Hi Rakesh,

I saw the draft also mentions user group and related policies. We already 
defined them in : 
https://tools.ietf.org/html/draft-you-i2nsf-user-group-based-policy-02 
Maybe it’s better to keep them aligned. 

Thanks,
Jianjie

> -----邮件原件-----
> 发件人: I2nsf [mailto:i2nsf-boun...@ietf.org] 代表 Rakesh Kumar
> 发送时间: 2016年10月10日 11:37
> 收件人: internet-dra...@ietf.org; Anil Lohiya; Xialiang (Frank); Nabil Bitar;
> i2nsf-cha...@ietf.org; Dave Qi; Senad Palislamovic
> 抄送: i2nsf@ietf.org
> 主题: Re: [I2nsf] New Version Notification for
> draft-kumar-i2nsf-client-facing-interface-req-01.txt
> 
> Hi all,
> 
> The authors updated the draft with -01 revision that includes changes made as
> per comments from the I2NSF working group members.
> 
> Regards,
> Rakesh
> 
> On 10/9/16, 8:32 PM, "internet-dra...@ietf.org" <internet-dra...@ietf.org>
> wrote:
> 
> 
>     A new version of I-D, draft-kumar-i2nsf-client-facing-interface-req-01.txt
>     has been successfully submitted by Rakesh Kumar and posted to the
>     IETF repository.
> 
>     Name:             draft-kumar-i2nsf-client-facing-interface-req
>     Revision: 01
>     Title:            Requirements for Client-Facing Interface to Security
> Controller
>     Document date:    2016-10-09
>     Group:            i2nsf
>     Pages:            22
>     URL:
> https://www.ietf.org/internet-drafts/draft-kumar-i2nsf-client-facing-interface-r
> eq-01.txt
>     Status:
> https://datatracker.ietf.org/doc/draft-kumar-i2nsf-client-facing-interface-req/
>     Htmlized:
> https://tools.ietf.org/html/draft-kumar-i2nsf-client-facing-interface-req-01
>     Diff:
> https://www.ietf.org/rfcdiff?url2=draft-kumar-i2nsf-client-facing-interface-req-
> 01
> 
>     Abstract:
>        This document captures the requirements for the client-facing
>        interface to security controller.  The interfaces are based on user-
>        intent instead of developer-specific or device-centric approaches
>        that would require deep knowledge of specific products and their
>        security features.  The document identifies the requirements needed
>        to enforce the user-intent based policies onto network security
>        functions (NSFs) irrespective of how those functions are realized.
>        The function may be physical or virtual in nature and may be
>        implemented in networking or dedicated appliances.
> 
> 
> 
> 
>     Please note that it may take a couple of minutes from the time of
> submission
>     until the htmlized version and diff are available at tools.ietf.org.
> 
>     The IETF Secretariat
> 
> 
> 
> _______________________________________________
> I2nsf mailing list
> I2nsf@ietf.org
> https://www.ietf.org/mailman/listinfo/i2nsf
_______________________________________________
I2nsf mailing list
I2nsf@ietf.org
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to