draft-ietf-i2nsf-client-facing-interface-req-03.txt | draft-ietf-i2nsf-client-facing-interface-req-04.txt | |||
---|---|---|---|---|
I2NSF Working Group R. Kumar | I2NSF Working Group R. Kumar | |||
Internet-Draft A. Lohiya | Internet-Draft Lilac Cloud | |||
Intended status: Informational Juniper Networks | Intended status: Informational A. Lohiya | |||
Expires: January 17, 2018 D. Qi | Expires: July 20, 2018 Juniper Networks | |||
D. Qi | ||||
Bloomberg | Bloomberg | |||
N. Bitar | N. Bitar | |||
S. Palislamovic | S. Palislamovic | |||
Nokia | Nokia | |||
L. Xia | L. Xia | |||
Huawei | Huawei | |||
July 16, 2017 | January 16, 2018 | |||
Requirements for Client-Facing Interface to Security Controller | Requirements for Client-Facing Interface to Security Controller | |||
draft-ietf-i2nsf-client-facing-interface-req-03 | draft-ietf-i2nsf-client-facing-interface-req-04 | |||
Abstract | Abstract | |||
This document captures requirements for Client-Facing interface to | This document captures requirements for Client-Facing interface to | |||
the Security Controller as defined by [I-D.ietf-i2nsf-framework]. | the Security Controller as defined by [I-D.ietf-i2nsf-framework]. | |||
The interface is expressed using objects and constructs understood by | The interface is expressed using objects and constructs understood by | |||
Security Admin as opposed to vendor or device specific expressions | Security Admin as opposed to vendor or device specific expressions | |||
associated with individual product and feature. This document | associated with individual product and feature. This document | |||
identifies a broad set of requirements needed to express Security | identifies a broad set of requirements needed to express Security | |||
Policies based on User-constructs which are well understood by the | Policies based on User-constructs which are well understood by the | |||
skipping to change at page 1, line 39 ¶ | skipping to change at page 1, line 40 ¶ | |||
it a physical or virtual. | it a physical or virtual. | |||
Status of This Memo | Status of This Memo | |||
This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
This Internet-Draft will expire on January 17, 2018. | This Internet-Draft will expire on July 20, 2018. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2017 IETF Trust and the persons identified as the | Copyright (c) 2018 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(http://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
described in the Simplified BSD License. | described in the Simplified BSD License. | |||
Table of Contents | Table of Contents | |||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
skipping to change at page 23, line 8 ¶ | skipping to change at page 23, line 8 ¶ | |||
The authors would also like to thank Kunal Modasiya, Prakash T. | The authors would also like to thank Kunal Modasiya, Prakash T. | |||
Sehsadri and Srinivas Nimmagadda from Juniper networks for helpful | Sehsadri and Srinivas Nimmagadda from Juniper networks for helpful | |||
discussions. | discussions. | |||
9. Normative References | 9. Normative References | |||
[I-D.ietf-i2nsf-framework] | [I-D.ietf-i2nsf-framework] | |||
Lopez, D., Lopez, E., Dunbar, L., Strassner, J., and R. | Lopez, D., Lopez, E., Dunbar, L., Strassner, J., and R. | |||
Kumar, "Framework for Interface to Network Security | Kumar, "Framework for Interface to Network Security | |||
Functions", draft-ietf-i2nsf-framework-06 (work in | Functions", draft-ietf-i2nsf-framework-10 (work in | |||
progress), July 2017. | progress), November 2017. | |||
[I-D.ietf-i2nsf-problem-and-use-cases] | [I-D.ietf-i2nsf-problem-and-use-cases] | |||
Hares, S., Lopez, D., Zarny, M., Jacquenet, C., Kumar, R., | Hares, S., Lopez, D., Zarny, M., Jacquenet, C., Kumar, R., | |||
and J. Jeong, "I2NSF Problem Statement and Use cases", | and J. Jeong, "I2NSF Problem Statement and Use cases", | |||
draft-ietf-i2nsf-problem-and-use-cases-16 (work in | draft-ietf-i2nsf-problem-and-use-cases-16 (work in | |||
progress), May 2017. | progress), May 2017. | |||
Authors' Addresses | Authors' Addresses | |||
Rakesh Kumar | Rakesh Kumar | |||
Juniper Networks | Lilac Cloud | |||
1133 Innovation Way | 14435 C Big Basin Way #104 | |||
Sunnyvale, CA 94089 | Saratoga, CA 95070 | |||
US | US | |||
Email: rakeshkumarcloud@gmail.com | Email: rakeshkumarcloud@gmail.com | |||
Anil Lohiya | Anil Lohiya | |||
Juniper Networks | Juniper Networks | |||
1133 Innovation Way | 1133 Innovation Way | |||
Sunnyvale, CA 94089 | Sunnyvale, CA 94089 | |||
US | US | |||
End of changes. 9 change blocks. | ||||
14 lines changed or deleted | 15 lines changed or added | |||
This html diff was produced by rfcdiff 1.46. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |