Hi Linda,

Yes, there're other actions such as traffic-rate, marking, etc besides permit 
or deny. The following is an example.

This draft 
https://tools.ietf.org/html/draft-you-i2nsf-user-group-based-policy-01 focuses 
on the requirements at the service layer. The details will be discussed in our 
capability layer draft.

Thanks,
Jianjie

> -----邮件原件-----
> 发件人: Linda Dunbar
> 发送时间: 2016年6月15日 20:58
> 收件人: Youjianjie; [email protected]
> 主题: RE: User Group based policy
> 
> Jian Jie,
> 
> Besides "permit" or "deny" for the enterprise customers, do you see the
> following actions that might be desired by the Enterprise customers?
> 
> Some nodes of the enterprise network may need to request some traffic to be
> traversing IPsec channel, but the node themselves may not support the IPsec
> feature.  So that  Enterprise controller may inquire if the needed IPsec
> resource are even available from the provider network and then send the
> request (may involve AAA process between controllers of Enterprise and
> Provider domains ).
> 
> Linda
> 
> -----Original Message-----
> From: Youjianjie
> Sent: Monday, June 13, 2016 9:14 PM
> To: Linda Dunbar; [email protected]
> Subject: 答复: User Group based policy
> 
> Hi Linda,
> 
> Thanks for your comments.
> Our "User Group Based Policy" will use the ECA paradigm. Actually we're also
> working on the User Group Based Policy for Capability Layer using the ECA
> paradigm. We're going to submit this draft for the upcoming IETF meeting.
> 
> Here is an example:
> Event: one NSF receives a packet with user-group-ID (e.g. the ingress NSF
> inserts the corresponding user-group ID into the packet.)
> Condition: user-group-ID = **** (e.g. it represents user during office hours)
> Action: Permit (e.g. user accessing R&D resources is allowed)
> 
> Further comments are welcome!
> 
> Thanks,
> Jianjie
> 
> 
> > -----邮件原件-----
> > 发件人: Linda Dunbar
> > 发送时间: 2016年6月14日 5:35
> > 收件人: Youjianjie; [email protected]
> > 主题: RE: User Group based policy
> >
> > Jian Jie,
> >
> > Will your "User Group Based Policy" also use the  "Event - Condition -
> Action"
> > paradigm which I2NSF WG agreed to use from the Buenos Aires meeting?
> >
> > If your answer is "Yes", can you add the Information model for your
> > "User Group Based Policy"?
> >
> > For example,
> > - The information (and data) model for "Event"
> > - The information (and data) model for "Condition"
> > - The information (and data) model for "Action".
> >
> > It would be helpful if you post your detailed description for each
> > category above on the mailing list to get some discussion before
> > asking for WG adoption.
> >
> > Thanks, Linda
> >
> > -----Original Message-----
> > From: I2nsf [mailto:[email protected]] On Behalf Of Youjianjie
> > Sent: Monday, June 13, 2016 3:38 AM
> > To: [email protected]
> > Subject: [I2nsf] User Group based policy
> >
> > Hi,
> >
> > We are working on the User-group Aware Policy Control (UAPC)
> > framework, which facilitates consistent enforcement of security
> > policies based on user group identity.
> > https://tools.ietf.org/html/draft-you-i2nsf-user-group-based-policy-01
> >
> > Use cases for UAPC:
> > With the increased popularity of enterprise wireless networks and
> > remote access technologies such as Virtual Private Networks (VPN),
> > enterprise networks have become borderless, and employees' locations can
> be anywhere.
> > Enabling large-scale employee mobility across many access locations
> > improves enterprise production efficiency but also introduces
> > challenges related to enterprise network management and security. The
> > IP address of the user can change frequently when the user is in
> > motion. Consequently, IP address-based policies (such as forwarding,
> > routing, QoS and security policies) may not be flexible enough to
> accommodate users in motion.
> >
> > User-group ID represents the collective identity of a group of users,
> > and is determined by a set of one or more matching criteria (e.g.,
> > roles, 4-, 5-, and 6-tuples, VLAN ID, etc.) that disambiguates this
> > user-group entity from other entities.
> >
> > The UAPC framework consists of four main components: (1) Policy
> > Server, (2) Authentication Server, (3) Security Controller, (4) Network 
> > Security
> Functions.
> >
> > Within the UAPC framework, inter-group policy enforcement requires two
> > key
> > components: (1) user-group-to-user-group access policies, and (2) sets
> > of NSFs that are managed by sets of policies.
> >
> > Some requirements are proposed in the last section.
> >
> > Any comments or suggestions are welcome.
> >
> > Thanks,
> > Jianjie
> >
> > _______________________________________________
> > I2nsf mailing list
> > [email protected]
> > https://www.ietf.org/mailman/listinfo/i2nsf
_______________________________________________
I2nsf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to