Packet-Based Paradigm For Interfaces To NSFs
draft-lopez-i2nsf-packet-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Author | Edward Lopez | ||
Last updated | 2015-09-26 (Latest revision 2015-03-25) | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
In the design of interfaces to allow for the provisioning of network- based security functions (NSFs), a critical consideration is to prevent the creation of implied constraints. This draft makes the recommendation that such interfaces be designed from the paradigm of processing packets on the network. NSFs ultimately are packet-processing engines that inspect packets traversing networks, either directly or in context to sessions to which the packet is associated.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)