yang models for i2nsf capabilities
play

Yang Models for I2NSF Capabilities - PowerPoint PPT Presentation

Yang Models for I2NSF Capabilities draft-hares-i2nsf-capabilities-yang Susan Hares Co-author: Robert Moskowitz` Capability Model (Xia, et al.) External Meta External ECA Model Model Capability sub-model Attack Mitigation Network Security


  1. Yang Models for I2NSF Capabilities draft-hares-i2nsf-capabilities-yang Susan Hares Co-author: Robert Moskowitz`

  2. Capability Model (Xia, et al.) External Meta External ECA Model Model Capability sub-model Attack Mitigation Network Security Content Security Sub-model Sub-Model Sub-Model draft-xia-i2nsf-capability-interface-im-06.txt

  3. Capability sub-model Common Super Class for ECA ECA Policy Rule Objects Ietf-pkt-eca-policy Ietf-pkt-eca-policy Event = packet reception ECA Policy rules Conditions, Actions

  4. Uses common ietf-i2nsf-capability packet ECA Filter +--rw nsf-capabilities with config, I2RS, +--rw capability* [name] +--rw nsf-name string BGP-FS storage +--rw cfg-net-secctl-capabilities | uses pkt-eca-policy:pkt-eca-policy-set +--rw cfg-net-sec-content-capabilities | uses i2nsf-content-caps Common packet ECA | uses i2nsf-content-sec-actions Filters are done so that +--rw cfg-attack-mitigate-capabilities* common actions in routers with firewalls, or | uses i2nsf-mitigate-caps firewalls with routing +--rw ITResource [ITresource-name] have common policy | uses cfg-ITResources rules to compare for conflict resolution

  5. Network Security Network Security Sub-Model +--rw cfg-net-secctl-capabilities | uses pkt-eca-policy:pkt-eca-policy-set Additional Index by which to loo-up information – Not in module ietf-pkt-eca-policy Global Model, +--rw pkt-eca-policy-cfg but necessary for ease of use | +--rw pkt-eca-policy-set | +--rw groups* [group-name] | | +--rw group-name string | | +--rw vrf-name string | | +--rw address-family | | +--rw group-rule-list* [rule-name] | | | +--rw rule-name | | | +--rw rule-order-id | | | +--rw default-action-id integer | | | +--rw default-resolution-strategy-id integer

  6. External ECA Model Security Policy Rule Apply Accounting Apply Profile Authentication Signature ECA Policy ECAPolicy Rule ECA Policy Rule Policy Rule Rule Traffic Authorization Inspectiion ECA Policy Rule Policy rule

  7. Figure 7 (Xia, et al) Linked to Yang Traffic Inspection Traffic Inspection Method Policy rule Traffic Inspection detail MGT ECA Policy Rule Rule # (config + opstate) Rule Name OP-State Configuration External Rule Policy Statistics Installed Rule Data Match Conflict on match status Action Needed Condition Resolution

  8. Xia et al. Info Model Lacks detail on Content Security Control Attack Mitigation capabilities Capabilities Attack SYN flood Anti-virus UDP flood • Intrusion Prevention ICMP flood • URL Filtering IP fragment flood, • File Blocking IPv6 related attacks • Data Filtering HTTP flood, • Application Behavior Control HTTPS flood • Mail Filtering DNS flood, • Packet Capturing DNS amplification, • File Isolation SSL DDoS, • IP sweep, Draft-hares-i2nsf- Draft-jeong-i2nsf- Port scanning capability treats as capbility-interface Ping of Death, capabilities to be treats as actions Oversized ICMP queried

  9. Network Security module ietf-pkt-eca-policy Sub-Model +--rw pkt-eca-policy-cfg | +--rw pkt-eca-policy-set | +--rw groups | | …. | +--rw rules* [order-id rule-name] | +--rw order-id | +--rw rule-name Condition rules | +--rw cfg-rule-conditions [cfgr-cnd-id] | | +--rw cfgr-cnd-id integer Event (time, user) | | +--rw eca-event-match | | | +--rw time-event-match* | | | | ... | | | +--rw user-event-match* Condition rules | | | | ... Packet (L1-L4) header, | | +--rw eca-condition-match Context) | | | +--rw eca-pkt-matches* | | | | ... (L1-L4 matches) | | | +--rw eca-user-matches* | | | | ... (user, schedule, region, target, state direction

  10. Jeong Comparison +--rw policy +--rw policy-name string +--rw policy-id string +--rw rule *[rule-id] +--rw rule-name string +--rw rule-id uint 8 Condition rules +--rw event Event (time, user) | +-- rw time-event-list? *[time-id] | …. | +--rw user-action? | … Condition rules +--rw condition Packet (L1-L4) header, | +--rw packet-content-values Context) | …. | +--rw context values | (user, schedule, region, target, device, state)

  11. module ietf-pkt-eca-policy +--rw pkt-eca-policy-cfg Network Security | +--rw pkt-eca-policy-set Sub-Model | +--rw groups | | …. | +--rw rules* [order-id rule-name] | +--rw order-id | +--rw rule-name | +--rw cfg-rule-conditions [cfgr-cnd-id] Actions | ….. | +--rw cfg-rule-actions [cfgr-action-id] | | +--rw cfgr-action-id | | +--rw eca-actions* [action-id] | | | +--rw action-id uint32 | | | +--rw eca-ingress-act* | | | | ... (permit, deny, mirror) | | | +--rw eca-fwd-actions* | | | | ... (invoke, tunnel encap, fwd) | | | +--rw eca-egress-act* | | | | .. . | | | +--rw eca-qos-actions* | | | | ... | | | +--rw eca-security-actions*

  12. module ietf-pkt-eca-policy +--rw pkt-eca-policy-cfg Network Security | +--rw pkt-eca-policy-set Sub-Model | +--rw groups | | …. | +--rw rules* [order-id rule-name] | +--rw order-id | +--rw rule-name Policy on | +--rw cfg-rule-conditions [cfgr-cnd-id] resolving | ….. Policy conflicts | +--rw cfg-rule-actions [cfgr-action-id] | |…… – Not in global | +--rw pc-resolution-strategies* [strategy-id] model | | +--rw strategy-id integer | | +--rw filter-strategy identityref | | | .. FMR, ADTP, Longest-match | | +--rw global-strategy identityref | | +--rw mandatory-strategy identityref | | | +--rw local-strategy identityref | | +--rw resolution-fcn uint32 | | +--rw resolution-value uint32 | | +--rw resolution-info string | | +--rw associated-ext-data* | | | +--rw ext-data-id integer *

  13. module ietf-pkt-eca-policy Network Security +--rw pkt-eca-policy-cfg Sub-Model | +--rw pkt-eca-policy-set | +--rw groups | | …. | +--rw rules* [order-id rule-name] | +--rw order-id | +--rw rule-name | +--rw cfg-rule-conditions [cfgr-cnd-id] | ….. | +--rw cfg-rule-actions [cfgr-action-id] | |…… | +--rw pc-resolution-strategies* [strategy-id] | |…. | +--rw cfg-external-data External Data | | +--rw cfg-ext-data-id | | ….

  14. Jeong Comparison +--rw policy +--rw policy-name string +--rw policy-id string +--rw rule *[rule-id] +--rw rule-name string Advanced security +--rw rule-id uint 8 actions need to be +--rw event resolved | … +--rw condition | …. +--rw action | choice of ingress, egress, advance actions) | advance actions = content security control (normal + voip) | + attack mitigation | +--rpcs (time-event add/delete, user add/delete, region add/delete)

  15. Recommendation • IM/DM need to determine if Content Security Control Capabilities and Attack Mitigation capabilities - are queried or advanced actions, • Use of rpcs for addition: – Events – Conditions, – Actions • Merging of basic functions

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend