Applicability of Interfaces to Network Security Functions to Network-Based Security Services
draft-ietf-i2nsf-applicability-18

Approval announcement
Draft of message to be sent after approval:

From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Cc: rdd@cert.org, The IESG <iesg@ietf.org>, draft-ietf-i2nsf-applicability@ietf.org, i2nsf@ietf.org, Linda Dunbar <Linda.dunbar@futurewei.com>, Linda.dunbar@huawei.com, i2nsf-chairs@ietf.org, rfc-editor@rfc-editor.org
Subject: Document Action: 'Applicability of Interfaces to Network Security Functions to Network-Based Security Services' to Informational RFC (draft-ietf-i2nsf-applicability-18.txt)

The IESG has approved the following document:
- 'Applicability of Interfaces to Network Security Functions to Network-
   Based Security Services'
  (draft-ietf-i2nsf-applicability-18.txt) as Informational RFC

This document is the product of the Interface to Network Security Functions
Working Group.

The IESG contact persons are Benjamin Kaduk and Roman Danyliw.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-i2nsf-applicability/


Technical Summary

   This document describes the applicability of Interface to Network
   Security Functions (I2NSF) to network-based security services in
   Network Functions Virtualization (NFV) environments, such as
   firewall, deep packet inspection, or attack mitigation engines.

Working Group Summary

This document is specifically written for I2NSF WG as one of the milestones specified by the I2NSF Charter. This document is not considered by any other WGs. 

There was nothing exceptional in the WG processing for this document.

There was careful debate resulting in merging contents from other drafts into this document.

Document Quality

This applicability document is not directly implementable, but it describes how I2NSF work are used in NFV environment to achieve software defined security policy enforcement.  At least two organizations are building a system based on the work of the working group and following this approach as an architecture. There has also been experimentation at IETF hackathons that is consistent with the work.

Personnel

Linda Dunbar is the document shepherd. 
Roman Danyliw is the responsible AD.