Hi Diego,
1) Yes, We’ll align our capability layer draft with the one you mentioned. 2) Our plan is to prepare a standalone capability layer draft for user group based policy at this step. But we’ll see if it needs to be merged or not according to the comments from the community in next steps. Thanks, Jianjie 发件人: DIEGO LOPEZ GARCIA [mailto:[email protected]] 发送时间: 2016年6月16日 13:46 收件人: Youjianjie 抄送: Linda Dunbar; [email protected] 主题: Re: [I2nsf] User Group based policy Hi Jianjie, Now that I understand better the idea (and I must say I see a clear value in it) I still have a couple of procedural doubts: 1) Will you align your capability layer draft with the proposal on the capability layer recently made by Sue for a packet filtering system? I’d definitely encourage you to do so 2) This is more for the chairs than for you: What are we going to do as a group with all the potential capability layer extensions that could follow the same path as this proposal? Be goode, On 16 Jun 2016, at 11:11 , Youjianjie <[email protected]<mailto:[email protected]>> wrote: Hi Linda, Yes, there're other actions such as traffic-rate, marking, etc besides permit or deny. The following is an example. This draft https://tools.ietf.org/html/draft-you-i2nsf-user-group-based-policy-01 focuses on the requirements at the service layer. The details will be discussed in our capability layer draft. Thanks, Jianjie -----邮件原件----- 发件人: Linda Dunbar 发送时间: 2016年6月15日 20:58 收件人: Youjianjie; [email protected]<mailto:[email protected]> 主题: RE: User Group based policy Jian Jie, Besides "permit" or "deny" for the enterprise customers, do you see the following actions that might be desired by the Enterprise customers? Some nodes of the enterprise network may need to request some traffic to be traversing IPsec channel, but the node themselves may not support the IPsec feature. So that Enterprise controller may inquire if the needed IPsec resource are even available from the provider network and then send the request (may involve AAA process between controllers of Enterprise and Provider domains ). Linda -----Original Message----- From: Youjianjie Sent: Monday, June 13, 2016 9:14 PM To: Linda Dunbar; [email protected]<mailto:[email protected]> Subject: 答复: User Group based policy Hi Linda, Thanks for your comments. Our "User Group Based Policy" will use the ECA paradigm. Actually we're also working on the User Group Based Policy for Capability Layer using the ECA paradigm. We're going to submit this draft for the upcoming IETF meeting. Here is an example: Event: one NSF receives a packet with user-group-ID (e.g. the ingress NSF inserts the corresponding user-group ID into the packet.) Condition: user-group-ID = **** (e.g. it represents user during office hours) Action: Permit (e.g. user accessing R&D resources is allowed) Further comments are welcome! Thanks, Jianjie -----邮件原件----- 发件人: Linda Dunbar 发送时间: 2016年6月14日 5:35 收件人: Youjianjie; [email protected]<mailto:[email protected]> 主题: RE: User Group based policy Jian Jie, Will your "User Group Based Policy" also use the "Event - Condition - Action" paradigm which I2NSF WG agreed to use from the Buenos Aires meeting? If your answer is "Yes", can you add the Information model for your "User Group Based Policy"? For example, - The information (and data) model for "Event" - The information (and data) model for "Condition" - The information (and data) model for "Action". It would be helpful if you post your detailed description for each category above on the mailing list to get some discussion before asking for WG adoption. Thanks, Linda -----Original Message----- From: I2nsf [mailto:[email protected]] On Behalf Of Youjianjie Sent: Monday, June 13, 2016 3:38 AM To: [email protected]<mailto:[email protected]> Subject: [I2nsf] User Group based policy Hi, We are working on the User-group Aware Policy Control (UAPC) framework, which facilitates consistent enforcement of security policies based on user group identity. https://tools.ietf.org/html/draft-you-i2nsf-user-group-based-policy-01 Use cases for UAPC: With the increased popularity of enterprise wireless networks and remote access technologies such as Virtual Private Networks (VPN), enterprise networks have become borderless, and employees' locations can be anywhere. Enabling large-scale employee mobility across many access locations improves enterprise production efficiency but also introduces challenges related to enterprise network management and security. The IP address of the user can change frequently when the user is in motion. Consequently, IP address-based policies (such as forwarding, routing, QoS and security policies) may not be flexible enough to accommodate users in motion. User-group ID represents the collective identity of a group of users, and is determined by a set of one or more matching criteria (e.g., roles, 4-, 5-, and 6-tuples, VLAN ID, etc.) that disambiguates this user-group entity from other entities. The UAPC framework consists of four main components: (1) Policy Server, (2) Authentication Server, (3) Security Controller, (4) Network Security Functions. Within the UAPC framework, inter-group policy enforcement requires two key components: (1) user-group-to-user-group access policies, and (2) sets of NSFs that are managed by sets of policies. Some requirements are proposed in the last section. Any comments or suggestions are welcome. Thanks, Jianjie _______________________________________________ I2nsf mailing list [email protected]<mailto:[email protected]> https://www.ietf.org/mailman/listinfo/i2nsf _______________________________________________ I2nsf mailing list [email protected]<mailto:[email protected]> https://www.ietf.org/mailman/listinfo/i2nsf -- "Esta vez no fallaremos, Doctor Infierno" Dr Diego R. Lopez Telefonica I+D http://people.tid.es/diego.lopez/ e-mail: [email protected]<mailto:[email protected]> Tel: +34 913 129 041 Mobile: +34 682 051 091 ---------------------------------- ________________________________ Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción. The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it. Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição
_______________________________________________ I2nsf mailing list [email protected] https://www.ietf.org/mailman/listinfo/i2nsf
