Interface to Network Security Functions (I2NSF) Terminology
draft-ietf-i2nsf-terminology-03
The information below is for an old version of the document |
Document |
Type |
|
Active Internet-Draft (i2nsf WG)
|
|
Last updated |
|
2017-03-07
|
|
Replaces |
|
draft-hares-i2nsf-terminology
|
|
Stream |
|
IETF
|
|
Intended RFC status |
|
(None)
|
|
Formats |
|
plain text
pdf
html
bibtex
|
Stream |
WG state
|
|
WG Document
(wg milestone:
Feb 2016 - Adopt framework as W...
)
|
|
Document shepherd |
|
No shepherd assigned
|
IESG |
IESG state |
|
I-D Exists
|
|
Consensus Boilerplate |
|
Unknown
|
|
Telechat date |
|
|
|
Responsible AD |
|
(None)
|
|
Send notices to |
|
(None)
|
I2NSF S. Hares
Internet-Draft J. Strassner
Intended status: Informational Huawei
Expires: September 07, 2017 D. Lopez
Telefonica I+D
L. Xia
Huawei
H. Birkholz
Fraunhofer SIT
March 07, 2017
Interface to Network Security Functions (I2NSF) Terminology
draft-ietf-i2nsf-terminology-03.txt
Abstract
This document defines a set of terms that are used for the Interface
to Network Security Functions (I2NSF) effort.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current
Internet-Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other
documents at any time. It is inappropriate to use Internet-Drafts
as reference material or to cite them other than as "work in
progress."
This Internet-Draft will expire on September 07, 2017.
Copyright Notice
Copyright (c) 2017 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with
respect to this document. Code Components extracted from this
document must include Simplified BSD License text as described in
Section 4.e of the Trust Legal Provisions and are provided
without warranty as described in the Simplified BSD License.
Hares, et al. Expires September 07,2017 [Page 1]
Internet-Draft I2NSF Terminology February 2017
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10
4. Security Considerations . . . . . . . . . . . . . . . . . . . 10
5. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 11
6. References . . . . . . . . . . . . . . . . . . . . . . . . . 11
6.1. Informative References . . . . . . . . . . . . . . . . . 11
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 12
1. Introduction
This document defines the terminology for the Interface to Network
Security Functions (I2NSF) effort. This section provides some
background on I2NSF; a detailed problem statement can be found in
[I-D.ietf-i2nsf-problem-and-use-cases]. Motivation and comparison to
previous work can be found in [I-D.ietf-i2nsf-gap-analysis].
Enterprises are now considering using network security functions
(NSFs) hosted by service providers due to the growing challenges and
complexity in maintaining an up-to-date secure infrastructure that
complies with regulatory requirements, while controlling costs. The
hosted security service is especially attractive to small- and
medium-size enterprises who suffer from a lack of security experts
to continuously monitor, acquire new skills and propose immediate
mitigations to ever increasing sets of security attacks. Small- and
medium-sized businesses (SMBs) are increasingly adopting cloud-based
security services to replace on-premises security tools, while larger
enterprises are deploying a mix of traditional (hosted) and cloud-
based security services.
To meet the demand, more and more service providers are providing
hosted security solutions to deliver cost-effective managed security
services to enterprise customers. The hosted security services are
primarily targeted at enterprises, but could also be provided to
mass-market customers as well. NSFs are provided and consumed in
increasingly diverse environments. Users of NSFs may consume
network security services hosted by one or more providers, which
may be their own enterprise, service providers, or a combination
of both.
It is out of scope in this document to define an exhaustive list of
terms that are used in the security field; the reader is referred to
Show full document text