Hi Linda,

this is an **information model** draft. Note that Figure 1 shows how this
draft is used with external models, such as SUPA. Figures 2-6 describe
Network Security, while Figures 7 and 8 define the Security Capability and
Content Capability models, and FIgure 9 shows an Attack Mitigation
Capability model.

Capabilities are registered on the Registration Interface, and negotiated
and used on the NSF-facing interface.

regards,
John



On Thu, May 18, 2017 at 12:09 PM, Linda Dunbar <linda.dun...@huawei.com>
wrote:

> John, Frank, Diego and Aldo,
>
>
>
> It seems to me that the draft-xibassnez-i2nsf-capability-01 covers the
> I2NSF rule structure.  In your view, should the 
> draft-xibassnez-i2nsf-capability
> be characterized as the information model?
>
> If it is characterized as the information model, are they exchanged over
> the NSF facing interface? Or over the registration interface (identified in
> the Framework draft)?
>
>
>
> Thanks, Linda
>
>
>



-- 
regards,
John
_______________________________________________
I2nsf mailing list
I2nsf@ietf.org
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to