I2NSF NSF Monitoring YANG Data Model

The information below is for an old version of the document
Document Type Expired Internet-Draft (i2nsf WG)
Authors Jaehoon Jeong  , Chaehong Chung  , Susan Hares  , Liang Xia  , Henk Birkholz 
Last updated 2020-05-07 (latest revision 2019-11-04)
Replaces draft-hong-i2nsf-nsf-monitoring-data-model
Stream IETF
Intended RFC status (None)
Expired & archived
pdf htmlized (tools) htmlized bibtex
Additional Resources
- Mailing list discussion
Stream WG state WG Document
Document shepherd No shepherd assigned
IESG IESG state Expired
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


This document proposes an information model and the corresponding YANG data model for monitoring Network Security Functions (NSFs) in the Interface to Network Security Functions (I2NSF) framework. If the monitoring of NSFs is performed in a comprehensive way, it is possible to detect the indication of malicious activity, anomalous behavior or the potential sign of denial of service attacks in a timely manner. This monitoring functionality is based on the monitoring information that is generated by NSFs. Thus, this document describes not only an information model for monitoring NSFs along with a YANG data diagram, but also the corresponding YANG data model for monitoring NSFs. Editorial Note (To be removed by RFC Editor) Please update these statements within the document with the RFC number to be assigned to this document: "This version of this YANG module is part of RFC 6087;" "RFC XXXX: I2NSF NSF Monitoring YANG Data Model" "reference: RFC 6087" Please update the "revision" date of the YANG module.


Jaehoon Jeong (pauljeong@skku.edu)
Chaehong Chung (darkhong@skku.edu)
Susan Hares (shares@ndzh.com)
Liang Xia (frank.xialiang@huawei.com)
Henk Birkholz (henk.birkholz@sit.fraunhofer.de)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)