Interface to Network Security Functions (I2NSF) Terminolgoy
draft-hares-i2nsf-terminology-01

The information below is for an old version of the document
Document Type Active Internet-Draft (individual)
Last updated 2016-03-21
Replaced by draft-ietf-i2nsf-terminology
Stream (None)
Intended RFC status (None)
Formats pdf htmlized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date
Responsible AD (None)
Send notices to (None)
I2NSF                                                           S. Hares
Internet-Draft                                              J. Strassner
Intended status: Informational                                    Huawei
Expires: September 22, 2016                                     D. Lopez
                                                          Telefonica I+D
                                                                  L. Xia
                                                                  Huawei
                                                          March 21, 2016

      Interface to Network Security Functions (I2NSF) Terminolgoy
                  draft-hares-i2nsf-terminology-01.txt

Abstract

   This document defines a set of terms that are used for the Interface
   to Network Security Functions (I2NSF) effort.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on September 22, 2016.

Copyright Notice

   Copyright (c) 2016 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of

Hares, et al.          Expires September 22, 2016               [Page 1]
Internet-Draft              I2NSF Terminology                 March 2016

   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   3
   3.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   9
   4.  Security Considerations . . . . . . . . . . . . . . . . . . .   9
   5.  Informative References  . . . . . . . . . . . . . . . . . . .   9
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  10

1.  Introduction

   This document defines a set of terms that are used for the Interface
   to Security Functions(I2NSF) effort.  This section provides some
   background on I2NSF, but a detailed problem statement can be found in
   [I-D.ietf-i2nsf-problem-and-use-cases]

   The purposeof the document is to unify the terminology used among all
   the I2NSF documents.

   Enterprises are now considering using network security functions
   (NSFs) hosted by service providers due to the growing challenges and
   complexity in maintaining a secure infrastructure, complying in
   maintaining an up to date secure infrastructure that complies with
   regulatory requirements while controlling costs.  The hosted security
   service is especially attractive to small and medium size enterprises
   who suffer from a lack of security experts to continuously monitor,
   acquire new skills and propose immediate mitigations to ever
   increasing sets of security attacks.  Small and medium-sized
   businesses (SMBs) are increasingly adopting cloud-based security
   services to replace on-premises security tools, while larger
   enterprises are deploying a mix of traditional (hosted) and cloud-
   based security services.

   To meet the demand, more and more service providers are providing
   hosted security solutions to deliver cost-effective managed security
   services to enterprise customers.  The hosted security services are
   primarily targeted at enterprises, but could also be provided to any
   kind of mass-market customers as well.  The Network security
   functions (NSFs) are provided and consumed in increasingly diverse
   environments.  Users of NSFs may consume network security services
   hosted by one or more providers, which may be their own enterprise,
   service providers, or a combination of both.

   It is out of scope of this document to define exhaustive lists of
   terms that are used in the security field in general; the reader is

Hares, et al.          Expires September 22, 2016               [Page 2]
Internet-Draft              I2NSF Terminology                 March 2016

   invited to refer to other documents such as [RFC4949].  [RFC4949]
Show full document text