Re: [OPSAWG] Review of draft-ma-opsawg-ucl-acl

"Joe Clarke (jclarke)" <jclarke@cisco.com> Thu, 01 December 2022 17:26 UTC

Return-Path: <jclarke@cisco.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0D0B2C14CF05; Thu, 1 Dec 2022 09:26:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.593
X-Spam-Level:
X-Spam-Status: No, score=-9.593 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Hc4oPczK; dkim=pass (1024-bit key) header.d=cisco.com header.b=IyEePKcX
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9mmnMKJe96xm; Thu, 1 Dec 2022 09:26:20 -0800 (PST)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E4294C14F73D; Thu, 1 Dec 2022 09:26:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=13139; q=dns/txt; s=iport; t=1669915580; x=1671125180; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=cTceumDw/NgsZesdgK2Gh5dVPB6ygp5acX1dkPfJb6c=; b=Hc4oPczKIJFdY/UdgUvW6d1e8nhBzjNNdvxGznHXLf9qhDJLFIVyLqWl VDo95oM/qhggIrmrBWdgumUbM16LgqB5cYXISz7XCJmT6COWg/U6wEH6K nZU9hkv4rT/SjsZeIk9UGJLXkArNAzMjmyqw8PiRcmPhnCpEhUPmabhYF I=;
X-IPAS-Result: A0AdAgDa4ohjmJldJa1aHgEBCxIMQIFEC4EqMVKBAgJZOkWIGgOFL4gdlm2FHoEsgSUDVg8BAQENAQFEBAEBhQUChQwCJTQJDgECBAEBAQEDAgMBAQEBAQEDAQEFAQEBAgEHBBQBAQEBAQEBAR4ZBQ4QJ4VoDYZUAgEDEi4BATcBDwIBCC4BFzIlAgQBDQ0aglsBghaBDAMBo0QBgT8Cih94gTSBAYIIAQEGBASfHQmBQIkFiBInHIFJRIFYgmc+gmICgUgaRgKDRoIujyeHKDkHNgNEHUADCzsyCkMUIQYFEUwrHBsHgQwqCR8VAwQEAwIGEwMiAg0oMRQEKRMNKydvCQIDImEFAwMEKCwDCSAEHAcVESQ8B1YSJgQDAg8gOAYDCQMCIlN8JSYFAwsVJQgFSQQIOQUGUxICChEDEg8GJkUOSD45FgYnQgEwDg4TA12BaQQzSIEpCgItLplkAw1bRCoNgSMeCn8BAwsZDg6SSY4coFuBNgqDaZksh0oWqDxelzwgoW8ChT4CBAIEBQIOAQEGgWI6gVtwFTuCZ1IZD4EbjQUHEoNZil51OwIHCwEBAwmHSA8XgjEBAQ
IronPort-PHdr: A9a23:xsFX+BEWdJpDJMoQSuG+XJ1GfiYY04WdBeZdwpYkircbdKOl8tyiO UHE/vxigRfPWpmT8PNLjefa8sWCEWwN6JqMqjYOJZpLURJWhcAfhQd1BsmDBAXyJ+LraCpvG sNEWRdl8ni3PFITFtz5YgjZo2a56ngZHRCsXTc=
IronPort-Data: A9a23:r4hpA6o5ZpZnvGjMC0rVMcRuq45eBmI+ZRIvgKrLsJaIsI4StFCzt garIBmPafaNZWDyeI0gboXl9EpUucLcyNc3TgM5qihnEH8QouPIVI+TRqvS04x+DSFioGZPt Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILas1htZGEk1Fk/NtTo5w7Rj29Qw2IDja++wk YqaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDf3Zw0/Df2VhNrXSq 9AvY12O1jixEx8FUrtJm1tgG6EAaua60QOm0hK6V0U+6/RPjnRa70o1CBYTQRZXsG6sxdZL9 P9iqsaNaSE7Fa2Wo/tIBnG0EwkmVUFH0KXMLX76usuJwgicNXDt2P5pSkoxOOX0+M4uXjoIr qNeeWtLN03Y7w616OrTpu1EhM8nJdPoMasUu2prynfSCvNOrZXrEv+RvoUDjV/cgOgTBv3eP NFAZQFBU0rqfSJpImcVDqIXybLAan7XKm0E9w39SbAMy2TJxQJtlb3kdd3NYdWVSoBIlULdr 2nC12X0Hh9cM8aQoRKC6mmlmeDnnC7nVsQVDrLQ3vtjmVyOyGUVB0Q+VUayvvS4zEW5Xrpix 1c84CEiq+0581amC4O7VByjq3nCtRkZMzZNLwEkwFCN8fHxuQCjOkIrUWR8SPo0n89sfiN/g zdlgOjVLTBotbSUT1eU+bGVsS6+NEApEIMSWcMXZVBfsoW8+unfmjqKH4g8SPTq5jHgMWuoq w1muhTSkFn6YSQj7aSw/VndjymroPAlpSZqu12HBwpJAu6FDbNJiqSy4lTdqP1HNovcFB+Kv WMPnI6V6+Vm4XCxeM6lHLtl8FKBvqbt3NjgbbhHRMdJG9OFoCTLQGyoyGsiTHqFy+5dEdMTX GfduBlK+LhYN2awYKl8buqZUpp0nPi7Toy/B6+MP7Kih6SdkifarEmCgmbNjwjQfLQEysnTx L/CK5/3VCZGYUiZ5GPuF711PUAXKtAWnDOPGs+TI+WP2ruFb3ndUqYeLFaLdYgEAFCs/m3oH yJkH5LSkX13CbSmCgGOqNJ7BQ5RdxATW8upw/G7g8beeGKK7kl7Va+IqV7gEqQ495loehDgo ivnCx8DmQWj1RUq62yiMxheVV8mZr4nxVpTAMDmFQ/AN6QLCWp30JoiSg==
IronPort-HdrOrdr: A9a23:5TvjXKPVp095WsBcT3/155DYdb4zR+YMi2TDiHoedfUFSKOlfp 6V8MjzjSWE9Ar4WBkb6LS90dq7MAzhHP9OkMQs1NKZPTUO11HYVL2KgbGSoQEIXheOi9K1tp 0QP5SWaueAdmSS5PySiGLTfrZQo+VvsprY/9s2pE0dKj2CHpsQljuRfTzrdHGeKjM2YKYRJd 653I5qtjCgcXMYYoCQHX8eRdXOoNXNidbPfQMGLwRP0njAsRqYrJrBVzSI1BYXVD1ChZ0493 LergD/7qK/99mm1x7n0XPJ5Zg+oqqu9jIDPr3MtiEmEESutu+aXvUiZ1REhkFxnAib0idrrD ALmWZlAy080QKXQoj/m2qS5+Cp6kde15al8y7fvZMmyvaJHA7TzKF69Ntkm1LimjodlcA536 RR022DsZ1LSRvGgSTm/tDNEwpnj0yuvBMZ4KYuZlFkIP0jgYVq3MUi1VIQFI1FEDPx6YghHu UrBMbA5OxOeVffa3zCpGFgzNGlQ3x2R369MwI/k93Q1yITkGFyzkMeysBalnAc9IglQ50B4+ jfKKxnmLxHU8dTZ6NgA+UKR9exFwX2MFnxGXPXJU6iGLAMOnrLpZKy6LIp5PuycJhN15c2kI SpaiIuiYfzQTObNSSj5uw/zvmWehTPYd3E8LAt26RE
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.96,209,1665446400"; d="scan'208,217";a="9233239"
Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 01 Dec 2022 17:26:18 +0000
Received: from mail.cisco.com (xfe-rcd-002.cisco.com [173.37.227.250]) by rcdn-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id 2B1HQITL027660 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Thu, 1 Dec 2022 17:26:18 GMT
Received: from xfe-aln-005.cisco.com (173.37.135.125) by xfe-rcd-002.cisco.com (173.37.227.250) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9; Thu, 1 Dec 2022 11:26:17 -0600
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-005.cisco.com (173.37.135.125) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.15 via Frontend Transport; Thu, 1 Dec 2022 11:26:17 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=R1rq0SoueUyPaGXGmvCdgGGMBAtBn0nIWWY0kKyGSFOtI4GC34ZizvRObUgA/+B9BOP6vY57Q+YW+OoSaPEnEF8Hgr0Yj6SBZSHwxpy6k8vA7fEcTkt60tD2bkpbMdEfM2q6rYrOFNoQ4NwyLVpj5we+37Xl5kuhsCfBCSleGDQkpnlU5fPT64EanS+SGNClUBWwkPMrv3EDPo7eprjk//m00JCSe5XskuZwhjbPHMEvLvvu1juZPiC49zR3Z4jyWWIkb0eTWhKgANved4dj7jRATGEZEtz2XPPsTHldvaf54IAdI6ZSpgDaUYzt6Tln9J7NDVu2Wx/9WkVVnVGAzA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=t7mKX6HELEjToP2sYySa6R+Hm3D/RjYaT340IfdZw7w=; b=WsAyt8Qw236sLqQC8KxadB3+90bNDQ5OoLnwSbhu3Xur8eUgtdisLbbBUYHDRaZ3SgZMp/rkV0YuYmOeZhhsJddmf/qjFbQKUtgi+AWfAdZD7uTMzlmfTPQrKAAYPV7Mzae0HpfP21bDlNUZAxJUx1IP/LmnmV5zqLVHMUuw8Db/4W/fB62jnEQpLz5CgtMY/6aMqpKwSjbkpG/vBcFeWM1pTexuLWq+oM3Fv3ASMTKCEaQ0Eeqe6WOCK20Yr5X/dabuD8murbfe8o88NNhLWQk3lE8DYd07S/6LG4/rT6kfYFmrj6lFbfufjvpVHktXWizg+DnFwlC2NtmVnX9IkQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=t7mKX6HELEjToP2sYySa6R+Hm3D/RjYaT340IfdZw7w=; b=IyEePKcXZc0IMv4mD2R59H9dApACz3ZSnu1UkPF9BkHaei+exABB7ia/ifptmc4iIfN2p3Gv/sQPEgzkZMW/uzqYtdqo1OU3f7QfhPoDnz7YJkzDjnynMlrb9SjEciDlwkmE8vzvVh4MuVshUKFQp9kT3Sltip27VECnynsoo8M=
Received: from BN9PR11MB5371.namprd11.prod.outlook.com (2603:10b6:408:11c::11) by SN7PR11MB6558.namprd11.prod.outlook.com (2603:10b6:806:26e::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5857.23; Thu, 1 Dec 2022 17:26:11 +0000
Received: from BN9PR11MB5371.namprd11.prod.outlook.com ([fe80::24f:2d80:607:9ab2]) by BN9PR11MB5371.namprd11.prod.outlook.com ([fe80::24f:2d80:607:9ab2%7]) with mapi id 15.20.5880.008; Thu, 1 Dec 2022 17:26:11 +0000
From: "Joe Clarke (jclarke)" <jclarke@cisco.com>
To: "maqiufang (A)" <maqiufang1@huawei.com>, "opsawg@ietf.org" <opsawg@ietf.org>
CC: "draft-ma-opsawg-ucl-acl@ietf.org" <draft-ma-opsawg-ucl-acl@ietf.org>
Thread-Topic: Review of draft-ma-opsawg-ucl-acl
Thread-Index: AQHZA177bfAdnOY2G02M0faCVVSnpa5VhtDAgABY7l6AAom9QIAA4cdX
Date: Thu, 01 Dec 2022 17:26:11 +0000
Message-ID: <BN9PR11MB53717AFCA3FED3EFAE24A2F9B8149@BN9PR11MB5371.namprd11.prod.outlook.com>
References: <BN9PR11MB53718FC006165F39E4D3E39BB8139@BN9PR11MB5371.namprd11.prod.outlook.com> <7e99500f068c451c8c95113a73529924@huawei.com> <BN9PR11MB537102B1E935ABF99EDE4AB1B8129@BN9PR11MB5371.namprd11.prod.outlook.com> <c21af6f18fa54f6a810e29a7b818a739@huawei.com>
In-Reply-To: <c21af6f18fa54f6a810e29a7b818a739@huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN9PR11MB5371:EE_|SN7PR11MB6558:EE_
x-ms-office365-filtering-correlation-id: 5e5104c9-0a9b-4689-dd4f-08dad3c123f5
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 0cwL+SAnWfgofbEerBtuSldMPzaMZe7nL8AXsrGmIjAqlycR0ekpbKve7a9ELlDUhW2hzKffmgL3cCAFSw7G7ZyOdeBB0Wx4JuI4rykDCtvmmqZyl6eRFTCwgAYsUBe3TETjpNdB9ny/6Hvw8fgB3iDTm4xwJ9HrDxcRnYc4IDTdTdeEHj1x6u8jXxWL8nyPRD9TtUsN+XbrCCMEvpTlwMY6dp4yXy+NUU+3JH3oRA5HFKXRP6F4qTx6yaWCSKk4o3YSvZ7aiT+E+5tu35lb+Wyrf8uWFdFjUcHCOE5Ka5tB2yBlDW6TGxKktCNg3wmSfAlALXFkiLDsuuUbEk8dooi5tGukUE6vCy7cR74VY3Cn67EIkFAts8OcdXA/mbV+liA6wl+95WZINLDP1QLLLyzcRe9zQqd1TVOngvDUWIvMjdRJ+WVzZzEN1Ajyd1b5a3mrdLq3i08UA4p3A2yhvsKZiBh/lthf914Cz9ZWlEJEhzw28jmKeYG2sj6qn1+oDnOn5jjQPLA4mRuPHCJ4qqfzzj41ZmiVevDRV7UtOeUSX3Qi91CXgWG2OV/WOlqXRhU/5XWXTMiJaojDS4a4b7K1mxpmRwPGekQ/lSeSUVKZbLvV8MeRGF8mVYEQf4jBhlprJ/RX2CJ9DVzr3c15ioDhgfVFwiBHu6Hslra3zuG8vxB0V9cm83hGio4L+kUIG+Pnf2tLCX2NRRSw7TWvxg==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN9PR11MB5371.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(366004)(396003)(136003)(376002)(346002)(39860400002)(451199015)(9686003)(5660300002)(55016003)(38070700005)(110136005)(91956017)(4326008)(186003)(66446008)(41300700001)(76116006)(66946007)(64756008)(66476007)(316002)(8936002)(122000001)(2906002)(83380400001)(8676002)(52536014)(66556008)(38100700002)(86362001)(33656002)(71200400001)(6506007)(7696005)(478600001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BN9PR11MB53717AFCA3FED3EFAE24A2F9B8149BN9PR11MB5371namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN9PR11MB5371.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5e5104c9-0a9b-4689-dd4f-08dad3c123f5
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Dec 2022 17:26:11.1342 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: og9qtBBJ+VnC2NX4aGcSjjLnxVUUJOoduDVNrGRPE46QAb00OMvYKU5VdtSWC+MX/VBUbu7M1hAFpHuK3Ym7wA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR11MB6558
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.227.250, xfe-rcd-002.cisco.com
X-Outbound-Node: rcdn-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/AFuYHxq1XYxFEIzmHjt2GmJiRrA>
Subject: Re: [OPSAWG] Review of draft-ma-opsawg-ucl-acl
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Dec 2022 17:26:24 -0000

[JMC] It makes sense conceptually.  In practice, though, it seems very inefficient for the NAS to be resolving the user-group assignments at the packet level (the draft mentions something to this effect).  You’re right that resolving that at the controller level wouldn’t be any more practical.  But what I envision is that the mapping of session (i.e., user-group) attributes to network header elements (i.e., MAC/IP) would happen once and be generally visible to the administrators of the network.  The ACEs on the device need not have explicit user-group properties.  Those could be comments.  For example (in CLI syntax):

ip access-list extended DYNAMIC-ACCESS
  10 comment Allow jdoe to access finance resources
  20 permit ip host 10.10.10.10 172.20.20.0/24
…

This way the device isn’t have to resolve any of the user-group elements on reception of a packet.

The controller, on the other hand, would have a broader picture of the network use and access.  It would show where the user connected, when, and their session properties.
I think I have no doubt that the controller needs to maintain a high-level user-group based ACL, the divergence between us is that whether it has merits to allow devices to be aware of user-group.
I agree with you that the current draft would need devices to resolve common network header (e.g., 5 tuple) to user-group ID at packet level, and then look up the related user-group based ACL; but this way the controller only needs to pre-configure the devices once (at least the least number of times) and the user-group based ACL itself can dynamically adapt to different circumstances(e.g., IP/MAC changes, time varies, etc).

I also agree that it feels more straightforward if the devices can only see the common network header attributes and look up ACL directly, but it does requires multiple communications between the controller and the device, depending on the user group attribute changes.

It seems to me that both have upsides and downsides.

[JMC] I’m not suggesting multiple round-trips to the controller from the PEP per se.  I’m suggesting that the controller programs the PEP once with the resolved (i.e., 5-tuple) ACEs for a user upon login.  Essentially, this becomes a push model from controller to PEP.  If the user’s address changes, I am assuming a reauthentication would happen and programming would be redone.  In that case, it might make sense to have the user metadata as part of the model, so that the controller could do surgical reconfiguration of the PEP.  But having the PEP/device use the user-group details as a lookup point seems like it might be more impacting to performance than using the resolved 5-tuple data.

It seems to me the flow might be:

Step 1: Administrators configure the controller/orchestrator with the security policies (e.g., group Finance can access Finance resources)
Step 2: The user-group-based access control is maintained on the controller (this is now the PEP, I guess)
Step 3: A user logs in
Step 4: The AAA server either notifies the controller or the device notifies the controller that user jdoe has logged in successfully with the given group attributes
Step 5: The controller programs the NAS with the required IP/MAC ACEs
In your proposed flow, are you suggesting that the controller programs the NAS dynamically according to the network header (IP/MAC) information notified by the AAA server or the device? Does the “device” you mentioned in step 4 refer to the user authentication device/AAA client which has received the authentication result feedback? Just want to ensure that I've fully understood your proposal.

[JMC] See above.  I want to make sure the packet flow is as unincumbered as possible while still allowing for this type of policy.

Joe