Skip to main content

I2NSF on the NFV Reference Architecture
draft-yang-i2nsf-nfv-architecture-01

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Expired".
Authors Hyunsik Yang , Younghan Kim
Last updated 2018-03-04
RFC stream (None)
Formats
Additional resources
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-yang-i2nsf-nfv-architecture-01
Network Working Group                                     Hyunsik Yang
Internet-Draft                                            Younghan Kim
Intended status: Informational                     Soongsil University
Expires: August 2018                                     March 3, 2018

                  I2NSF on the NFV Reference Architecture
                 draft-yang-i2nsf-nfv-architecture-01.txt

Abstract

     This document describes the adoption of I2NSF Framework onto the
     Network Functions Virtualization (NFV) Reference Model. In this
     document, we explain the I2NSF Framework adopted to NFV reference
     architecture with each corresponding component.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79. This document may not be modified,
   and derivative works of it may not be created, and it may not be
   published except as an Internet-Draft.

   This document may contain material from IETF Documents or IETF
   Contributions published or made publicly available before November 
   10, 2008. The person(s) controlling the copyright in some of this
   material may not have granted the IETF Trust the right to allow
   modifications of such material outside the IETF Standards Process.
   Without obtaining an adequate license from the person(s) controlling
   the copyright in such materials, this document may not be modified
   outside the IETF Standards Process, and derivative works of it may
   not be created outside the IETF Standards Process, except to format
   it for publication as an RFC or to translate it into languages other
   than English.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as 
   Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six 
   months and may be updated, replaced, or obsoleted by other documents
   at any time.
   It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

Yang, et al.           Expires August 8, 2018                 [Page 1]
Internet-Draft  draft-yang-i2nsf-nfv-architecture-01        March 2018

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html

   This Internet-Draft will expire on August 8 2018.

Copyright Notice

   Copyright (c) 2018 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with
   respect to this document. Code Components extracted from this
   document must include Simplified BSD License text as described in
   Section 4.e of the Trust Legal Provisions and are provided
   without warranty as described in the Simplified BSD License.

Yang, et al.           Expires August 3, 2018                 [Page 2]
Internet-Draft  draft-yang-i2nsf-nfv-architecture-01        March 2018

Table of Contents

   1. Introduction ................................................ 4
      1.1. Terminology ............................................ 4
   2. I2NSF framework onto the NFV Reference Model ................ 4
      2.1. NSF .................................................... 6
      2.2. Security Controller..................................... 7
      2.3. Developer's Mgmt System................................. 7
      2.4. Interfaces ............................................. 8
         2.4.1. Consumer-Facing Interface ..........................8
         2.4.2. NSF-Facing Interface............................... 8
         2.4.3. Registration Interface............................. 8
   3. Multi-site Consideration..................................... 9
   4. Use case -  SFC Enabled I2NSF framework ......................9
      4.1. SFC Policy Manager..................................... 10
      4.2. SFC Catalog Manager.................................... 10
      4.3. Developer's Mgmt System................................ 11
   5. Security Considerations..................................... 11
   6. IANA Considerations ........................................ 11
   7. References ................................................. 12
      7.1. Normative References................................... 12
      7.2. Informative References................................. 12

Yang, et al.           Expires August 3, 2018                 [Page 3]
Internet-Draft  draft-yang-i2nsf-nfv-architecture-01        March 2018

 1. Introduction

   The goal of I2NSF is to define a set of software interfaces and
   components for controlling and monitoring aspects of physical and
   virtual NSFs, enabling clients to specify rules set. To enable I2NSF
   environment, I2NSF framework not only considers physical
   infrastructure but also considers the NFV environment since NSF may
   be provided by virtualized infrastructure as a vnfs. Especially,
   I2NSF applicability document [i2NSF-applicability] describes the
   applicability of interface to Network Security Functions(I2NSF) to
   network-based security services in NFV environment. Although it
   explains how I2NSF provides security service in NFV environment, it
   doesn't consider how I2NSF framework adopted onto the NFV reference
   architecture.

   Therefore, we explain the I2NSF framework adopted to NFV reference
   architecture with each corresponding component.

1.1. Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC-2119 [RFC2119].

   This document uses the terminology described in [i2nsf-
   framework],[i2nsf-terminology], [i2nsf-applicability], [etsi-gs-nfv-
   003] and [nsf-triggered-steering].

 2. I2NSF framework onto the NFV Reference Model

   The European Telecommunications Standards Institute (ETSI) defined
   the components for the basic NFV architecture including the NFV
   Infrastructure (NFVI), VNF Manager (VNFM), Virtualization
   Infrastructure Manager (VIM), and NFV Orchestrator (NFVO). [etsi-gs-
   nfv-003] NFVI provides the virtual resources, such as VM and virtual
   network, used to create, update, and delete VNFs running 
   applications. VNFs are implemented through software virtualization 
   techniques running over the NFVI.

   Virtualized Infrastructure Manager (VIM) has a function for
   controlling and managing the NFVI compute, storage and network
   resources, within one operator's infrastructure sub-domain. It also
   collects and forwards performance measurements and events.

Yang, et al.           Expires August 3, 2018                 [Page 4]
Internet-Draft  draft-yang-i2nsf-nfv-architecture-01        March 2018

   VNFM manages the VNF lifecycle. When a VNF is created, the VNFM
   manages the VNF instance in the lifecycle, and the VNFM performs
   several actions such as software update/modification, monitoring data
   collection - a fault event in the VNF, and instance termination.
   According to definition of ETSI, the VNFM is divided into Generic
   VNFM and Specific VNFM. When the VNFs have their specific methods for
   provisioning and lifecycle management, a specific VNFM required.

   In the I2NSF framework [i2nsf-framework], they defined several
   components such as NSF, Security controller and Developer's Mgmt
   System. To adopt these components to the NFV reference architecture,
   each component should be classified based on functionality. According
   to component functionality, it would correspond to NFV reference
   architecture components as Figure 1.

Yang, et al.           Expires August 3, 2018                 [Page 5]
Internet-Draft  draft-yang-i2nsf-nfv-architecture-01        March 2018

   +-------------------------------------------+  | ----------------   |
   |                 OSS/BSS                   |  | | NFV          |   |
   +-------------------------------------------+  | | Orchestrator +-+ |
            Consumer facing interface             | ---+------------ | |
   +-------------------------------------------+  |    |             | |
   |  -------------------------------------    |  |    |             | |
   |  |      Security Controller(EM)      |    |  |    |             | |
   |  ------------------+------------------    |  | ---+----------   | |
   |      |     NSF-facing interface  |        |(a)-| Devloper's |   | |
   |  ----+----     ----+----     ----+----    |  | | Mgmt(VNFM) |   | |
   |  |NSF(VNF)|    |NSF(VNF)|    |NSF(VNF)|   |  | ---+----------   | |
   |  ----+----     ----+----     ----+----    |  |    |             | |
   +------|-------------|-------------|--------+  |    |             | |
          |             |             |           |    |             | |
   +------+-------------+-------------+--------+  |    |             | |
   |         NFV Infrastructure (NFVI)         |  |    |             | |
   | -----------    -----------    ----------- |  |    |             | |
   | | Virtual |    | Virtual |    | Virtual | |  |    |             | |
   | | Compute |    | Storage |    | Network | |  |    |             | |
   | -----------    -----------    ----------- |  | ---+------       | |
   | +---------------------------------------+ |  | |        |       | |
   | |         Virtualization Layer          | |--|-| VIM(s) +-------- |
   | +---------------------------------------+ |  | |        |         |
   | +---------------------------------------+ |  | ----------         |
   | | -----------  -----------  ----------- | |  |                    |
   | | | Compute |  | Storage |  | Network | | |  |                    |
   | | | hardware|  | hardware|  | hardware| | |  |                    |
   | | -----------  -----------  ----------- | |  |                    |
   | |          Hardware resources           | |  |  NFV Management    |
   | +---------------------------------------+ |  | and Orchestration  |
   +-------------------------------------------+  +--------------------+
   (a)= Registration interface

         Figure 1. I2NSF architecture on NFV reference architecture

2.1. NSF

   Network Security Function is one of the security service functions.

   In the ETSI reference architecture, VNF(Virtual Network Function)is
   the network functions which provide specific service.

   Therefore, NSF corresponds to the VNF in NFV reference architecture.

Yang, et al.           Expires August 3, 2018                 [Page 6]
Internet-Draft  draft-yang-i2nsf-nfv-architecture-01        March 2018

2.2. Security Controller

   According to I2NSF framework, the security controller has a role
   which translate policy according to user's request and delivers low
   level policy to NSFs(manages NSF). It also collects NSF capability
   from developer's Mgmt System. Based on this information, the security
   controller forwards policy to NSF.

   In the NFV reference architecture, EM has a role that it may be aware
   of virtualization and collaborate with the VNF Manager to perform
   those functions that require exchanges of information regarding the
   NFVI Resources associated with the VNF. EM performs typical
   management functionality for one or several VNFs.

   Therefore, the Security controller corresponds to Element management
   since it should provide the function which controls NSF and policy.
   In the case of a distributed security controller model, an interface
   which is used to communicate between controllers should also be
   considered.

2.3. Developer's Mgmt System

   According to the definition of I2NSF Registration Interface,
   Developer's Mgmt system registers NSF which can be provided by
   specific vendor. Developer's Mgmt system also can be one of the
   vendors too.

   In the NFV reference architecture, VNFM manages the VNF lifecycle. It
   also performs several actions such as software update, monitoring and
   fault management. Generally, generic VNFM means that only one VNFM
   handle all of the VNF in the NFV environment. However, if additional
   VNFMs are required for management of specific VNFs, additional VFNMs
   can be defined as specific VNFMs.

   Therefore, if Developer's Mgmt System manages the NSF lifecycle, it
   can logically correspond to a specific VNFM.

Yang, et al.           Expires August 3, 2018                 [Page 7]
Internet-Draft  draft-yang-i2nsf-nfv-architecture-01        March 2018

2.4. Interfaces

    2.4.1. Consumer-Facing Interface

   The Consumer-Facing Interface is an interface for communication
   between the User and the Security Controller. It is used to enable
   different users of a given I2NSF system to define, manage, and
   monitor security policies for specific flows within an administrative
   domain.

   In the NFV reference architecture, OSS is Operational Support Systems
   and BSS stands for Business Support Systems. OSS/BSS support the
   system which relates to infra management such as billing, order and
   metering.

   Although an interface is not defined between User and EM in the NFV
   reference architecture, Consumer-Facing interface can be deployed
   between user and EM.

    2.4.2. NSF-Facing Interface

   The NSF-Facing Interface is an interface for communication between
   Security Controller and NSF. It is used to specify and monitor flow-
   based security policies enforced by one or more NSFs.

   In the NFV reference architecture, Software Architecture (SWA)-4
   Interface is defined. The interface SWA-4 is used by the EM to
   communicate with a VNF. This management interface is used for the
   runtime management of the VNF according to the Fulfillment, 
   Assurance,and Billing and FCAPS(Fault, Configuration, Accounting, 
   Performance,Security) network management models and frameworks.

   Therefore, NSF-Facing Interface corresponds to the SWA-4 interface.

    2.4.3. Registration Interface

   Registration Interface is used to register NSF from Developer's Mgmt
   System to the security controller. An NSF's capabilities can either
   be pre-configured or retrieved dynamically through the I2NSF
   Registration Interface.

Yang, et al.           Expires August 3, 2018                 [Page 8]
Internet-Draft  draft-yang-i2nsf-nfv-architecture-01        March 2018

   Above, this document mentioned that, the Developer's Mgmt System
   handles the NSF life cycle and this interface corresponds to Ve-Vnfm
   which is defined in the NFV reference architecture. Ve-Vnfm is
   defined as IFA008 in ETSI document. IFA008 composed of two 
   interfaces. One is Ve-Vnfm-em, another is Ve-Vnfm-VNF. If security 
   controller is deployed as an EM, then the registration interface 
   corresponds to Ve-Vnfm-em.

 3. Multi-site Consideration

   In the above section, we described how the I2NSF framework is adopted
   to NFV architecture in single-site. From a perspective of NFV, when
   security functions are deployed it might be deployed at a single site
   or multiple sites.

   Basically, I2NSF framework only considers that a single Developer's
   Mgmt system(VNFM) could manage all the NSFs.

   As a perspective of ETSI reference architecture, when NSFs are
   deployed at multi-site environment, Developer's Mgmt system(VNFM)
   could manage all of the NSFs through a single Developer's 
   Mgmt system. Alternatively, it could manage the NSF through multiple
   Developer's Mgmt systems.

   I2NSF framework only considers a single security controller managing
   all the NSFs in a domain. This implies that one security
   controller(EM) should be located at one domain.

   However, as a perspective of ETSI reference architecture, EM usually
   located at each site and controls VNF which belongs to that site.

   The I2NSF framework should consider security controller placement in
   a multi-site environment, since there is a conflict between the I2NSF
   framework and the ETSI NFV reference architecture regarding the
   placement of security controller(EM).

 4. Use case -  SFC Enabled I2NSF framework

   In the I2NSF WG, some documents mentioned use cases for cloud based
   security with forwarding mechanism. Especially SFC enabled I2NSF
   document [nsf-triggered-steering] showed the use case which used SFC
   as a forwarding mechanism. In addition, it defined additional
   components and extended functionality of components. Therefore, in

Yang, et al.           Expires August 3, 2018                 [Page 9]
Internet-Draft  draft-yang-i2nsf-nfv-architecture-01        March 2018

   the following section, we explain the details of each component and
   consider how it corresponds to the NFV reference architecture.

4.1. SFC Policy Manager

   SFC policy manager is a part of the security controller. It is
   responsible for interpreting a high level policy into a low-level SFC
   policy, which is given by I2NSF client. It also handles delivery of
   the interpreted policy to classifiers for security function chaining.
   Moreover, it also generates an SF forwarding table and distributes
   the forwarding information to SFF(s).

   In the NFV reference architecture, MANO performs similar functions as
   the SFC policy manager. More specifically the NFV orchestrator (NFVO)
   performs on-boarding of new Network Service (NS), VNF-FG(forwarding
   graph) and VNF Packages. In addition, it manages NS lifecycle
   (including instantiation, scale-out/in, performance measurements,
   event correlation and termination).

   Therefore, SFC policy manager corresponds to NFVO. In addition, if
   SFC policy manager is a part of Security controller, this function
   should be separated from security controller.

4.2. SFC Catalog Manager

   SFC catalog manger is a part of the security controller. It is
   responsible for maintaining the information of every available SF
   instance such as IP address, supported transport protocol, service
   name, and load status. Moreover, it should respond to the queries for
   available SF instances from SFC Policy Manager so as to help to
   generate a forwarding table entry relevant to a given SFP. It also
   request Developer's Management System to dynamically instantiate
   supplementary SF instances to avoid service congestion or the
   elimination of an existing SF instance to avoid resource waste.

   In the NFV reference architecture, SFC catalog manager corresponds to
   Element management since information which is related to VNF
   capability is managed by EM. Moreover, this function is similar to
   security controller as we explained earlier.

Yang, et al.           Expires August 3, 2018                [Page 10]
Internet-Draft  draft-yang-i2nsf-nfv-architecture-01        March 2018

4.3. Developer's Mgmt System

   In the SFC enabled document, the function of Developer's Mgmt system
   is extended. Following the request message from SFC catalog manager,
   it creates additional SF instances and eliminates some of the SF
   instances.

   As mentioned above, if Developer's Mgmt system manages the NSF's
   lifecycle, it corresponds to a specific VNF Manager. VNF life cycle
   management includes instantiating, creating, provisioning, scaling,
   monitoring, and termination of VMs in a VNF instance. Therefore, the
   Developer's Mgmt system corresponds to a specific VNF Manager.

   However, for scaling performed at a network service level, the role
   of Developer's Mgmt system should extend to the MANOManage and
   orchestrator).

   SFC catalog manger is a part of the security controller. It is
   responsible for maintaining the information of every available SF
   instance such as IP address, supported transport protocol, service
   name, and load status. Moreover, it should respond to the queries for
   available SF instances from SFC Policy Manager so as to help to
   generate a forwarding table entry relevant to a given SFP. It also
   request Developer's Management System to dynamically instantiate
   supplementary SF instances to avoid service congestion or the
   elimination of an existing SF instance to avoid resource waste.

   In the NFV reference architecture, SFC catalog manager corresponds to
   Element management since information which is related to VNF
   capability is managed by EM. Moreover, this function is similar to
   security controller as we explained earlier.

 5. Security Considerations

   N/A

 6. IANA Considerations

   This document has no IANA actions.

Yang, et al.           Expires August 3, 2018                [Page 11]
Internet-Draft  draft-yang-i2nsf-nfv-architecture-01        March 2018

 7. References

7.1. Normative References

   [i2nsf-framework]

            Lopez, D., Lopez, E., Dunbar, L.,Strassner, J., and R.
             Kumar, "Framework for Interface to Network Security
             Functions",draft-ietf-i2nsf-framework-07 (work in progress)
             ,August 2017.

   [i2nsf-terminology]

            Hares, S., Strassner, J., Lopez, D., Xia, L., and H.
             Birkholz, "Interface to Network Security Functions (I2NSF)
             Terminology",draft-ietf-i2nsf-terminology-04 (work in
             progress), July 2017.

   [etsi-gs-nfv-003]

            ETSI NFV ISG, "Network Functions Virtualisation (NFV);
             Terminology for Main Concepts in NFV", ETSI GS NFV 002
             V1.1.1 NFV 002, October 2013,
             <http://www.etsi.org/deliver/etsi_gs/nfv/001_099/002/01.01.
             01_60/gs_nfv002v010101p.pdf>

7.2. Informative References

   [i2NSF-applicability]

            J. Jeong., S. Hyun., T. Ahn., S. Hares., D. Lopez.,"
             Applicability of Interfaces to Network Security Functions
             to Network-Based Security Services",draft-ietf-i2nsf-
             applicability-00(work in progress),October, 2017.

   [nsf-triggered-steering]

            Hyun, S., Jeong, J., Park, J., and S.Hares, "Service
             Function Chaining-Enabled I2NSF Architecture",draft-hyun-
             i2nsf-nsf-triggered-steering-03(work in progress), July
             2017.

Yang, et al.           Expires August 3, 2018                [Page 12]
Internet-Draft  draft-yang-i2nsf-nfv-architecture-01        March 2018

   Authors' Addresses

   Hyunsik Yang
     Soongsil University
     369, Sangdo-ro, Dongjak-gu,
     Seoul 156-743, Korea
     Email: yangun@dcn.ssu.ac.kr

   Younghan Kim
     Soongsil University
     369, Sangdo-ro, Dongjak-gu,
     Seoul 156-743, Korea
     Email: younghak@ssu.ac.kr

Yang, et al.           Expires August 3, 2018                [Page 13]