Cisco 7921 not updating standard time


The detailed requirements for I2RS protocol security are contained in [I2RS-PROT-SEC], and the detailed security requirements for environment in which the I2RS protocol exists are contained in [I2RS-ENV-SEC].

There are four key drivers that shape the I2RS architecture.

Information Modeling, Device Variation, and Information Relationships ..........................29 6.4.5.1. For example, a typical router maintains a Routing Information Base (RIB) and implements routing protocols such as OSPF, IS-IS, and BGP to exchange reachability information, topology information, protocol state, and other information about the state of the network with other routers.

cisco 7921 not updating standard time-87

Not all documents approved by the IESG are a candidate for any level of Internet Standard; see Section 2 of RFC 7841.

Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at

Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Introduction ....................................................4 1.1. Drivers for the I2RS Architecture ..........................5 1.2.

Architectural Overview .....................................6 2. Terminology ....................................................11 3. Key Architectural Properties ...................................13 3.1. Simplicity ................................................13 3.2. Extensibility .............................................14 3.3. Model-Driven Programmatic Interfaces ......................14 4. Security Considerations ........................................15 4.1. Identity and Authentication ...............................17 4.2. Authorization .............................................18 4.3. Client Redundancy .........................................19 4.4. I2RS in Personal Devices ..................................19 5. Network Applications and I2RS Client ...........................19 5.1.

Managing Variation: Optionality ...........30 6.4.5.3. Managing Variation: Templating ............31 6.4.5.4. Object Relationships ......................31 6.4.5.4.1. The forwarding plane and the specified forwarding entries then contain active state information that describes the expected and observed operational behavior of the router and that is also needed by the network applications.