Re: [I2nsf] draft-ietf-i2nsf-problem-and-use-cases-00.txt

"Susan Hares" <shares@ndzh.com> Thu, 07 July 2016 22:56 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: i2nsf@ietfa.amsl.com
Delivered-To: i2nsf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E15FD12D0AE for <i2nsf@ietfa.amsl.com>; Thu, 7 Jul 2016 15:56:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.739
X-Spam-Level: *
X-Spam-Status: No, score=1.739 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, RDNS_NONE=0.793] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QvchLgPhYb-2 for <i2nsf@ietfa.amsl.com>; Thu, 7 Jul 2016 15:56:48 -0700 (PDT)
Received: from hickoryhill-consulting.com (unknown [50.245.122.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B98D4127071 for <i2nsf@ietf.org>; Thu, 7 Jul 2016 15:56:47 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=74.43.47.72;
From: Susan Hares <shares@ndzh.com>
To: 'Rakesh Kumar' <rkkumar@juniper.net>, 'Linda Dunbar' <linda.dunbar@huawei.com>, diego.r.lopez@telefonica.com, Christian.jacquenet@orange.com
References: <0D62044A-98DD-446F-BC22-EE8530D574CE@juniper.net> <01c401d1d89e$7104fe00$530efa00$@ndzh.com> <9E973283-DA9C-4CB1-A354-64BC6A14902C@juniper.net>
In-Reply-To: <9E973283-DA9C-4CB1-A354-64BC6A14902C@juniper.net>
Date: Thu, 07 Jul 2016 18:56:10 -0400
Message-ID: <01e601d1d8a2$c1bee5f0$453cb1d0$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_01E7_01D1D881.3AB13D90"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQHmM06voMb+y4Xnoo6ChXxhe0RhQQF+Mv0eAohysPqfxKmCUA==
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/i2nsf/wFuqmFtXVsMMKyEsJjHBnOhtBuM>
Cc: i2nsf@ietf.org
Subject: Re: [I2nsf] draft-ietf-i2nsf-problem-and-use-cases-00.txt
X-BeenThere: i2nsf@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "*I2NSF: Interface to Network Security Functions mailing list*" <i2nsf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2nsf/>
List-Post: <mailto:i2nsf@ietf.org>
List-Help: <mailto:i2nsf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Jul 2016 22:56:50 -0000

Rakesh: 

 

I’d love to chat in Berlin about a way to do this.   Please let me know what times you are available M-W.  I’d like to have the discussion before the I2NSF meeting. 

 

Sue 

 

From: Rakesh Kumar [mailto:rkkumar@juniper.net] 
Sent: Thursday, July 7, 2016 6:46 PM
To: Susan Hares; 'Linda Dunbar'; diego.r.lopez@telefonica.com; Christian.jacquenet@orange.com
Cc: i2nsf@ietf.org; Rakesh Kumar
Subject: Re: draft-ietf-i2nsf-problem-and-use-cases-00.txt

 

Hi Sue,

 

I appreciate your response. Yes my comments are technical in nature.

I would definitely look at the other drafts you mentioned in this thread. I will let you know based on my finding about the missing use-cases.

 

IMHO, it would be great to structure section 4 (use-cases)  in this draft into some broad categories either based on end-customer (like I did) or some other way and explain the use-cases in some detail. We can talk more in Berlin to see how to do this if you are ok.

 

Thanks & Regards,

Rakesh

 

 

From: Susan Hares <shares@ndzh.com>
Date: Thursday, July 7, 2016 at 3:25 PM
To: Rakesh Kumar <rkkumar@juniper.net>, 'Linda Dunbar' <linda.dunbar@huawei.com>, "diego.r.lopez@telefonica.com" <diego.r.lopez@telefonica.com>, "Christian.jacquenet@orange.com" <Christian.jacquenet@orange.com>
Cc: "i2nsf@ietf.org" <i2nsf@ietf.org>
Subject: RE: draft-ietf-i2nsf-problem-and-use-cases-00.txt

 

Rakesh: 

 

Thank you for the comments on the draft.    I believe your comments to be technical in nature. If I am mistaken, please let me know. 

 

The original drafts for the use cases were: 

 

https://tools.ietf.org/html/draft-pastor-i2nsf-access-usecases-00

 

https://datatracker.ietf.org/doc/draft-zarny-i2nsf-data-center-use-cases/

 

https://tools.ietf.org/html/draft-qi-i2nsf-access-network-usecase-02

 

We compiled this to provide a summarization of these cases.    

 

The first thing to check is whether your ideas were in these original drafts.  If they are, and you think it should be emphasized in the summary – please indicate the text you think should be included in the summary and why.  This feedback is really useful as due to my struggles with security area reviews – this document did not enter WG LC as requested.  Here’s my understanding of your work. 

 

On Service provider: 

Ke Wang, Xiaojun, and Minpeng Q China Mobile)i in draft-qi-i2nsf-access-network-usecase-02 suggested the provider based:  residential  use and enterprise use.  China Mobile suggested the mobile use case in their original discussions.   Myo Zarny (Goldman Sachs), S. Magee (F5), Nicholas Leymann (DT) , and   suggested the data center use cases for data centers. 

 

On Enterprise, for branch and Campus we should get more detail on the threat management policies.  Please check draft-pastor-i2nsf-access-usecases-00, but I am not sure there is a match.  I think the zarny draft covered most of the issues listed, but you should look at this as well. 

 

If you think your text is not in these document, but you’d like to create it.  Please write-up the text and send it to list or put it in a draft.   If you just send it to the list, I’ll include your comments in my slides at IETF-95. 

 

Thanks for reviewing the document, 

Sue Hares

 

 

 

From: Rakesh Kumar [mailto:rkkumar@juniper.net] 
Sent: Thursday, July 7, 2016 1:38 PM
To: Linda Dunbar; shares@ndzh.com; diego.r.lopez@telefonica.com; Christian.jacquenet@orange.com
Cc: Rakesh Kumar; i2nsf@ietf.org
Subject: draft-ietf-i2nsf-problem-and-use-cases-00.txt

 

Dear authors,

 

I have read the draft "draft-ietf-i2nsf-problem-and-use-cases-00.txt”. It is very well written and identifies the most common problems due to lack of standard interfaces. It also list “Access Networks” (Residential/Cloud/Mobile) and “Cloud Data centers” as the use-cases. This is good start but I think it would be nice to list other major drivers as well since use-cases would tell us whether interfaces we develop in here are widely applicable.

 

Can we do something like this for use-cases (section 4)? These are just ideas to start a discussion. 

1.	Service provider use-cases 

*	Access use-cases 

*	Residential 

*	Interface for parental control
*	Interface for threat management 

*	Mobile  

*	User experience
*	Content and access management
*	Threat management for infrastructure 

*	Botnet, DDoS, Malware etc.

*	Enterprise  

*	Managed security services (Threat management)

*	Data center (legacy/public-cloud) use-cases 

*	Managed security services
*	GiLAN firewall
*	Threat management for infrastructure

2.	Enterprise use-cases 

*	Branch & Campus 

*	Threat management policies

*	Data center (legacy/private-cloud/public-cloud) use-cases 

*	Threat management for infrastructure
*	Regulatory and compliance policies
*	Access policies 

*	Application, Users, Data access management
*	Htybrid-cloud access management

*	Application policies 

*	East-to-west policies

I can write a small paragraph for all these use-cases if we want to go deeper for the draft.

 

 

Thanks & Regards,

Rakesh