu+huydd0jWvnw1
u24aiib1mBn7IZAzcKvYjh/7ZBqV14Dw0HZgLez/GHz1lQeLypfNttNbv6MC
vl4fCKrXSGu/rP+r+W0FUdraj5IsXcI1d97YNFubpk0pUBR1XHAL4El2jH8K
xxnVtGqbQEsycfmX7Doqi1gNOcyXpVAUOosV6YKT/SdqRE2SUP/Eu2ZksOCd
i3bN+RpiOL2awl+qtFGVz99TQIyOC75jRrq4TkkkpdHRJYZiSVf3Tgyc11Kr
SzzyOfJNYPFgYbCjo7ij3Q1sCaPZngQ9TTBpSwnuR6+6DL3qkusqyqda863k
cv3CN9jqX/CkaZcvCx0u1JkBcJfevnzz7vLqHwmEOZ9P62LTbMP0TirTppxd
hlVpWqtGxTyoV+BdluNVOGk035NsPQEYsLyrEUnyTJWMY0xRwqkDXR2PUnJv
t8gBoT2SxJVIQpST7JAL4DHQVVMVI8YlBxeuFxciv4MiqbDg0e9PtABWrhMp
VO2urhkLZlmoRrjhaDCXZqieLOYGaq+eepEnqttCp0UNKfGkXRMh/uRUaznU
fTlaM1AOEeL7kfgiygXgEciDtT63kP1Xikp3n/WoP2XU0qHlTiMv9Qlhos+y
59yGUT9aUqtnuyipTw3Hoz13n6HNVYXP+baFH5mvNMPKTMbYlWEOYrvYq0Bh
D8jFiAKu0/I+BFMhWp+424icFfdieAUHVDRjHzq7lBjySriGwoPARlc7Vv+s
IQE6+BBIRsMbUrvMl5ipHRG/UAPBXBW0VmSs8UlIGxFSr5eDo4E7d2GY6Jib
JFb0QW6UJSxILT3+tBrT6P+RqyolfFx+dishB2FF2WeryUrhztF4TKCEortK
jnngibYlDFM9k1X5BfFQWHz/gfoZbEeyxpuRT0T3ymC7HLVQqdGvBY0M31hx
6yGMmNSu+8+dHsw79FrccXe0AbczjjJnoYPSMF8iKFNXxHwULdKUay+X2Ur9
rL592Hgq+tpHpJ1d3JTJWLcIyaWWg2EZGLOMfJrnaGWA6EDCGihfx26MKLQ+
37csYoK8oHIiJFpx6+H1Hf9qHR2HPkejfp0mGuFACCflJyCIHPRSsWXfJK7j
a85hf8bD9p//7Tf8zfSns/O/nl3/9O7tFTcnz6KXBCMPSN+kJxqSc3+V+4nH
EKUvywZHlckJSB9NCAfgnTQlK22cHZzI4Q9EDQSJmDl1X5icuLxAP5fTQSYy
53TdJ+uZWuYtxMLNyRlfs7ChkznDM/XC+AB7PMQYdZwXxpSV+yRCgmpngsB8
UesKztPUCoXEMhSmLhIofkNoZJji/McQQ1ycz5wiipioVlBgG1L5NqfHqqNX
RGW2VsB55uo4ZekTwkXjOso5urb80legXfCbuyCw2y6/TU5VLwdYT3V2xd4D
fMik/YVnEsyvEN86CgmuBFl5s8bxywhFMcL61Js2iWoK0WKtfgzHrXhMogIz
xVQac67eO/cif4NAwemk5oSCIIXIXasXjmDz8UJQ0Iur1krtl6vX2nuKhQZX
FawmGoHci0paxGtqEIoidjoqLW8Kzl0t28g12bFOsfKzi88bqnmZWqi/6Gyk
FICr1horDztryZ2ItITlQhUo+JxicHZxKkZXauVxOsM4yOgw3cBxAxYVsa+v
deSCPyXsS83ZURZ2dsEhuSUDqmFljDZMFA5/yznRGujgXFESNa3AwIvxDUY1
Z9tOZAi6Fxr5A+0TeCIqYy5gV7hQnBocHclXJBfVSQ2+p0vLqCVmSsrPZ1Fa
CRut3Fqb17OL6RapNI0KMskQ+q8AIdCUWgJY6sSRIowCHQ/YHSPQ/livRFVH
HNYBjuGDCwvfKc/ZUQMP3NyVjtEdSDrcSOzKtTGqvV4pSMIgeBALU7pvsDVe
LM0HJ8A5iipEjqFYqkynAVtl18a7AfvWj1gWRBwcb1D9FRemsJlrbPPKfvQl
6uhYDVFZHP5QmGw895lGaQt1bsey9gO11SfaUvS33/5zWmX96VSvyFjiTP+9
NIXm0yn5wbKLs7dn4xykhKHG2rqbl0R60+95DAUzckGP1M32BX8ab5JAIUTk
Lf9l0goYj9blzAz1IIWlocI5m64mjyRMBv0AQ/5CUgp9+mAZlkgEFD86Y3LR
FgiMQkPyzs2mLzJTTTeNtierg/068ilQo9ulZzh2LgrM43t0rbyGFZ20klTh
jfJ00okzSaBOdOpBVk18ykUOF2LPTLH4B+7FF87/HAOSFfbwELRe/RnWRgvL
t+TN/hgXRtH5BQFt2MsgutCP4lvUc5LnoSwertRWx8jx4RkeG2qu4Y71vGhc
VY4QLOw0LQTmvIjXOhkipeVWXNZAC0qwM1l6XF7pGOSKMwCRciIIBbnNrWOi
gcpzVa16oQTqsV+lSmEXzbXJ8HtHME9HPqRIppvtNrrf/w3zHYo7TqOIuLUj
yT9dAqMhB8IOtaPRi00PcsJBaQD+0j3u/KeX5399fXF1Tb3irslqXVAmClsE
i6bdNrRAhAdFbBCM9pp/lAF0KIeEz5hUHG3sTfJrhJgot+RHOutNKBAAlbWy
F0n9rweaOjr6k5b69EwBSzwChnMfcvwhO/ntt8g7cYOmqYRBwfAnxiJ12M9g
niDfKTfUcIaSq+bsnPtcDLf/URplwxmuC/nQasgR0wlNmAt3XAiYLJq8jC4+
MW/gRrQEs6bBfviBM3dsEtguSb+P2+537VXZ4V5zcw0trYrZPFtGijqWLDhS
95uPxzY05e1XlcjWP6VpySl00IRRkCeCM+S0vfD54aQHgk6ZbagFFlHVg08U
RCukuHFB8V6b+6VCh2uupMIAr+YNV8WQ8w3mNzajo3Q+m1I6RlKDgtTcjThk
cW32vK0ON11x3vVxduSV4lvF/uUVmbuwYzp3D9XxmdHt+thpqsafZnoorJYi
pt+Ri4Ov+7xwMnj8W0e9Q08EOHFtrlRblKKKEE9zVcCYFGIeHMrZaepk4+iN
kQPQOsQRUyseHz0zTp5oqFCh0aaXKuaVZkEVTid9r+G1ZJvhKxM3JvFVp75K
OgrIkRzMIUkPH/nIwQ0wdmRXuz9HvP/NNiS0Rxc+0p7elIvY/Q+xZht0iGxQ
jVCAyCSK+oXv0Hw16FBqUxqW5+W67HLKFUI9cvGZKQuHYhzLtk3uMxIpXA9K
sUmZPf12n07FNS4eNK6MbDeWnLPwPDSuzIsw+1KISMsSFsDCeHnkD+6exocV
kHJBePE+ssHQilqyCYKeK2nJY+XRKwWoYPRzyPudxePz55SyLE1xru49N3Nn
d4xSvCrFBA0jlVBC2q5EaklV6iGCS6ij3ao5wumhb9I0JYlcAXZT495DJuWt
j62mY+KD/krF1rbe9eCy0pxEIP8y5ge58fCtdFecZ3LSx0rm9scmASlBfPhp
aeA0+LB85SKMl+tpq6lUFlqSjiuOtYJSZX7Ob3jws8qB4mlPOIWPaaePCq1w
AUoB0c8gDnXO36fS+PSIki3VazaG6z9o6N3b2eAbhvUJWr/CmlmvZ3fwJb2y
TOrUXCb9fmzEPdzP6XJjsxZcAqmk5SEnEdlWfoY7nPScDy7A4KbrBh9r8myk
vOJWeK7/sker4IpMG1R7QienGy/D6nf1eY7fkWTtg58x1Wc1aFQ8L1xf2bEB
hOnCEfTbPPqzlf6kybq0/SiBcOm7sd+4diWlQ4+9NnsFb8MPOCkge2915W4B
vrFiutvSTU6AMEgy5uu6YdKl2g1tYSjj32NQT/FBm0ORQqkC1PriHRoMiexQ
dxAjtvQ+ut4q7uLYFxauxVAyW/deWqho+KA9gLsSI0BVKY2Hwpe/4Clsi8p0
6EKvscqhQXAfxp2NA+X3ELZQtAd73sje+19EKyKNUmTq+eXPikc0cQBEp+Mf
06kmA452nhHtzkvMBNwnPbnYtFZ7JDsQBJX+A+AehugRFJ7T+3xIdF5F2LFw
IJXnOGSXcJ/BYuGszL6P4ZEWnXMFUgLUcfgrSC4jDmY7AHMsa0aSy7gYCv2+
G9qrslYL1ee+nH99rzGijLQ2l8AbxFX/u2bBQQCqt7TqqWVSk+NMcLMqD3/i
CLiPwEtz60aEpfvqm4dfmweU/jgleJop/iEml8b0L0WoJu/7HLvTEIKKcHXn
vNvu5hWpB+gn02IrHPSTZm7xbKKDUUwJYqpOC6PwcvYcsxPOBefgkqxJxv/8
k9pXEqRK/ZxcsxBorY+ffP1Q0vqWqZtUKhsI9p3HfNPcFl/20J6pj/iMkVWc
U9k7Bn0hBWzGj2X3024um3C2XDrH8me+Fgc/jr5pZbDmvP50ygb2iFPaMSSF
C/VA+z3vcjI932N5xbGJe3muMcm9qsgjBweg/mBzvbJ1QZp66pK8b6sw9odE
YLeSPdS+19BVBzdnk0C6mcLs+wcgP6JcZAXb+lP289bybhMAiX7AxxhPYiwR
ABRBmbEX7NFX2b7IBRVkeYvfFc9sJlkRlxLDZ6ggRj6ypHJUpAV9XG019GsW
Sc7km4vnqPFKmrmOy2d43FPFDx1afM+t//hMZViSqu7We4y29DIs8m3hSadH
KPfKdXdToZjUmfXPEy+Ywpd/+HT02zOG4SiW/3i8yqtQHH9iL7xGJhBy8kMv
hTW2S5G2xhStmBwxiHXSvgqZOOtPkseS8pdn/DGitHfbkL0oURVkf/8J/AJ+
Pn129CzzD8HvND3r3eXVFH4EDsHBC3SWErVyZTfiLxKLZa8JOUL18vALIRYg
ELYm4jcv8qUYbEjTwGRL2IYtFi6yRCED9Vn2I8v9v+Xo9M3+VlT41nneVk3I
Lst1DYTSNpPseZP9suPhXuR1WWD5SLHA7LqqKiXicQZXzJaenZy9OEUxsdmW
jRWzMYfFrXgD2/m82cEsYWK4UoySlAJLRJF+eVUwefg45Dphkb3JrUm8U/mq
o6puETta44c2hxak5DVX3GkDYWxlY9j78/1g6bC293IoYRA/m1AVAMaIsUTm
pm34GiAno8J2Wmh+g7P9pwJPBm9sXcIG3wAbWhUwpX8uYb/Pqlv4VPYe7nkN
hvcbOPUcruYl6HhXi6brwA6qqqKeA3ufZO+xFUWD/HKSXXTA0LLnuwBjPgeb
uc6uQePfYJvXs/Lvuzr7JccEkPc4YLtEuxk0RlBrr2Hp2XVo4Ehf48a9hB1o
YTn/1MBnf8qB2Nsaf0JiukIu2yE5vsCrcH2D9XkTeKrNQY6cYdgJneugff7Y
FsB8gM4+wCfe5O2igQ+hh40J55/yBcgiVAuyN4tz2HqNlCkxg5qwvSnaJVED
Uv0a4fY0d5/6t9gzdAt2nbDYA7fyWbqzniXgWSoF4YOwNjB7fsKcq3rdIdOJ
/EbyQ1Ehia/IdY7sJO89z51KYXKRUFk3BkUU89B4Dmn0net8PWOquG/evKjQ
FA7GIYJfgMS87ozdcXcb7rHUjBDujKfvVSSqPy002aXOEJsP08/sgWJZyh05
WyKpHb2CzSoq5VJw64pqRTXn0pq05igmhs4i/o7CDx+laazj8b6gqoNiR09f
tHDHKZJGsZMj19r6fbMjLwSxIQmqIXvF/BdqUMjr4Z6GuRsDV3TbltkLmCWQ
6usmz84wGRKOSDxtvODMFozqA4WTEUlzBSvCTIMYEYYBL4sPH/LsKr9tqpyG
eI41rb+Uf6+LmjafC7oFNiw26mSIjthbYZD8mC3Aoueu02QVdP71YL0igUnD
hmxykMQ1XHL3dbjW//b/tWtMnVzc/Nv/W9/92/9dEQYHrHmfPYctgu8pp0/v
hFANSFLRa5QU6b6yiFzl4Yaizkb0sSnpCMvwzIwZGDDgLRXB4qzr5t/+H9D3
q5zgbHp0x9P7K3nVwqS/ZH8CB9ec7Mv7HOj3l6aib+P6X5cfyzz7r2ifzI7+
F4dzyOFMagEA

-->

</rfc>
