Re: [Ibnemo] Policies and Intent-Based Networking

"Susan Hares" <shares@ndzh.com> Mon, 05 October 2015 18:53 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: ibnemo@ietfa.amsl.com
Delivered-To: ibnemo@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6A4E11B3360 for <ibnemo@ietfa.amsl.com>; Mon, 5 Oct 2015 11:53:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -98.454
X-Spam-Level:
X-Spam-Status: No, score=-98.454 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, J_CHICKENPOX_82=0.6, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eVBz5VFHJR3o for <ibnemo@ietfa.amsl.com>; Mon, 5 Oct 2015 11:53:08 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4E69F1B3366 for <ibnemo@ietf.org>; Mon, 5 Oct 2015 11:53:08 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=184.157.84.146;
From: Susan Hares <shares@ndzh.com>
To: 'PEDRO ANDRES ARANDA GUTIERREZ' <pedroa.aranda@telefonica.com>, ibnemo@ietf.org
References: <CF22CCE7-5154-4C9F-8E93-9C1A908DAD77@telefonica.com>
In-Reply-To: <CF22CCE7-5154-4C9F-8E93-9C1A908DAD77@telefonica.com>
Date: Mon, 05 Oct 2015 14:53:00 -0400
Message-ID: <005901d0ff9f$0ed24a90$2c76dfb0$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_005A_01D0FF7D.87C53E70"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQHYi6VW8yTYlY6yo4uGSUI9ifSYBJ5OJj5A
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com
Archived-At: <http://mailarchive.ietf.org/arch/msg/ibnemo/qv79R2kq5FXxtHFUpQCFABatoig>
Subject: Re: [Ibnemo] Policies and Intent-Based Networking
X-BeenThere: ibnemo@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion of Nemo, an intent-based North Bound \(NB\) interface consisting of an application protocol running over HTTP \(RESTful interfaces\) to exchange intent-based primitives between applications and meta-controllers controlling virtual network resources \(networks, storage, CPU\)." <ibnemo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ibnemo>, <mailto:ibnemo-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ibnemo/>
List-Help: <mailto:ibnemo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ibnemo>, <mailto:ibnemo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Oct 2015 18:53:11 -0000

Pedro: 

 

I agree that:

 

a)      We can expresse the policy-based routing (l3 forwarding). 

b)      IB-nemo provides a lot of consistency checking for the routes. 

 

Does this make easier for the network administrator to configure the routes?  How can Intent make that work easier? 

 

Sue 

 

From: Ibnemo [mailto:ibnemo-bounces@ietf.org] On Behalf Of PEDRO ANDRES ARANDA GUTIERREZ
Sent: Monday, October 05, 2015 10:49 AM
To: Susan Hares; ibnemo@ietf.org
Subject: Re: [Ibnemo] Policies and Intent-Based Networking

 

Hi Sue,

 

Thanks for clarifying… this is a good food for thought. Answers inline…

 

/PA

 

De: Sue Hares
Fecha: lunes, 5 de octubre de 2015, 14:49
Para: "ibnemo@ietf.org"
CC: 'Zhoutianran', "'Bert Wijnen (IETF)'", paag
Asunto: Policies and Intent-Based Networking 

 

Hi all: 

 

Can all policies be expressed an Intent?

 

OK, then we end up with something we didn’t quite like/agree upon in Prague: there are different players with different interests and background. Therefore, there will be different intents (scoped by the actor’s view of the world) and maybe different ways of expressing intent, depending on the user’s background.

 

I’m trying to determine what policies can or cannot be expressed.  Any example would be helpful.

 

Here’s three policies I’d like to discuss: 

 

1)      Traffic flow policies   

2)      BGP policies for route flow 

3)      Policy filters controlling routes, 

 

I’m working on the I2RS extensions for Filter-Based RIB and BGP (normal and flow filters).    The I2RS Filter-based RIB allow for policies for routing (forwarding a layer 3) to be associated with a set of interfaces.   For example, 

 

Forwarding filter 1:  128.2/16 nexthop 128.2.1.1     

Forwarding filters 2:   128.5.1/24 nexthop 128.2.1.2  

 

And the rest get forwarded to the default RIB which 

                  128/8  nexthop 128.2.1.3 

 

The intent  is that customer 1 has 128.2/16, and customer 2 has 128.5.1/24.   This node links to these VPNs via 128.2.1.1 (customer1), and 128.2.1.2 (customer 3).  All other traffic goes to the Internet.

How do I link this to the normal example of Intent?   Can we render intent down to this level or should I be using a higher level?

 

 

Let me try a hands-on in NEMO ;-) 

 

So we have two LinkModels:

 

LinkModel VPN Property IPPrefix:nextHop, IPPrefix:destinationPrefix;

LinkModel Internet Property IPPrefix:nextHop;

 

And three Links

 

Link VPN1 Type VPN Property nextHop:”128.2.1.1/32”, destinationPrefix:”128.2/16” ;

Link VPN2 Type VPN Property nextHop:”128.2.1.2/32”, destinationPrefix:”128.5.1/24” ;

Link Default Type Internet Property nextHop:”128.2.1.3/32” ;

 

Then we would need 2 NodeModels:

 

NodeModel VPNTermination Property IPPrefix:ID, list(IPPrefix): subnets ;

NodeModel InternetNode Property IPPrefix:ID;

 

And then the nodes:

 

Node VPNTermination1 Type VPNTermination Property ID:”128.2.1.1/32”, subnets:”128.2/16” ;

Node VPNTermination2 Type VPNTermination Property ID:”128.2.1.2/32”, subnets:”128.5.1/24” ;

Node InternetAccess Type InternetNode Property ID:”128.2.1.3/32” ;

 

And finally the connections between the nodes:

 

Link VPN1 Type VPN EndNodes thisNode,VPNTermination1 ;

Link VPN2 Type VPN EndNodes thisNode,VPNTermination2 ;

Link Default Type Internet EndNodes thisNode,InternetAccess ;

 

So 

 

Conclusion no. 1: Yes we can… 

Conclusion no.2: Maybe a bit redundant, right? But this can also be positive, because it would allow for a lot of consistency checking …

 

Dunno what others think…

 

My .02 cents,

 

---

Dr. Pedro A. Aranda Gutiérrez

 

Technology Exploration -

Network Innovation & Virtualisation

email: pedroa d0t aranda At telefonica d0t com

Telefónica, Investigación y Desarrollo

C/ Zurbarán,12

28010 Madrid, Spain

 

Fragen sind nicht da, um beantwortet zu werden.

Fragen sind da, um gestellt zu werden.

Georg Kreisler

 

 

  _____  


Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.

The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.

Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição