References from draft-hares-i2nsf-capability-yang
These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.
| Document | Title | Status | Type | Downref |
|---|---|---|---|---|
| BCP 14 |
Key words for use in RFCs to Indicate Requirement Levels
References Referenced by |
Best Current Practice | normatively references | |
| draft-ietf-i2nsf-gap-analysis |
Analysis of Existing work for I2NSF
References Referenced by |
informatively references | ||
| draft-ietf-i2nsf-problem-and-use-cases |
Interface to Network Security Functions (I2NSF): Problem Statement and Use Cases
References Referenced by |
Informational | informatively references | |
| draft-ietf-i2nsf-terminology |
Interface to Network Security Functions (I2NSF) Terminology
References Referenced by |
informatively references | ||
| draft-ietf-i2rs-fb-rib-data-model |
Filter-Based RIB Data Model
References Referenced by |
informatively references | ||
| draft-ietf-i2rs-pkt-eca-data-model |
Filter-Based Packet Forwarding ECA Policy
References Referenced by |
informatively references | ||
| draft-ietf-netmod-acl-model |
YANG Data Model for Network Access Control Lists (ACLs)
References Referenced by |
Proposed Standard | informatively references | |
| draft-ietf-opsawg-firewalls |
On Firewalls in Internet Security
References Referenced by |
informatively references | ||
| draft-jeong-i2nsf-capability-interface-yang |
YANG Data Model of Interface to Network Security Functions Capability Interface
References Referenced by |
Possible Reference | ||
| draft-xia-i2nsf-capability-interface-im |
Information Model of Interface to Network Security Functions Capability Interface
References Referenced by |
informatively references | ||
| draft-xia-i2nsf-service-interface-dm |
Data Model of Interface to Network Security Functions Service Interface
References Referenced by |
informatively references | ||
| FYI 36 |
Internet Security Glossary, Version 2
References Referenced by |
Informational | informatively references | |
| RFC 2119 |
Key words for use in RFCs to Indicate Requirement Levels
References Referenced by |
Best Current Practice | normatively references | |
| RFC 2975 |
Introduction to Accounting Management
References Referenced by |
Informational | informatively references | |
| RFC 3198 |
Terminology for Policy-Based Management
References Referenced by |
Informational | informatively references | |
| RFC 3234 |
Middleboxes: Taxonomy and Issues
References Referenced by |
Informational | informatively references | |
| RFC 3539 |
Authentication, Authorization and Accounting (AAA) Transport Profile
References Referenced by |
Proposed Standard | informatively references | |
| RFC 4949 |
Internet Security Glossary, Version 2
References Referenced by |
Informational | informatively references | |
| RFC 7277 |
A YANG Data Model for IP Management
References Referenced by |
Proposed Standard | informatively references |