📄 rfc1916.txt
字号:
RFC 1916 Enterprise Renumbering Solicitation February 19963. Information on Tools Information on the tools that were used in renumbering is valuable, whether provided as a separate note or as part of an account of a renumbering effort. We welcome comments, however detailed or brief, on any tools that helped with renumbering, whether or not you intend to produce an account of the entire renumbering effort. Some areas in which tools may be used in renumbering include: -- Identifying what needs to be changed in your network, such as configuration files, hosts and servers with embedded or cached IP addresses, DNS, access control lists (ACLs), firewalls, routers, license servers, and other applications. -- Identifying external factors (such as remote servers, routers, and Internet registries) that need to be updated to accommodate your new numbers. -- Identifying dependencies between the different places where the numbers must be updated. -- Notifying external agents. -- Generating the new information (such as routing, configuration, and ACLs) required in order to carry out the updates. -- Coordinating updates. -- Making the updates. -- Verifying the updates. -- Trouble-shooting and debugging. -- Maintaining network functionality. -- Informing your users and other affected human beings (such as NOC staff) of the changes. The most useful tools are those that are, or can be, available to other renumbering efforts. For a given tool, it would be helpful to describe: -- How to obtain it (if not a well-known tool). -- What you used it for. -- How you used it. -- What its strengths and limitations are for these specific uses. If a tool was created as part of the renumbering effort, a description of exactly what it does should be included. (For example, a script to check for IP addresses in configuration files on user machines should be described in terms of just what it did to obtain the list of machines, what files it looked for, and how it checked them.) Although the primary goal of this solicitation is to learn what tools exist and are useful, we also value specific, experience-based descriptions of ways in which tools could have helped even though nothing was available during the renumbering to perform theseBerkowitz, et al Informational [Page 5]RFC 1916 Enterprise Renumbering Solicitation February 1996 functions. Advisories on tools that appear to be useful but in practice created further problems may also be considered, as appropriate.4. Application Information Information on applications that require special attention when renumbering are of particular interest, since specialized applications are among the most difficult aspects of renumbering. It typically requires special intervention with the vendor to provide new security keys, new license addresses, new versions of applications, or perhaps even new hardware or proms to change the hardcoded IP addresses. A list of any such applications that required "extra" efforts during the renumbering process is valuable. Please include as much specific information as possible, including but not limited to: application name, version, platform, vendor, operating system, operating system version, the steps taken to overcome the problem, and lead times needed. In particular, any applications that are no longer supported, or whose vendor has ceased to do business, are extremely important since these applications will likely be some of the more difficult issues a renumbering effort will encounter. Any solutions to these types of problems, including replacement applications and proprietary solutions, are also sought.5. Security Considerations This RFC raises no security issues, although accounts of renumbering are encouraged to describe any security issues encountered, any tools that helped identify or resolve the issues, and the actions taken to address them. Submissions should give serious consideration to the content and context of issues regarding security.Berkowitz, et al Informational [Page 6]RFC 1916 Enterprise Renumbering Solicitation February 19966. Authors' Addresses Howard C. Berkowitz PSC International 8260 Greensboro Drive, Suite 330 McLean, VA 22102 Phone: (703) 998-5819 Fax: (703) 998-5058 EMail: hcb@clark.net Paul Ferguson cisco Systems, Inc. 1835 Alexander Bell Drive Suite 100 Reston, VA 22091 Phone: (703) 716-9538 Fax: (703) 716-9538 EMail: pferguso@cisco.com Will E. Leland Room 1A-228B Bellcore 445 South Street Morristown, NJ 07960-6438 Phone: (201) 829-4376 Fax: (201) 829-2504 EMail: wel@bellcore.com Philip J. Nesser II Nesser & Nesser Consulting 16015 84th Ave. NE Bothell, WA 98011 Phone: (206) 488-6268 EMail: pjnesser@rocket.comBerkowitz, et al Informational [Page 7]RFC 1916 Enterprise Renumbering Solicitation February 1996Appendix A - Formatting Rules (from RFC 1543) Note: there are a set of NROFF formatting macros for the following format. Please contact pier-solicit@bellcore.com if you would like to get a copy.3a. ASCII Format Rules The character codes are ASCII. Each page must be limited to 58 lines followed by a form feed on a line by itself. Each line must be limited to 72 characters followed by carriage return and line feed. No overstriking (or underlining) is allowed. These "height" and "width" constraints include any headers, footers, page numbers, or left side indenting. Do not fill the text with extra spaces to provide a straight right margin. Do not do hyphenation of words at the right margin. Do not use footnotes. If such notes are necessary, put them at the end of a section, or at the end of the document. Use single spaced text within a paragraph, and one blank line between paragraphs. Note that the number of pages in a document and the page numbers on which various sections fall will likely change with reformatting. Thus cross references in the text by section number usually are easier to keep consistent than cross references by page number.Berkowitz, et al Informational [Page 8]
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -