I2NSF Capability Yang Model
draft-hares-i2nsf-capability-yang-01

Document Type Active Internet-Draft (individual)
Last updated 2016-10-05
Stream (None)
Intended RFC status (None)
Formats plain text pdf xml html bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date
Responsible AD (None)
Send notices to (None)
I2NSF                                                           S. Hares
Internet-Draft                                                    Huawei
Intended status: Standards Track                            R. Moskowitz
Expires: April 8, 2017                                    HTT Consulting
                                                                     Xia
                                                                  Huawei
                                                         October 5, 2016

                      I2NSF Capability Yang Model
                draft-hares-i2nsf-capability-yang-01.txt

Abstract

   This document defines a yang model that enables a I2NSF controller to
   control various network security functions in Network security
   devices.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on April 8, 2017.

Copyright Notice

   Copyright (c) 2016 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of

Hares, et al.             Expires April 8, 2017                 [Page 1]
Internet-Draft              I2NSF Terminology               October 2016

   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  High-level Yang . . . . . . . . . . . . . . . . . . . . . . .   3
     2.1.  capability per NSF  . . . . . . . . . . . . . . . . . . .   3
     2.2.  Network Security Control  . . . . . . . . . . . . . . . .   4
     2.3.  Security Content Capabilities . . . . . . . . . . . . . .   6
     2.4.  Attack Mitigation Capabilities  . . . . . . . . . . . . .   8
     2.5.  IT Resources linked to Capabilities . . . . . . . . . . .  10
     2.6.  actions . . . . . . . . . . . . . . . . . . . . . . . . .  10
   3.  Use of filter-based RIBS  . . . . . . . . . . . . . . . . . .  10
   4.  YANG Modules  . . . . . . . . . . . . . . . . . . . . . . . .  11
   5.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  23
   6.  Security Considerations . . . . . . . . . . . . . . . . . . .  23
   7.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  23
     7.1.  Normative References  . . . . . . . . . . . . . . . . . .  23
     7.2.  Informative References  . . . . . . . . . . . . . . . . .  23
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  25

1.  Introduction

   [I-D.ietf-i2nsf-problem-and-use-cases] proposes two different types
   of interfaces:

   o  North-bound interface (NBI) provided by the network security
      functions (NSFs)

   o  Interface between I2NSF user/client with network controller:

   This document provides a yang models that define the capabilities for
   security devices that can be utilized by I2NSF NBI between the I2RS
   network controller and the NSF devices to express the NSF devices
   capabilities.  It can also be used by the IN2SF user application (or
   I2NSF client) to network controller to provide a complete list of the
   I2NSF capabilities the Network controller can control.

   This document defines a yang data models based on the
   [I-D.xia-i2nsf-capability-interface-im], and initial work done in
   [I-D.xia-i2nsf-service-interface-dm].  Terms used in document are
   defined in [I-D.ietf-i2nsf-terminology].

   This model is an attempt to merge draft-jeong-i2nsf-capability-
   interface-yang-02.txt, but it has not bene reviewed by this draft's
   authors.  Hopefully, this is a good start for a merge.  The Yang

Hares, et al.             Expires April 8, 2017                 [Page 2]
Internet-Draft              I2NSF Terminology               October 2016
Show full document text