Solved

RFC Compliance Checklist

Posted on 2002-03-05
3
1,193 Views
Last Modified: 2007-02-13
Hi All,
I'm trying to test a device and ensure that it's Compliant to RFC 2878 (BCP).
At the minute all I have is the RFC which is proving difficult to actually try and extract requirements which will ensure compliance, or not as the case may be.  Does anyone know if a checklist that is available for the RFC, or some general variation of a PICS Proforma for the RFC's?

All info greatly appreciated.
Thanks
Scott
0
Comment
Question by:scott01
3 Comments
 
LVL 16

Accepted Solution

by:
SteveJ earned 200 total points
ID: 6842059
I've done some compliance testing on ATM switches (UNI 3.1) and we had to write our own test cases and there's no way I'd publish them without some sort of royalty. But I could be wrong. Call Cisco, ask them.

I looked at the RFC briefly and found a couple of things like . . . Separation of Spanning Tree Domains - If a switch A isn't configure to support Spanning Tree but switch B sends it a config packet, a compliant switch, in this case switch A, needs to respond, not just ignore the config packet. So you write a test cast to trace this condition between two switches and if your device responds to a config packet then it's compliant with respect to section 4.1.4 of RFC 2878.

Section 4.1 said that before bridged LAN Traffic or BPDUs may be communicated, PPP MUST reach the Network-Layer protocol phase, and the Bridging Control Protocol MUST reach the Opened state. You should be able to put your device into debug mode when it's negotiating a PPP link to verify that this happens.

You might start by searching for the word "MUST" in the body of the RFC and writing test cases to prove all "MUST" conditions. That's essentially a compliance test. Anyway, good luck.

Steve
0
 

Author Comment

by:scott01
ID: 6844162
Cheers Steve,
That's pretty much what I'm doing, just thought that there might have been a quicker simpler way, ie the list of questions with Yes/No answers.
Thanks for commenting.
Scott
0
 

Expert Comment

by:CleanupPing
ID: 9155824
scott01:
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1 
EXPERTS:
Post your closing recommendations!  No comment means you don't care.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, I am going to show you how to simulate a multi-site Lab environment on a single Hyper-V host. I use this method successfully in my own lab to simulate three fully routed global AD Sites on a Windows 10 Hyper-V host.
Phishing attempts can come in all forms, shapes and sizes. No matter how familiar you think you are with them, always remember to take extra precaution when opening an email with attachments or links.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question