Hi Paul,

Just to frame today’s discussion, let me remark I find especially interesting 
points (3) and (4), that I believe can only happen within I2NSF. We can connect 
(3) with the ECA discussions happening in OPSAWG and NMRG, and I see (4) as an 
interesting opportunity for consolidating and achieving the full potential of 
the capability model.

Be goode,

--
"Esta vez no fallaremos, Doctor Infierno"

Dr Diego R. Lopez
Telefonica I+D
https://www.linkedin.com/in/dr2lopez/

e-mail: [email protected]<mailto:[email protected]>
Tel:         +34 913 129 041
Mobile:  +34 682 051 091
----------------------------------

On 21/11/2019, 11:02, "I2nsf on behalf of Mr. Jaehoon Paul Jeong" 
<[email protected]<mailto:[email protected]> on behalf of 
[email protected]<mailto:[email protected]>> wrote:

Hi I2NSF WG,
There will be a side meeting for I2NSF WG's next steps from 6PM to 7PM today at 
Bras Basah.
https://datatracker.ietf.org/meeting/106/floor-plan?room=bras-basah#raffles-city-convention-center

* Agenda for I2NSF Side Meeting
- I2NSF Hackathon Project Report (Jaehoon Paul Jeong, 5 min)
- I2NSF Data Model Drafts Update (Jaehoon Paul Jeong, 10 min)
  . I2NSF Capability YANG Data Model
  . I2NSF Consumer-Facing Interface YANG Data Model
  . I2NSF Network Security Function-Facing Interface YANG Data Model
  . I2NSF Registration Interface YANG Data Model
  . I2NSF NSF Monitoring YANG Data Model
- Security Policy Translator Draft Update (Chaehong Chung, 5 min)
- Open Discussion: Possible Work Items for I2NSF Rechartering (30 min)

I will report the progress of data model drafts.
I would like to discuss the rechartering of I2NSF WG with you.

I suggest four work items as the 2nd phase I2NSF.
1. YANG data model of the interface between I2NSF Security Controller and SDN 
Switch Controller
2. YANG data model of the interface between I2NSF Security Controller and SFC 
Classifier
3. Configuration of Advanced Security Functions with I2NSF Security Controller
4.  Policy Object for Interface to Network Security Functions (I2NSF)

Let me explain why each of them is important for I2NSF.

1.  YANG data model of the interface between I2NSF Security Controller and SDN 
Switch Controller
According to the I2NSF Applicability Draft and I2NSF Hackathon Project,
the SDN switches can perform simple packet filtering and the firewall NSF can 
perform complicated packet filtering.
For this two separated packet filtering, the security policy about a traffic 
flow should be delivered to an SDN Switch Controller.
For the delivery of a security policy to the SDN network, the interface between 
the I2NSF Security Controller and
the SDN Switch Controller is needed.

2.  YANG data model of the interface between I2NSF Security Controller and SFC 
Classifier
According to the I2NSF Applicability Draft and I2NSF Hackathon Project,
a security policy (e.g., time-based web filtering) requires a Service Function 
Chaining (SFC) such as
firewall and web filter.
For this SFC path specification of a security policy, a security about a 
traffic flow should be delivered to an SFC Classifier.
For the delivery of a security policy to specify the service function path in 
the SFC Classifier, the interface between
the I2NSF Security Controller and the SFC Classifier is needed.

3. Configuration of Advanced Security Functions with I2NSF Security Controller
    (https://tools.ietf.org/html/draft-dong-i2nsf-asf-config-01)
With the current NSF-Facing Interface, we can configure basic security 
functions, such as firewall, deep packet inspection, and
DDoS attack mitigator. For rich network security functions,  the YANG data 
model of advanced security services needs to be
developed.

4. Policy Object for Interface to Network Security Functions (I2NSF)
    (https://tools.ietf.org/html/draft-xia-i2nsf-security-policy-object-01)
Policy objects for I2NSF security policy rules can provide the I2NSF system 
with reusability for security policy construction
by defining essential attributes for each policy object. This will be useful 
for security policy rule generation in the I2NSF system.

Welcome your feedback.

Thanks.

Best Regards,
Paul


________________________________

Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede 
contener información privilegiada o confidencial y es para uso exclusivo de la 
persona o entidad de destino. Si no es usted. el destinatario indicado, queda 
notificado de que la lectura, utilización, divulgación y/o copia sin 
autorización puede estar prohibida en virtud de la legislación vigente. Si ha 
recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente 
por esta misma vía y proceda a su destrucción.

The information contained in this transmission is privileged and confidential 
information intended only for the use of the individual or entity named above. 
If the reader of this message is not the intended recipient, you are hereby 
notified that any dissemination, distribution or copying of this communication 
is strictly prohibited. If you have received this transmission in error, do not 
read it. Please immediately reply to the sender that you have received this 
communication in error and then delete it.

Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode 
conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa 
ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica 
notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização 
pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem 
por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e 
proceda a sua destruição
_______________________________________________
I2nsf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to