Hi Linda, this is an **information model** draft. Note that Figure 1 shows how this draft is used with external models, such as SUPA. Figures 2-6 describe Network Security, while Figures 7 and 8 define the Security Capability and Content Capability models, and FIgure 9 shows an Attack Mitigation Capability model.
Capabilities are registered on the Registration Interface, and negotiated and used on the NSF-facing interface. regards, John On Thu, May 18, 2017 at 12:09 PM, Linda Dunbar <linda.dun...@huawei.com> wrote: > John, Frank, Diego and Aldo, > > > > It seems to me that the draft-xibassnez-i2nsf-capability-01 covers the > I2NSF rule structure. In your view, should the > draft-xibassnez-i2nsf-capability > be characterized as the information model? > > If it is characterized as the information model, are they exchanged over > the NSF facing interface? Or over the registration interface (identified in > the Framework draft)? > > > > Thanks, Linda > > > -- regards, John
_______________________________________________ I2nsf mailing list I2nsf@ietf.org https://www.ietf.org/mailman/listinfo/i2nsf