Interface to Network Security Functions (I2NSF) Terminology
draft-ietf-i2nsf-terminology-04

Document Type Active Internet-Draft (i2nsf WG)
Last updated 2017-07-03
Replaces draft-hares-i2nsf-terminology
Stream IETF
Intended RFC status (None)
Formats plain text pdf html bibtex
Stream WG state WG Document (wg milestone: Feb 2016 - Adopt framework as W... )
Document shepherd No shepherd assigned
IESG IESG state I-D Exists
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)
I2NSF                                                           S. Hares
Internet-Draft                                              J. Strassner
Intended status: Informational                                    Huawei
Expires: January 07, 2018                                       D. Lopez
                                                          Telefonica I+D
                                                                  L. Xia
                                                                  Huawei
                                                             H. Birkholz
                                                          Fraunhofer SIT
                                                           July 03, 2017

      Interface to Network Security Functions (I2NSF) Terminology
                  draft-ietf-i2nsf-terminology-04.txt

Abstract

   This document defines a set of terms that are used for the Interface
   to Network Security Functions (I2NSF) effort.

Status of this Memo 

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current
   Internet-Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six
   months and may be updated, replaced, or obsoleted by other
   documents at any time.  It is inappropriate to use Internet-Drafts
   as reference material or to cite them other than as "work in
   progress."

   This Internet-Draft will expire on January 07, 2018.

Copyright Notice

   Copyright (c) 2017 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with
   respect to this document. Code Components extracted from this
   document must include Simplified BSD License text as described in
   Section 4.e of the Trust Legal Provisions and are provided
   without warranty as described in the Simplified BSD License.

Hares, et al.          Expires January 07,2017                  [Page 1]
Internet-Draft              I2NSF Terminology                  July 2017

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   3
   3.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  11
   4.  Security Considerations . . . . . . . . . . . . . . . . . . .  11
   5.  Contributors  . . . . . . . . . . . . . . . . . . . . . . . .  11
   6.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  11
     6.1.  Informative References  . . . . . . . . . . . . . . . . .  12
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  13

1.  Introduction

   This document defines the terminology for the Interface to Network
   Security Functions (I2NSF) effort.  This section provides some
   background on I2NSF; a detailed problem statement can be found in
   [I-D.ietf-i2nsf-problem-and-use-cases]. Motivation and comparison to
   previous work can be found in [I-D.ietf-i2nsf-gap-analysis].

   Enterprises are now considering using network security functions
   (NSFs) hosted by service providers due to the growing challenges and
   complexity in maintaining an up-to-date secure infrastructure that
   complies with regulatory requirements, while controlling costs.  The
   hosted security service is especially attractive to small- and
   medium-size enterprises who suffer from a lack of security experts
   to continuously monitor, acquire new skills and propose immediate
   mitigations to ever increasing sets of security attacks.  Small- and
   medium-sized businesses (SMBs) are increasingly adopting cloud-based
   security services to replace on-premises security tools, while larger
   enterprises are deploying a mix of traditional (hosted) and cloud-
   based security services.

   To meet the demand, more and more service providers are providing
   hosted security solutions to deliver cost-effective managed security
   services to enterprise customers.  The hosted security services are
   primarily targeted at enterprises, but could also be provided to
   mass-market customers as well.  NSFs are provided and consumed in
   increasingly diverse environments.  Users of NSFs may consume
   network security services hosted by one or more providers, which
   may be their own enterprise, service providers, or a combination
Show full document text