<?xml version="1.0" encoding="US-ASCII"?>
<!-- <?xml version="1.0" encoding="UTF-8"?> -->
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private)
-->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">

<?rfc toc="yes"?>
<?rfc rfcedstyle="yes"?>
<?rfc subcompact="no"?>
<?rfc symrefs="yes"?>
<rfc ipr="trust200902" category="std" docName="draft-ietf-i2nsf-registration-interface-dm-09">

<front>
    <title abbrev="Registration Interface YANG Data Model">
        I2NSF Registration Interface YANG Data Model
    </title>

   <author role="editor" initials="S." surname="Hyun" fullname="Sangwon Hyun">
        <organization abbrev="Myongji University">
            Department of Computer Engineering
        </organization>

        <address>
            <postal>
                <street> Myongji University</street>
                <street>116 Myongji-ro, Cheoin-gu</street>
                <city>Yongin</city> <region>Gyeonggi-do</region>
                <code>17058</code>
                <country>Republic of Korea</country>
            </postal>
            <email>shyun@mju.ac.kr</email>

        </address>
    </author>

    <author role="editor" initials="J." surname="Jeong" fullname="Jaehoon Paul Jeong">
        <organization abbrev="Sungkyunkwan University">
            Department of Computer Science and Engineering
        </organization>

        <address>
            <postal>
                <street>Sungkyunkwan University</street>
                <street>2066 Seobu-Ro, Jangan-Gu</street>
                <city>Suwon</city> <region>Gyeonggi-Do</region>
                <code>16419</code>
                <country>Republic of Korea</country>
            </postal>
            <phone>+82 31 299 4957</phone>
            <facsimile>+82 31 290 7996</facsimile>
            <email>pauljeong@skku.edu</email>
            <uri>http://iotlab.skku.edu/people-jaehoon-jeong.php
        </uri>
        </address>
    </author>

   <author initials="T." surname="Roh" fullname="Taekyun Roh">
        <organization abbrev="Sungkyunkwan University">
            Department of Electronic, Electrical and Computer Engineering
        </organization>

        <address>
            <postal>
                <street>Sungkyunkwan University</street>
                <street>2066 Seobu-Ro, Jangan-Gu</street>
                <city>Suwon</city> <region>Gyeonggi-Do</region>
                <code>16419</code>
                <country>Republic of Korea</country>
            </postal>
            <phone>+82 31 290 7222</phone>
            <facsimile>+82 31 299 6673</facsimile>
            <email>tkroh0198@skku.edu</email>
        </address>
   </author>

    <author initials="S." surname="Wi" fullname="Sarang Wi">
        <organization abbrev="Sungkyunkwan University">
            Department of Electronic, Electrical and Computer Engineering
        </organization>

        <address>
            <postal>
                <street>Sungkyunkwan University</street>
                <street>2066 Seobu-Ro, Jangan-Gu</street>
                <city>Suwon</city> <region>Gyeonggi-Do</region>
                <code>16419</code>
                <country>Republic of Korea</country>
            </postal>
            <phone>+82 31 290 7222</phone>
            <facsimile>+82 31 299 6673</facsimile>
            <email>dnl9795@skku.edu</email>
        </address>
    </author>

    <author initials="J." surname="Park" fullname="Jung-Soo Park">
        <organization abbrev="ETRI">
            Electronics and Telecommunications Research Institute
        </organization>

        <address>
            <postal>
                <street>218 Gajeong-Ro, Yuseong-Gu</street>
                <city>Daejeon</city>
                <code>305-700</code>
                <country>Republic of Korea</country>
            </postal>
            <phone>+82 42 860 6514</phone>
            <email>pjs@etri.re.kr</email>
        </address>
    </author>


    <date month="August" day="29" year="2020" />
    <area>Security</area>
    <workgroup>I2NSF Working Group</workgroup>

<!-- [rfced] Please insert any keywords (beyond those that appear in
the title) for use on http://www.rfc-editor.org/rfcsearch.html. -->

<keyword>Internet-Draft</keyword>

    <abstract>
        <t>
          This document defines an information model and a YANG data model for Registration Interface between Security Controller and Developer's Management System (DMS) in the Interface to Network Security Functions (I2NSF) framework to register Network Security Functions (NSF) of the DMS with the Security Controller. The objective of these information and data models is to support NSF capability registration and query via I2NSF Registration Interface.


        </t>
    </abstract>
    <!-- <note title="Editorial Note (To be removed by RFC Editor)">
          <t>Please update these statements within the document with the RFC
             number to be assigned to this document:<list style="empty">
          <t>"This version of this YANG module is part of RFC XXXX;"</t>

          <t>"RFC XXXX: I2NSF Registration Interface YANG Data Model"</t>

          <t>"reference: RFC XXXX"</t>
      </list>Please update the "revision" date of the YANG module.</t>
  </note> -->
</front>

<!-- End of Front -->

<middle>

    <section title="Introduction">
        <t>
            A number of Network Security Functions (NSF) may exist in the Interface to Network Security Functions (I2NSF) framework <xref target="RFC8329"/>. Since each of these NSFs likely has different security capabilities from each other, it is important to register the security capabilities of the NSF with the security controller. In addition, it is required to search NSFs of some required security capabilities on demand. As an example, if additional security capabilities are required to serve some security service request(s) from an I2NSF user, the security controller should be able to request the DMS for NSFs that have the required security capabilities.
        </t>
        <t>
            This document describes an information model (see <xref target="info-model" />) and a YANG <xref target="RFC7950" /> data model (see <xref target="data-model" />) for the I2NSF Registration Interface <xref target="RFC8329" /> between the security controller and the developer's management system (DMS) to support NSF capability registration and query via the registration interface. It also describes the operations which should be performed by the security controller and the DMS via the Registration Interface using the defined model.
        </t>
    </section>

    <section title="Requirements Language">
        <t>
        	The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in <xref target="RFC2119" /> when, and only when, they appear in all capitals, as shown here.
        </t>
    </section>

<!-- terminology start -->
    <section title="Terminology">
        <t>
            This document uses the following terms defined in <xref target="RFC8329" /> and <xref target="I-D.ietf-i2nsf-capability-data-model" />.
        </t>
        <t>
            <list style="symbols">
                <t>
                    Network Security Function (NSF): A function that is responsible for a specific treatment of received packets. A Network Security Function can act at various layers of a protocol stack (e.g., at the network layer or other OSI layers). Sample Network Security Service Functions are as follows: Firewall, Intrusion Prevention/Detection System (IPS/IDS), Deep Packet Inspection (DPI), Application Visibility and Control (AVC), network virus and malware scanning, sandbox, Data Loss Prevention (DLP), Distributed Denial of Service (DDoS) mitigation and TLS proxy.
                </t>
                <t>
                    Data Model: A data model is a representation of concepts of interest to an environment in a form that is dependent on data repository, data definition language, query language, implementation language, and protocol.
                </t>
                <t>
                    Information Model: An information model is a representation of concepts of interest to an environment in a form that is independent of data repository, data definition language, query language, implementation language, and protocol.
                </t>
                <t>
                  YANG: This document follows the guidelines of <xref
                    target="RFC8407"></xref>, uses the common YANG types defined in <xref
                    target="RFC6991"></xref>, and adopts the Network Management Datastore
                    Architecture (NMDA). The meaning of the symbols in tree diagrams is
                    defined in <xref target="RFC8340"></xref>.
                </t>
            </list>
        </t>

    </section>
    <!-- terminology end -->


     <!-- Objectives start -->
    <section title="Objectives">
            <t>
                <list style="symbols">
                    <t>
                        Registering NSFs to I2NSF framework: Developer's Management System (DMS) in I2NSF framework is typically run by an NSF vendor, and uses Registration Interface to provide NSFs developed by the NSF vendor to Security Controller. DMS registers NSFs and their capabilities to I2NSF framework through Registration Interface. For the registered NSFs, Security Controller maintains a catalog of the capabilities of those NSFs.
                    </t>

                    <t>
                        Updating the capabilities of registered NSFs: After an NSF is registered into Security Controller, some modifications on the capability of the NSF may be required later. In this case, DMS uses Registration Interface to update the capability of the NSF, and this update should be reflected in the catalog of NSFs.
                    </t>

                    <t>
                        Asking DMS about some required capabilities: In cases that some security capabilities are required to serve the security service request from an I2NSF user, Security Controller searches through the registered NSFs to find ones that can provide the required capabilities. But Security Controller might fail to find any NSFs having the required capabilities among the registered NSFs. In this case, Security Controller needs to request DMS for additional NSF(s) that can provide the required security capabilities via Registration Interface.
                    </t>

                <!--    <t>
                        Requesting NSF instantiation: If some NSFs need to be instantiated to enforce requested security policy, Security Controller makes a request to instantiate them through Registration Interface. Or if an NSF, running as a virtual NSF in the NFV environment, is not used by any traffic flows for a time period, Security Controller may request deinstantiating it through Registration Interface for the purpose of efficient resource utilization.
                    </t>-->
                </list>
            </t>
    </section>
<!-- Objectives end -->


<!-- information model start -->
    <section anchor="info-model" title="Information Model">
        <t>
           The I2NSF registration interface is used by Security Controller and Developer's Management System (DMS) in I2NSF framework. The following summarizes the operations done through the registration interface:

            <list style="format %d)">
                <t>
                    DMS registers NSFs and their capabilities to Security Controller via the registration interface. DMS also uses the registration interface to update the capabilities of the NSFs registered previously.
                </t>

                <t>
                    In case that Security Controller fails to find some required capabilities from any registered NSF that can provide , Security Controller queries DMS about NSF(s) having the required capabilities via the registration interface.
                </t>

          <!--      <t>
                    Security Controller may have a registered NSF with some required capability, but the NSF may not be in an active running state. In this case, Security Controller can make a request for initiating the NSF through the registration interface.
                </t> -->
            </list>
        </t>

        <t>
          <xref target="the-registration-interface-information-model-design"/> shows the information model of the I2NSF registration interface, which consists of two submodels: NSF capability registration and NSF capability query. Each submodel is used for the operations listed above. The remainder of this section will provide in-depth explanations of each submodel.
      </t>

        <figure anchor="the-registration-interface-information-model-design" title="I2NSF Registration Interface Information Model">
            <artwork><![CDATA[
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |      I2NSF Registration Interface Information Model       |
  |                                                           |
  |         +-+-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+-+          |
  |         | NSF Capability  |  | NSF Capability  |          |
  |         | Registration    |  | Query           |          |
  |         +-+-+-+-+-+-+-+-+-+  +-+-+-+-+-+-+-+-+-+          |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
            ]]></artwork>
        </figure>


        <section title="NSF Capability Registration">
            <t>
              This submodel is used by DMS to register an NSF with Security Controller. <xref target="nsf-cap-info-submodel"/> shows how this submodel is constructed. The most important part in <xref target="nsf-cap-info-submodel"/> is the NSF capability, and this specifies the set of capabilities that the NSF to be registered can offer. The NSF Name contains a unique name of this NSF with the specified set of capabilities. When registering the NSF, DMS additionally includes the network access information of the NSF which is required to enable network communications with the NSF.
          </t>

            <t>
                The following will further explain the NSF capability information and the NSF access information in more detail.
            </t>

            <figure anchor="nsf-cap-info-submodel" title="NSF Capability Registration Sub-Model">
            <artwork><![CDATA[
                       +-+-+-+-+-+-+-+-+-+
                       | NSF Capability  |
                       | Registration    |
                       +-+-+-+-+^+-+-+-+-+
                                |
          +---------------------+--------------------+
          |                     |                    |
          |                     |                    |
    +-+-+-+-+-+-+       +-+-+-+-+-+-+-+-+      +-+-+-+-+-+-+-+
    |   NSF     |       | NSF Capability|      | NSF Access  |
    |   Name    |       | Information   |      | Information |
    +-+-+-+-+-+-+       +-+-+-+-+-+-+-+-+      +-+-+-+-+-+-+-+ 
            ]]></artwork>
            </figure>

                <section anchor="subsec-nsf-cap-info" title="NSF Capability Information">
                    <t>
                          NSF Capability Information basically describes the security capabilities of an NSF. In <xref target="nsf-profile-overview" />, we show capability objects of an NSF. Following the information model of NSF capabilities defined in <xref target="I-D.ietf-i2nsf-capability-data-model" />, we share the same I2NSF security capabilities: Time Capabilities, Event Capabilities, Condition Capabilities, Action Capabilities, Resolution Strategy Capabilities, Default Action Capabilities, and IPsec Method <xref target="I-D.ietf-i2nsf-sdn-ipsec-flow-protection" />. Also, NSF Capability Information additionally contains the performance capabilities of an NSF as shown in <xref target="nsf-profile-overview" />.
                    </t>
                    <figure anchor="nsf-profile-overview" title="NSF Capability Information">
                    <artwork><![CDATA[
                          +-+-+-+-+-+-+-+-+-+
                          | NSF Capability  |
                          |   Information   |
                          +-+-+-+-^-+-+-+-+-+
                                  |
                                  |
           +----------------------+----------------------+
           |                                             |
           |                                             |
   +-+-+-+-+-+-+-+-+                             +-+-+-+-+-+-+-+-+
   |    I2NSF      |                             |  Performance  |
   | Capabilities  |                             |  Capabilities |
   +-+-+-+-+-+-+-+-+                             +-+-+-+-+-+-+-+-+
           |
    +------+--------------+-----------------+-----------------+-------+
    |                     |                 |                 |       |
+-+-+-+-+-+-+-+   +-+-+-+-+-+-+-+   +-+-+-+-+-+-+-+   +-+-+-+-+-+-+-+ |
|     Time    |   |    Event    |   |  Condition  |   |   Action    | |
| Capabilities|   | Capabilities|   | Capabilities|   | Capabilities| |
+-+-+-+-+-+-+-+   +-+-+-+-+-+-+-+   +-+-+-+-+-+-+-+   +-+-+-+-+-+-+-+ |
                                                                      |
                  +---------------------+---------------------+-------+
                  |                     |                     |
            +-+-+-+-+-+-+-+       +-+-+-+-+-+-+-+       +-+-+-+-+-+-+
            | Resolution  |       |   Default   |       |   IPsec   |
            | Strategy    |       |   Action    |       |   Method  |
            | Capabilities|       | Capabilities|       +-+-+-+-+-+-+
            +-+-+-+-+-+-+-+       +-+-+-+-+-+-+-+
                    ]]></artwork>
                    </figure>

                    <section title="Performance Capabilities">
                        <t>
                            This information represents the processing capability of an NSF. Assuming that the current workload status of each NSF is being collected through NSF monitoring <xref target="I-D.ietf-i2nsf-nsf-monitoring-data-model"/>, this capability information of the NSF can be used to determine whether the NSF is in congestion by comparing it with the current workload of the NSF. Moreover, this information can specify an available amount of each type of resource, such as processing power which are available on the NSF. (The registration interface can control the usages and limitations of the created instance and make the appropriate request according to the status.) As illustrated in <xref target="performance-capability-overview"/>, this information consists of two items: Processing and Bandwidth. Processing information describes the NSF's available processing power. Bandwidth describes the information about available network amount in two cases, outbound, inbound. These two information can be used for the NSF's instance request.
                        </t>

                        <figure anchor="performance-capability-overview" title="Performance Capability Overview">
                        <artwork><![CDATA[
                         +-+-+-+-+-+-+-+-+-+
                         |   Performance   |
                         |   Capabilities  |
                         +-+-+-+-^-+-+-+-+-+
                                 |
                     +----------------------------+
                     |                            |
                     |                            |
             +-+-+-+-+-+-+-+-+            +-+-+-+-+-+-+-+
             |  Processing   |            |  Bandwidth  |
             +-+-+-+-+-+-+-+-+            +-+-+-+-+-+-+-+
                        ]]></artwork>
                        </figure>
                    </section>
                </section>

                <section anchor="subsec-nsf-access-info" title="NSF Access Information">
                    <t>
                        NSF Access Information contains the followings that are required to communicate with an NSF: IPv4 address, IPv6 address, port number, and supported transport protocol(s) (e.g., Virtual Extensible LAN (VXLAN) <xref target="RFC7348" />, Generic Protocol Extension for VXLAN (VXLAN-GPE) <xref target="I-D.ietf-nvo3-vxlan-gpe" />, Generic Route Encapsulation (GRE), Ethernet etc.).
                        In this document, NSF Access Information is used to identify a specific NSF instance (i.e. NSF Access Information is the signature(unique identifier) of an NSF instance in the overall system).
                    </t>
                </section>

        </section>

        <section title="NSF Capability Query">
            <t>
                Security Controller may require some additional capabilities to serve the security service request from an I2NSF user, but none of the registered NSFs has the required capabilities. In this case, Security Controller makes a description of the required capabilities by using the NSF capability information sub-model in <xref target="subsec-nsf-cap-info" />, and sends DMS a query about which NSF(s) can provide these capabilities.
            </t>
        </section>

    </section>
<!-- information model end -->


<!-- Data model start -->
    <section anchor="data-model" title="Data Model">

      <!--        YANG Tree Diagram  start -->
           <section title="YANG Tree Diagram">
                <t>
                    This section provides the YANG Tree diagram of the I2NSF registration interface.
                </t>
                  <!--        define  start -->
                <section title="Definition of Symbols in Tree Diagrams">
                    <t>
                        A simplified graphical representation of the data model is used in this section.  The meaning of the symbols used in the following diagrams <xref target="RFC8431" /> is as follows:
                    </t>
                    <t>
                        <list>
                            <t>
                                Brackets "[" and "]" enclose list keys.
                            </t>
                            <t>
                                Abbreviations before data node names: "rw" means configuration (read-write) and "ro" state data (read-only).
                            </t>
                            <t>
                                Symbols after data node names: "?" means an optional node and "*" denotes a "list" and "leaf-list".
                            </t>
                            <t>
                                Parentheses enclose choice and case nodes, and case nodes are also marked with a colon (":").
                            </t>
                            <t>
                                Ellipsis ("...") stands for contents of subtrees that are not shown.
                            </t>
                        </list>
                    </t>
                </section>
                <!--        define end -->
				  
                <!--       i2nsf  registration interface  -->
                <section title="I2NSF Registration Interface ">
					
                    <figure anchor="yang-tree-i2nsf-reg-interface" title="YANG Tree of I2NSF Registration Interface">
                        <artwork><![CDATA[
        module : ietf-i2nsf-reg-interface
              +--rw nsf-capability-registration
              |  uses nsf-registrations

        rpcs :
              +---x i2nsf-capability-query
              |  uses nsf-capability-query
                        ]]></artwork>
                    </figure>

                    <t>
                      The I2NSF registration interface is used for the following purposes.
                      Developer's Management System (DMS) registers NSFs and their capabilities into Security Controller
                       via the registration interface. In case that Security Controller fails to find any NSF among the registered
                       NSFs which can provide some required capabilities, Security Controller uses the registration interface
                       to query DMS about NSF(s) having the required capabilities.

                      The following sections describe the YANG data models to support these operations.
                    </t>

                    <section title="NSF Capability Registration ">
                        <t>
                            This section expands the i2nsf-nsf-registrations in <xref target="yang-tree-i2nsf-reg-interface" />.
                        </t>

                        <figure anchor="yang-tree-i2nsf-cap-reg" title="YANG Tree of NSF Capability Registration Module">
                            <artwork><![CDATA[
      NSF Capability Registration
       +--rw nsf-registrations
           +--rw nsf-information*  [capability-name]
              +--rw capability-name                       string
              +--rw nsf-capability-info
              |  uses nsf-capability-info
                    +--rw security-capability
                    |  uses ietf-i2nsf-capability
                    +--rw performance-capability
                    |  uses performance-capability
              +--rw nsf-access-info
              |  uses nsf-access-info
                    +--rw capability-name
                    +--rw ip
                    +--rw port
                            ]]></artwork>
                        </figure>

                        <t>
                          When registering an NSF to Security Controller, DMS uses this module to describe what capabilities the NSF can offer.
                           DMS includes the network access information of the NSF which is required to make a network connection with the NSF as
                            well as the capability description of the NSF.
                        </t>
                    </section>

                    <section title="NSF Capability Query">
                        <t>
                            This section expands the nsf-capability-query in <xref target="yang-tree-i2nsf-reg-interface" />.
                        </t>

                        <figure anchor="yang-tree-i2nsf-cap-query" title="YANG Tree of NSF Capability Query Module">
                            <artwork><![CDATA[
      I2NSF Capability Query
        +---x nsf-capability-query
            +---w input
            |  +---w query-nsf-capability
            |  |   uses ietf-i2nsf-capability
            +--ro output
                +--ro nsf-access-info
                |  uses nsf-access-info
                    +--rw capability-name
                    +--rw ip
                    +--rw port
                            ]]></artwork>
                        </figure>

                        <t>
                            Security Controller may require some additional capabilities to provide the security service requested by an I2NSF user,
                             but none of the registered NSFs has the required capabilities. In this case, Security Controller makes a description of
                             the required capabilities using this module and then queries DMS about which NSF(s) can provide these capabilities.
                            Use NETCONF RPCs to send a NSF capability query. Input data is query-i2nsf-capability-info and output data is nsf-access-info.
                            In <xref target="yang-tree-i2nsf-cap-query" />, the ietf-i2nsf-capability refers to the module defined in <xref target="I-D.ietf-i2nsf-capability-data-model" />.
                        </t>

                    </section>

                </section>
                  <!--  i2nsf registration interface   end -->

                    <!--    NSF capability information start -->
                <section title="NSF Capability Information">
                    <t>
                        This section expands the nsf-capability-info in <xref target="yang-tree-i2nsf-cap-reg" /> and <xref target="yang-tree-i2nsf-cap-query" />.
                    </t>
                    <figure anchor="yang-tree-i2nsf-nsf-capability-information" title="YANG Tree of I2NSF NSF Capability Information">
                        <artwork><![CDATA[
      NSF Capability Information
        +--rw nsf-capability-info
          +--rw security-capability
          |  uses ietf-i2nsf-capability
          +--rw performance-capability
          |  uses nsf-performance-capability
                        ]]></artwork>
                    </figure>

                    <t>
                        In <xref target="yang-tree-i2nsf-nsf-capability-information" />, the ietf-i2nsf-capability refers to the module defined in <xref target="I-D.ietf-i2nsf-capability-data-model" />. The performance-capability is used to specify the performance capability of an NSF.
                    </t>


                <section title="NSF Performance Capability">
                    <t>
                        This section expands the nsf-performance-capability in <xref target="yang-tree-i2nsf-nsf-capability-information" />.
                    </t>

                    <figure anchor="yang-tree-i2nsf-nsf-performance-caps" title="YANG Tree of I2NSF NSF Performance Capability">
                          <artwork><![CDATA[
      NSF Performance Capability
        +--rw nsf-performance-capability
         +--rw processing
         |   +--rw processing-average  uint16
         |   +--rw processing-peak     uint16
         +--rw bandwidth
         |   +--rw outbound
         |   |  +--rw outbound-average  uint16
         |   |  +--rw outbound-peak     uint16
         |   +--rw inbound
         |   |  +--rw inbound-average   uint16
         |   |  +--rw inbound-peak      uint16
                        ]]></artwork>
                    </figure>

                    <t>
                        This module is used to specify the performance capabilities of an NSF when registering or initiating the NSF.
                    </t>
                </section>
                </section>
    <!--    NSF capability information end -->

        <!--    NSF access information start -->
                <section title="NSF Access Information">
                    <t>
                        This section expands the nsf-access-info in <xref target="yang-tree-i2nsf-cap-reg" />.
                    </t>

                    <figure anchor="yang-tree-i2nsf-nsf-info" title="YANG Tree of I2NSF NSF Access Informantion">
                        <artwork><![CDATA[
      NSF Access Information
        +--rw nsf-access-info
          +--rw capability-name      string
          +--rw ip      inet:ip-address
          +--rw port    inet:port-number
                        ]]></artwork>
                    </figure>

                    <t>
                        This module contains the network access information of an NSF that is required to enable network communications with the NSF.
						The field of ip can have either an IPv4 address or an IPv6 address.
                    </t>
                </section>
<!--    NSF access information end -->


            </section>
  <!-- YANG Tree Diagram  end -->

  <!-- YANG Data Modules  start  -->
                <section title="YANG Data Modules">
                    <t>
                    This section provides a YANG module of the data model for the registration interface between Security Controller and Developer's Management System, as defined in <xref target="info-model" />.
                    </t>
					
					<t>
					This YANG module imports from <xref target="RFC6991" />, and makes a reference
                    to <xref target="I-D.ietf-i2nsf-capability-data-model" />.
					</t>
         <figure anchor="ietf-i2nsf-reg-interface" title="Registration Interface YANG Data Model">
        <artwork><![CDATA[
  <CODE BEGINS> file "ietf-i2nsf-reg-interface@2020-08-29.yang"

    module ietf-i2nsf-reg-interface {
     yang-version 1.1;

     namespace "urn:ietf:params:xml:ns:yang:ietf-i2nsf-reg-interface";

     prefix nsfreg;

  // RFC Ed.: replace occurences of XXXX with actual RFC number and
  // remove this note
  
     import ietf-inet-types {
      prefix inet;
      reference "RFC 6991";
     }
     import ietf-i2nsf-capability {
      prefix cap;
   // RFC Ed.: replace YYYY with actual RFC number of
   // draft-ietf-i2nsf-capability-data-model and remove this note.
      reference "RFC YYYY: I2NSF Capability YANG Data Model";
     }

     organization
      "IETF I2NSF (Interface to Network Security Functions)
       Working Group";

     contact
      "WG Web: <http://tools.ietf.org/wg/i2nsf>
       WG List: <mailto:i2nsf@ietf.org>

       Editor: Sangwon Hyun
       <mailto:shyun@mju.ac.kr>
	   
       Editor: Jaehoon Paul Jeong
       <mailto:pauljeong@skku.edu>";

     description
      "This module defines a YANG data model for I2NSF 
       Registration Interface.

       Copyright (c) 2020 IETF Trust and the persons
       identified as authors of the code. All rights reserved.

       Redistribution and use in source and binary forms, with or
       without modification, is permitted pursuant to, and subject
       to the license terms contained in, the Simplified BSD License
       set forth in Section 4.c of the IETF Trust's Legal Provisions
       Relating to IETF Documents
       (http://trustee.ietf.org/license-info).

       This version of this YANG module is part of RFC XXXX; see
       the RFC itself for full legal notices.";

    // RFC Ed.: replace XXXX with actual RFC number and remove
    // this note

     revision "2020-08-29" {
      description "Initial revision";
      reference
       "RFC XXXX: I2NSF Registration Interface YANG Data Model";
    // RFC Ed.: replace XXXX with actual RFC number and remove
    // this note	   
     }

     grouping nsf-performance-capability {
      description
       "Description of the performance capabilities of an NSF";
      
      container processing {
       description
        "Processing power of an NSF in the unit of GHz (gigahertz)";
      
       leaf processing-average {
        type uint16;
        units "GHz";
        description
         "Average processing power";
       }
       leaf processing-peak {
        type uint16;
        units "GHz";		
        description
         "Peak processing power";
       }
      }
      container bandwidth {
       description
        "Network bandwidth available on an NSF
         in the unit of Mbps (megabits per second)";
      
       container outbound {
        description
         "Outbound network bandwidth";
        leaf outbound-average {
         type uint32;
         units "Mbps";
         description
          "Average outbound bandwidth";
        }
        leaf outbound-peak {
         type uint32;
         units "Mbps";
         description
          "Peak outbound bandwidth";
        }
       }
       container inbound {
        description
         "Inbound network bandwidth";
        leaf inbound-average {
         type uint32;
         units "Mbps";
         description
          "Average inbound bandwidth";
        }
        leaf inbound-peak {
         type uint32;
         units "Mbps";
         description
          "Peak inbound bandwidth";
        }
       }
      }
     }
     
     grouping nsf-capability-info {
      description
       "Capability description of an NSF";
      container security-capability {
       description
        "Description of the security capabilities of an NSF";
       uses cap:nsf-capabilities;
    // RFC Ed.: replace YYYY with actual RFC number of
    // draft-ietf-i2nsf-capability-data-model and remove this note.
       reference "RFC YYYY: I2NSF Capability YANG Data Model";
      }
      container performance-capability {
       description
        "Description of the performance capabilities of an NSF";
       uses nsf-performance-capability;
      }
     }

     grouping nsf-access-info {
      description
       "Information required to access an NSF";
      leaf capability-name {
       type string;
       description
         "Unique name of this NSF's capability";
      }
      leaf ip {
       type inet:ip-address;
       description
        "Either an IPv4 address or an IPv6 address of this NSF";
      }
      leaf port {
       type inet:port-number;
       description
        "Port available on this NSF";
      }
     }

     container nsf-registrations {
      description
       "Information of an NSF that DMS registers
        to Security Controller";
      list nsf-information {
       key "capability-name";
       description
        "Required information for registration";
       leaf capability-name {
        type string;
        mandatory true;
        description
         "Unique name of this registered NSF";
       }
       container nsf-capability-info {
        description
         "Capability description of this NSF";
        uses nsf-capability-info;
       }
       container nsf-access-info {
        description
         "Network access information of this NSF";
        uses nsf-access-info;
       }
      }
     }
     
     rpc nsf-capability-query {
      description
       "Description of the capabilities that the
        Security Controller requests to the DMS";
      input {
       container query-nsf-capability {
        description
         "Description of the capabilities to request";
        uses cap:nsf-capabilities;
     // RFC Ed.: replace YYYY with actual RFC number of
     // draft-ietf-i2nsf-capability-data-model and remove this note.
        reference "RFC YYYY: I2NSF Capability YANG Data Model";
        }
      }
      output {
       container nsf-access-info {
        description
         "Network access information of an NSF
          with the requested capabilities";
        uses nsf-access-info;
       }
      }
     }
    }
 <CODE ENDS>
          ]]></artwork>
        </figure>

</section>
<!-- YANG Data Modules  end  -->

</section>
<!-- Data model end -->

    <section anchor="IANA" title="IANA Considerations">
        <t>This document requests IANA to register the following URI in the
           "IETF XML Registry" <xref target="RFC3688" />:
		    <figure>
			    <artwork><![CDATA[
URI: urn:ietf:params:xml:ns:yang:ietf-i2nsf-reg-interface
Registrant Contact: The IESG.
XML: N/A; the requested URI is an XML namespace.
			]]>
			    </artwork>
		    </figure>
		    This document requests IANA to register the following YANG
		    module in the "YANG Module Names" registry 
			<xref target="RFC7950" /><xref target="RFC8525" />:
		    <figure>
			    <artwork><![CDATA[
Name: ietf-i2nsf-reg-interface
Namespace: urn:ietf:params:xml:ns:yang:ietf-i2nsf-reg-interface
Prefix: nsfreg
Reference: RFC XXXX

// RFC Ed.: replace XXXX with actual RFC number and remove
// this note
			]]>
			    </artwork>
		    </figure>
	    </t>
    </section>

    <section title="Security Considerations">
        <t>
            The YANG module specified in this document defines a data schema designed to be accessed through network management protocols such as NETCONF <xref target = "RFC6241" /> or RESTCONF <xref target = "RFC8040" />. The lowest NETCONF layer is the secure transport layer, and the required secure transport is Secure Shell (SSH) <xref target = "RFC6242" />. The lowest RESTCONF layer is HTTPS, and the required secure transport is TLS <xref target = "RFC8446" />.
        </t>

        <t>
            The NETCONF access control model <xref target = "RFC8341" /> provides a means of restricting access to specific NETCONF or RESTCONF users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.
        </t>

        <t>
        	There are a number of data nodes defined in this YANG module that are writable/creatable/deletable (i.e., config true, which is the default). These data nodes may be considered sensitive or vulnerable in some network environments. Write operations (e.g., edit-config) to these data nodes without proper protection can have a negative effect on network operations. These are the subtrees and data nodes and their sensitivity/vulnerability:

        	<list style="symbols">
            	<t>
             		nsf-registrations: The attacker may exploit this to register a compromised or malicious NSF instead of a legitimate NSF with the Security Controller.
                </t>

                <t>
             		nsf-performance-capability: The attacker may provide incorrect information of the performance capability of any target NSF by illegally modifying this.
                </t>

                <t>
             		nsf-capability-info: The attacker may provide incorrect information of the security capability of any target NSF by illegally modifying this.
                </t>

                <t>
             		nsf-access-info: The attacker may provide incorrect network access information of any target NSF by illegally modifying this.
                </t>
        	</list>
        </t>

        <t>
        	Some of the readable data nodes in this YANG module may be considered sensitive or vulnerable in some network environments. It is thus important to control read access (e.g., via get, get-config, or notification) to these data nodes. These are the subtrees and data nodes and their sensitivity/vulnerability:

        	<list style="symbols">
            	<t>
             		nsf-registrations: The attacker may try to gather some sensitive information of a registered NSF by sniffing this.
                </t>

                <t>
             		nsf-performance-capability: The attacker may gather the performance capability information of any target NSF and misuse the information for subsequent attacks.
                </t>

                <t>
             		nsf-capability-info: The attacker may gather the security capability information of any target NSF and misuse the information for subsequent attacks.
                </t>

                <t>
             		nsf-access-info: The attacker may gather the network access information of any target NSF and misuse the information for subsequent attacks.
                </t>
        	</list>
        </t>

        <t>
        	The RPC operation in this YANG module may be considered sensitive or vulnerable in some network environments. It is thus important to control access to this operation. The following is the operation and its sensitivity/vulnerability:

        	<list style="symbols">
            	<t>
             		nsf-capability-query: The attacker may exploit this RPC operation to deteriorate the availability of the DMS and/or gather the information of some interested NSFs from the DMS.
                </t>
        	</list>
        </t>

        <t>
        </t>

        <t>
        </t>
    </section>

</middle>

<back>

<references title="Normative References">

    <?rfc include="reference.RFC.2119"?>
	<?rfc include="reference.RFC.3688"?>
	<?rfc include="reference.RFC.3849"?>
	<?rfc include="reference.RFC.5737"?>
    <?rfc include="reference.RFC.6087"?>    
    <?rfc include="reference.RFC.6241"?>
    <?rfc include="reference.RFC.6242"?>
	<?rfc include="reference.RFC.6991"?>
    <?rfc include="reference.RFC.7348"?>
	<?rfc include="reference.RFC.7950"?>
    <?rfc include="reference.RFC.8040"?>
	<?rfc include="reference.RFC.8174"?>
    <?rfc include="reference.RFC.8329"?>	
	<?rfc include="reference.RFC.8340"?>
    <?rfc include="reference.RFC.8341"?>
	<?rfc include="reference.RFC.8407"?>
	<?rfc include="reference.RFC.8431"?>
    <?rfc include="reference.RFC.8446"?>
	<?rfc include="reference.RFC.8525"?>
    <?rfc include='reference.I-D.ietf-i2nsf-capability-data-model'?>

</references>

<references title="Informative References">

    <?rfc include='reference.I-D.ietf-i2nsf-nsf-monitoring-data-model'?>
	<?rfc include='reference.I-D.ietf-i2nsf-sdn-ipsec-flow-protection'?>
    <?rfc include='reference.I-D.ietf-nvo3-vxlan-gpe'?>  

    <reference anchor="nfv-framework">
        <front>
            <title>Network Functions Virtualisation (NFV); Architectureal Framework</title>
            <author initials="ETSI NFV ISG" />
            <date month="October" year="2013" />
        </front>
        <seriesInfo name="ETSI GS NFV 002" value="ETSI GS NFV 002 V1.1.1" />
    </reference>

</references>


<section title="XML Examples of I2NSF Registration Interface Data Model">
<t>
  This section describes XML examples of the I2NSF Registration Interface data model under the assumption of registering several types of NSFs and querying NSF capability.
</t>
<section title="Example 1: Registration for the Capabilities of a General Firewall ">
  <t>This section shows an XML example for registering the capabilities of a general firewall
     in either IPv4 networks <xref target="RFC5737" /> or IPv6 networks <xref target="RFC3849" />.
  </t>

      <figure anchor="i2nsf-reg-example1-IPv4" title="Configuration XML for Registration of a General Firewall in an IPv4 Network">
        <artwork><![CDATA[
<nsf-registrations
  xmlns="urn:ietf:params:xml:ns:yang:ietf-i2nsf-reg-interface"
  xmlns:cap="urn:ietf:params:xml:ns:yang:ietf-i2nsf-capability">
  <nsf-information>
    <capability-name>general_firewall_capability</capability-name>
    <nsf-capability-info>
      <security-capability>
        <condition-capabilities>
          <generic-nsf-capabilities>
            <ipv4-capability>cap:ipv4-protocol</ipv4-capability>
            <ipv4-capability>cap:exact-ipv4-address</ipv4-capability>
            <ipv4-capability>cap:range-ipv4-address</ipv4-capability>
            <tcp-capability>cap:exact-tcp-port-num</tcp-capability>
            <tcp-capability>cap:range-tcp-port-num</tcp-capability>
          </generic-nsf-capabilities>
        </condition-capabilities>
        <action-capabilities>
          <ingress-action-capability>cap:pass</ingress-action-capability>
          <ingress-action-capability>cap:drop</ingress-action-capability>
          <ingress-action-capability>cap:alert</ingress-action-capability>
          <egress-action-capability>cap:pass</egress-action-capability>
          <egress-action-capability>cap:drop</egress-action-capability>
          <egress-action-capability>cap:alert</egress-action-capability>
        </action-capabilities>
        <ipsec-method>cap:ikeless</ipsec-method>
      </security-capability>
      <performance-capability>
        <processing>
          <processing-average>1000</processing-average>
          <processing-peak>5000</processing-peak>
        </processing>
        <bandwidth>
          <outbound>
            <outbound-average>1000</outbound-average>
            <outbound-peak>5000</outbound-peak>
          </outbound>
          <inbound>
            <inbound-average>1000</inbound-average>
            <inbound-peak>5000</inbound-peak>
          </inbound>
        </bandwidth>
      </performance-capability>
    </nsf-capability-info>
    <nsf-access-info>
      <capability-name>general_firewall</capability-name>
      <ip>192.0.2.11</ip>
      <port>3000</port>
    </nsf-access-info>
  </nsf-information>
</nsf-registrations>
            ]]></artwork>
            </figure>

            <t>
            <xref target="i2nsf-reg-example1-IPv4" /> shows the configuration XML for registering a general firewall in an IPv4 network <xref target="RFC5737" /> and its capabilities as follows.
            </t>

              <t>
              <list style="numbers">
                <t>
                  The instance name of the NSF is general_firewall.
                </t>
                <t>
                  The NSF can inspect a protocol, an exact IPv4 address, and a range of IPv4 addresses for IPv4 packets.
                </t>
                <t>
                  The NSF can inspect an exact port number and a range of port numbers for TCP packets.
                </t>
                <t>
                  The NSF can determine whether the packets are allowed to pass, drop, or alert.
                </t>
                <t>
                  The NSF can support IPsec not through IKEv2, but through a Security Controller <xref target="I-D.ietf-i2nsf-sdn-ipsec-flow-protection" />.
                </t>
                <t>
                  The NSF can have processing power and bandwidth.
                </t>
                <t>
                  The IPv4 address of the NSF is 192.0.2.11.
                </t>
                <t>
                  The port of the NSF is 3000.
                </t>
              </list>
              </t>


      <figure anchor="i2nsf-reg-example1-IPv6" title="Configuration XML for Registration of a General Firewall in an IPv6 Network">
        <artwork><![CDATA[
<nsf-registrations
  xmlns="urn:ietf:params:xml:ns:yang:ietf-i2nsf-reg-interface"
  xmlns:cap="urn:ietf:params:xml:ns:yang:ietf-i2nsf-capability">
  <nsf-information>
    <capability-name>general_firewall_capability</capability-name>
    <nsf-capability-info>
      <security-capability>
        <condition-capabilities>
          <generic-nsf-capabilities>
            <ipv6-capability>cap:ipv6-protocol</ipv6-capability>
            <ipv6-capability>cap:exact-ipv6-address</ipv6-capability>
            <ipv6-capability>cap:range-ipv6-address</ipv6-capability>
            <tcp-capability>cap:exact-tcp-port-num</tcp-capability>
            <tcp-capability>cap:range-tcp-port-num</tcp-capability>
          </generic-nsf-capabilities>
        </condition-capabilities>
        <action-capabilities>
          <ingress-action-capability>cap:pass</ingress-action-capability>
          <ingress-action-capability>cap:drop</ingress-action-capability>
          <ingress-action-capability>cap:alert</ingress-action-capability>
          <egress-action-capability>cap:pass</egress-action-capability>
          <egress-action-capability>cap:drop</egress-action-capability>
          <egress-action-capability>cap:alert</egress-action-capability>
        </action-capabilities>
        <ipsec-method>cap:ikeless</ipsec-method>
      </security-capability>
      <performance-capability>
        <processing>
          <processing-average>1000</processing-average>
          <processing-peak>5000</processing-peak>
        </processing>
        <bandwidth>
          <outbound>
            <outbound-average>1000</outbound-average>
            <outbound-peak>5000</outbound-peak>
          </outbound>
          <inbound>
            <inbound-average>1000</inbound-average>
            <inbound-peak>5000</inbound-peak>
          </inbound>
        </bandwidth>
      </performance-capability>
    </nsf-capability-info>
    <nsf-access-info>
      <capability-name>general_firewall</capability-name>
      <ip>2001:DB8:0:1::11</ip>
      <port>3000</port>
    </nsf-access-info>
  </nsf-information>
</nsf-registrations>
            ]]></artwork>
            </figure>

            <t>
            In addition, <xref target="i2nsf-reg-example1-IPv6" /> shows the configuration XML for registering a general firewall in an IPv6 network <xref target="RFC3849" /> and its capabilities as follows.
            </t>

              <t>
              <list style="numbers">
                <t>
                  The instance name of the NSF is general_firewall.
                </t>
                <t>
                  The NSF can inspect a protocol, an exact IPv6 address, and a range of IPv6 addresses for IPv6 packets.
                </t>
                <t>
                  The NSF can inspect an exact port number and a range of port numbers for TCP packets.
                </t>
                <t>
                  The NSF can determine whether the packets are allowed to pass, drop, or alert.
                </t>
                <t>
                  The NSF can support IPsec not through IKEv2, but through a Security Controller <xref target="I-D.ietf-i2nsf-sdn-ipsec-flow-protection" />.
                </t>
                <t>
                  The NSF can have processing power and bandwidth.
                </t>
                <t>
                  The IPv6 address of the NSF is 2001:DB8:0:1::11.
                </t>
                <t>
                  The port of the NSF is 3000.
                </t>
              </list>
              </t>

</section>

  <section title="Example 2: Registration for the Capabilities of a Time-based Firewall ">
    <t>This section shows an XML example for registering the capabilities of a time-based firewall
	in either IPv4 networks <xref target="RFC5737" /> or IPv6 networks <xref target="RFC3849" />.
    </t>

    <figure anchor="i2nsf-reg-example2-IPv4" title="Configuration XML for Registration of a Time-based Firewall in an IPv4 Network">
      <artwork><![CDATA[
<nsf-registrations
  xmlns="urn:ietf:params:xml:ns:yang:ietf-i2nsf-reg-interface"
  xmlns:cap="urn:ietf:params:xml:ns:yang:ietf-i2nsf-capability">
  <nsf-information>
    <capability-name>time_based_firewall_capability</capability-name>
    <nsf-capability-info>
      <security-capability>
        <time-capabilities>absolute-time</time-capabilities>
        <time-capabilities>periodic-time</time-capabilities>		
        <condition-capabilities>
          <generic-nsf-capabilities>
            <ipv4-capability>cap:ipv4-protocol</ipv4-capability>
            <ipv4-capability>cap:exact-ipv4-address</ipv4-capability>
            <ipv4-capability>cap:range-ipv4-address</ipv4-capability>
            <tcp-capability>cap:exact-tcp-port-num</tcp-capability>
            <tcp-capability>cap:range-tcp-port-num</tcp-capability>
          </generic-nsf-capabilities>
        </condition-capabilities>
        <action-capabilities>
          <ingress-action-capability>cap:pass</ingress-action-capability>
          <ingress-action-capability>cap:drop</ingress-action-capability>
          <ingress-action-capability>cap:alert</ingress-action-capability>
          <egress-action-capability>cap:pass</egress-action-capability>
          <egress-action-capability>cap:drop</egress-action-capability>
          <egress-action-capability>cap:alert</egress-action-capability>
        </action-capabilities>
        <ipsec-method>cap:ike</ipsec-method>
      </security-capability>
      <performance-capability>
        <processing>
          <processing-average>1000</processing-average>
          <processing-peak>5000</processing-peak>
        </processing>
        <bandwidth>
          <outbound>
            <outbound-average>1000</outbound-average>
            <outbound-peak>5000</outbound-peak>
          </outbound>
          <inbound>
            <inbound-average>1000</inbound-average>
            <inbound-peak>5000</inbound-peak>
          </inbound>
        </bandwidth>
      </performance-capability>
    </nsf-capability-info>
    <nsf-access-info>
      <capability-name>time_based_firewall</capability-name>
      <ip>192.0.2.11</ip>
      <port>3000</port>
    </nsf-access-info>
  </nsf-information>
</nsf-registrations>	  
          ]]></artwork>
          </figure>

          <t>
          <xref target="i2nsf-reg-example2-IPv4" /> shows the configuration XML for registering a time-based firewall in an IPv4 network <xref target="RFC5737" /> and its capabilities as follows.
          </t>

            <t>
            <list style="numbers">
              <t>
                The instance name of the NSF is time_based_firewall.
              </t>
              <t>
                The NSF can enforce the security policy rule according to absolute time and periodic time.
              </t>
              <t>
                The NSF can inspect a protocol, an exact IPv4 address, and a range of IPv4 addresses for IPv4 packets.
              </t>
              <t>
                The NSF can determine whether the packets are allowed to pass, drop, or alert.
              </t>
              <t>
                The NSF can support IPsec through IKEv2 <xref target="I-D.ietf-i2nsf-sdn-ipsec-flow-protection" />.
              </t>
              <t>
                The NSF can have processing power and bandwidth.
              </t>
              <t>
                The IPv4 address of the NSF is 192.0.2.11.
              </t>
              <t>
                The port of the NSF is 3000.
              </t>
            </list>
            </t>

    <figure anchor="i2nsf-reg-example2-IPv6" title="Configuration XML for Registration of a Time-based Firewall in an IPv6 Network">
      <artwork><![CDATA[
<nsf-registrations
  xmlns="urn:ietf:params:xml:ns:yang:ietf-i2nsf-reg-interface"
  xmlns:cap="urn:ietf:params:xml:ns:yang:ietf-i2nsf-capability">
  <nsf-information>
    <capability-name>time_based_firewall_capability</capability-name>
    <nsf-capability-info>
      <security-capability>
        <time-capabilities>absolute-time</time-capabilities>
        <time-capabilities>periodic-time</time-capabilities>		
        <condition-capabilities>
          <generic-nsf-capabilities>
            <ipv6-capability>cap:ipv6-protocol</ipv6-capability>
            <ipv6-capability>cap:exact-ipv6-address</ipv6-capability>
            <ipv6-capability>cap:range-ipv6-address</ipv6-capability>
            <tcp-capability>cap:exact-tcp-port-num</tcp-capability>
            <tcp-capability>cap:range-tcp-port-num</tcp-capability>
          </generic-nsf-capabilities>
        </condition-capabilities>
        <action-capabilities>
          <ingress-action-capability>cap:pass</ingress-action-capability>
          <ingress-action-capability>cap:drop</ingress-action-capability>
          <ingress-action-capability>cap:alert</ingress-action-capability>
          <egress-action-capability>cap:pass</egress-action-capability>
          <egress-action-capability>cap:drop</egress-action-capability>
          <egress-action-capability>cap:alert</egress-action-capability>
        </action-capabilities>
        <ipsec-method>cap:ike</ipsec-method>
      </security-capability>
      <performance-capability>
        <processing>
          <processing-average>1000</processing-average>
          <processing-peak>5000</processing-peak>
        </processing>
        <bandwidth>
          <outbound>
            <outbound-average>1000</outbound-average>
            <outbound-peak>5000</outbound-peak>
          </outbound>
          <inbound>
            <inbound-average>1000</inbound-average>
            <inbound-peak>5000</inbound-peak>
          </inbound>
        </bandwidth>
      </performance-capability>
    </nsf-capability-info>
    <nsf-access-info>
      <capability-name>time_based_firewall</capability-name>
      <ip>2001:DB8:0:1::11</ip>
      <port>3000</port>
    </nsf-access-info>
  </nsf-information>
</nsf-registrations>	  
          ]]></artwork>
          </figure>

          <t>
          In addition, <xref target="i2nsf-reg-example2-IPv6" /> shows the configuration XML for registering a time-based firewall in an IPv6 network <xref target="RFC3849" /> and its capabilities as follows.
          </t>

            <t>
            <list style="numbers">
              <t>
                The instance name of the NSF is time_based_firewall.
              </t>
              <t>
                The NSF can enforce the security policy rule according to absolute time and periodic time.
              </t>
              <t>
                The NSF can inspect a protocol, an exact IPv6 address, and a range of IPv6 addresses for IPv6 packets.
              </t>
              <t>
                The NSF can determine whether the packets are allowed to pass, drop, or alert.
              </t>
                <t>
                  The NSF can support IPsec through IKEv2 <xref target="I-D.ietf-i2nsf-sdn-ipsec-flow-protection" />.
                </t>
              <t>
                The NSF can have processing power and bandwidth.
              </t>
              <t>
                The IPv6 address of the NSF is 2001:DB8:0:1::11.
              </t>
              <t>
                The port of the NSF is 3000.
              </t>
            </list>
            </t>

  </section>

  <section title="Example 3: Registration for the Capabilities of a Web Filter ">
    <t>
        This section shows an XML example for registering the capabilities of a web filter
		in either IPv4 networks <xref target="RFC5737" /> or IPv6 networks <xref target="RFC3849" />.
    </t>

    <figure anchor="i2nsf-reg-example3-IPv4" title="Configuration XML for Registration of a Web Filter in an IPv4 Network">
      <artwork><![CDATA[
<nsf-registrations
  xmlns="urn:ietf:params:xml:ns:yang:ietf-i2nsf-reg-interface"
  xmlns:cap="urn:ietf:params:xml:ns:yang:ietf-i2nsf-capability">
  <nsf-information>
    <capability-name>web_filter</capability-name>
    <nsf-capability-info>
      <security-capability>
        <condition-capabilities>
          <advanced-nsf-capabilities>
            <url-capability>cap:user-defined</url-capability>
          </advanced-nsf-capabilities>
        </condition-capabilities>
        <action-capabilities>
          <ingress-action-capability>cap:pass</ingress-action-capability>
          <ingress-action-capability>cap:drop</ingress-action-capability>
          <ingress-action-capability>cap:alert</ingress-action-capability>
          <egress-action-capability>cap:pass</egress-action-capability>
          <egress-action-capability>cap:drop</egress-action-capability>
          <egress-action-capability>cap:alert</egress-action-capability>
        </action-capabilities>
        <ipsec-method>cap:ikeless</ipsec-method>
      </security-capability>
      <performance-capability>
        <processing>
          <processing-average>1000</processing-average>
          <processing-peak>5000</processing-peak>
        </processing>
        <bandwidth>
          <outbound>
            <outbound-average>1000</outbound-average>
            <outbound-peak>5000</outbound-peak>
          </outbound>
          <inbound>
            <inbound-average>1000</inbound-average>
            <inbound-peak>5000</inbound-peak>
          </inbound>
        </bandwidth>
      </performance-capability>
    </nsf-capability-info>
    <nsf-access-info>
      <capability-name>web_filter</capability-name>
      <ip>192.0.2.11</ip>
      <port>3000</port>
    </nsf-access-info>
  </nsf-information>
</nsf-registrations>
          ]]></artwork>
          </figure>

          <t>
          <xref target="i2nsf-reg-example3-IPv4" /> shows the configuration XML for registering a web filter in an IPv4 network <xref target="RFC5737" /> and its capabilities are as follows.
          </t>

            <t>
            <list style="numbers">
              <t>
                The instance name of the NSF is web_filter.
              </t>
              <t>
                The NSF can inspect URL for HTTP and HTTPS packets.
              </t>
              <t>
                The NSF can determine whether the packets are allowed to pass, drop, or alert.
              </t>
              <t>
                  The NSF can support IPsec not through IKEv2, but through a Security Controller <xref target="I-D.ietf-i2nsf-sdn-ipsec-flow-protection" />.
                </t>
              <t>
                The NSF can have processing power and bandwidth.
              </t>
              <t>
                The IPv4 address of the NSF is 192.0.2.11.
              </t>
              <t>
                The port of the NSF is 3000.
              </t>
            </list>
            </t>

    <figure anchor="i2nsf-reg-example3-IPv6" title="Configuration XML for Registration of a Web Filter in an IPv6 Network">
      <artwork><![CDATA[
<nsf-registrations
  xmlns="urn:ietf:params:xml:ns:yang:ietf-i2nsf-reg-interface"
  xmlns:cap="urn:ietf:params:xml:ns:yang:ietf-i2nsf-capability">
  <nsf-information>
    <capability-name>web_filter</capability-name>
    <nsf-capability-info>
      <security-capability>
        <condition-capabilities>
          <advanced-nsf-capabilities>
            <url-capability>cap:user-defined</url-capability>
          </advanced-nsf-capabilities>
        </condition-capabilities>
        <action-capabilities>
          <ingress-action-capability>cap:pass</ingress-action-capability>
          <ingress-action-capability>cap:drop</ingress-action-capability>
          <ingress-action-capability>cap:alert</ingress-action-capability>
          <egress-action-capability>cap:pass</egress-action-capability>
          <egress-action-capability>cap:drop</egress-action-capability>
          <egress-action-capability>cap:alert</egress-action-capability>
        </action-capabilities>
        <ipsec-method>cap:ikeless</ipsec-method>
      </security-capability>
      <performance-capability>
        <processing>
          <processing-average>1000</processing-average>
          <processing-peak>5000</processing-peak>
        </processing>
        <bandwidth>
          <outbound>
            <outbound-average>1000</outbound-average>
            <outbound-peak>5000</outbound-peak>
          </outbound>
          <inbound>
            <inbound-average>1000</inbound-average>
            <inbound-peak>5000</inbound-peak>
          </inbound>
        </bandwidth>
      </performance-capability>
    </nsf-capability-info>
    <nsf-access-info>
      <capability-name>web_filter</capability-name>
      <ip>2001:DB8:0:1::11</ip>
      <port>3000</port>
    </nsf-access-info>
  </nsf-information>
</nsf-registrations>
          ]]></artwork>
          </figure>

          <t>
          In addition, <xref target="i2nsf-reg-example3-IPv6" /> shows the configuration XML for registering a web filter in an IPv6 network <xref target="RFC3849" /> and its capabilities are as follows.
          </t>

            <t>
            <list style="numbers">
              <t>
                The instance name of the NSF is web_filter.
              </t>
              <t>
                The NSF can inspect URL for HTTP and HTTPS packets.
              </t>
              <t>
                The NSF can determine whether the packets are allowed to pass, drop, or alert.
              </t>
              <t>
                  The NSF can support IPsec not through IKEv2, but through a Security Controller <xref target="I-D.ietf-i2nsf-sdn-ipsec-flow-protection" />.
                </t>
              <t>
                The NSF can have processing power and bandwidth.
              </t>
              <t>
                The IPv6 address of the NSF is 2001:DB8:0:1::11.
              </t>
              <t>
                The port of the NSF is 3000.
              </t>
            </list>
            </t>
  </section>

  <section title="Example 4: Registration for the Capabilities of a VoIP/VoLTE Filter ">
    <t>This section shows an XML example for registering the capabilities of a VoIP/VoLTE filter
	in either IPv4 networks <xref target="RFC5737" /> or IPv6 networks <xref target="RFC3849" />.
    </t>
    <figure anchor="i2nsf-reg-example4-IPv4" title="Configuration XML for Registration of a VoIP/VoLTE Filter in an IPv4 Network">
      <artwork><![CDATA[
<nsf-registrations
  xmlns="urn:ietf:params:xml:ns:yang:ietf-i2nsf-reg-interface"
  xmlns:cap="urn:ietf:params:xml:ns:yang:ietf-i2nsf-capability">
  <nsf-information>
    <capability-name>voip_volte_filter</capability-name>
    <nsf-capability-info>
      <security-capability>
        <condition-capabilities>
          <advanced-nsf-capabilities>
            <voip-volte-capability>cap:voice-id</voip-volte-capability>
          </advanced-nsf-capabilities>
        </condition-capabilities>
        <action-capabilities>
          <ingress-action-capability>cap:pass</ingress-action-capability>
          <ingress-action-capability>cap:drop</ingress-action-capability>
          <ingress-action-capability>cap:alert</ingress-action-capability>
          <egress-action-capability>cap:pass</egress-action-capability>
          <egress-action-capability>cap:drop</egress-action-capability>
          <egress-action-capability>cap:alert</egress-action-capability>
        </action-capabilities>
        <ipsec-method>cap:ikeless</ipsec-method>
      </security-capability>
      <performance-capability>
        <processing>
          <processing-average>1000</processing-average>
          <processing-peak>5000</processing-peak>
        </processing>
        <bandwidth>
          <outbound>
            <outbound-average>1000</outbound-average>
            <outbound-peak>5000</outbound-peak>
          </outbound>
          <inbound>
            <inbound-average>1000</inbound-average>
            <inbound-peak>5000</inbound-peak>
          </inbound>
        </bandwidth>
      </performance-capability>
    </nsf-capability-info>
    <nsf-access-info>
      <capability-name>voip_volte_filter</capability-name>
      <ip>192.0.2.11</ip>
      <port>3000</port>
    </nsf-access-info>
  </nsf-information>
</nsf-registrations>
          ]]></artwork>
          </figure>

          <t>
          <xref target="i2nsf-reg-example4-IPv4" /> shows the configuration XML for registering a VoIP/VoLTE filter in an IPv4 network <xref target="RFC5737" /> and its capabilities are as follows.
          </t>

            <t>
            <list style="numbers">
              <t>
                The instance name of the NSF is voip_volte_filter.
              </t>
              <t>
                The NSF can inspect a voice id for VoIP/VoLTE packets.
              </t>
              <t>
                The NSF can determine whether the packets are allowed to pass, drop, or alert.
              </t>
              <t>
                The NSF can support IPsec not through IKEv2, but through a Security Controller <xref target="I-D.ietf-i2nsf-sdn-ipsec-flow-protection" />.
              </t>
              <t>
                The NSF can have processing power and bandwidth.
              </t>
              <t>
                The IPv4 address of the NSF is 192.0.2.11.
              </t>
              <t>
                The port of the NSF is 3000.
              </t>
            </list>
            </t>

    <figure anchor="i2nsf-reg-example4-IPv6" title="Configuration XML for Registration of a VoIP/VoLTE Filter in an IPv6 Network">
      <artwork><![CDATA[
<nsf-registrations
  xmlns="urn:ietf:params:xml:ns:yang:ietf-i2nsf-reg-interface"
  xmlns:cap="urn:ietf:params:xml:ns:yang:ietf-i2nsf-capability">
  <nsf-information>
    <capability-name>voip_volte_filter</capability-name>
    <nsf-capability-info>
      <security-capability>
        <condition-capabilities>
          <advanced-nsf-capabilities>
            <voip-volte-capability>cap:voice-id</voip-volte-capability>
          </advanced-nsf-capabilities>
        </condition-capabilities>
        <action-capabilities>
          <ingress-action-capability>cap:pass</ingress-action-capability>
          <ingress-action-capability>cap:drop</ingress-action-capability>
          <ingress-action-capability>cap:alert</ingress-action-capability>
          <egress-action-capability>cap:pass</egress-action-capability>
          <egress-action-capability>cap:drop</egress-action-capability>
          <egress-action-capability>cap:alert</egress-action-capability>
        </action-capabilities>
        <ipsec-method>cap:ikeless</ipsec-method>
      </security-capability>
      <performance-capability>
        <processing>
          <processing-average>1000</processing-average>
          <processing-peak>5000</processing-peak>
        </processing>
        <bandwidth>
          <outbound>
            <outbound-average>1000</outbound-average>
            <outbound-peak>5000</outbound-peak>
          </outbound>
          <inbound>
            <inbound-average>1000</inbound-average>
            <inbound-peak>5000</inbound-peak>
          </inbound>
        </bandwidth>
      </performance-capability>
    </nsf-capability-info>
    <nsf-access-info>
      <capability-name>voip_volte_filter</capability-name>
      <ip>2001:DB8:0:1::11</ip>
      <port>3000</port>
    </nsf-access-info>
  </nsf-information>
</nsf-registrations>
          ]]></artwork>
          </figure>

          <t>
          <xref target="i2nsf-reg-example4-IPv6" /> shows the configuration XML for registering a VoIP/VoLTE filter in an IPv6 network <xref target="RFC3849" /> and its capabilities are as follows.
          </t>

            <t>
            <list style="numbers">
              <t>
                The instance name of the NSF is voip_volte_filter.
              </t>
              <t>
                The NSF can inspect a voice id for VoIP/VoLTE packets.
              </t>
              <t>
                The NSF can determine whether the packets are allowed to pass, drop, or alert.
              </t>
              <t>
                The NSF can support IPsec not through IKEv2, but through a Security Controller <xref target="I-D.ietf-i2nsf-sdn-ipsec-flow-protection" />.
              </t>
              <t>
                The NSF can have processing power and bandwidth.
              </t>
              <t>
                The IPv6 address of the NSF is 2001:DB8:0:1::11.
              </t>
              <t>
                The port of the NSF is 3000.
              </t>
            </list>
            </t>
  </section>

  <section title="Example 5: Registration for the Capabilities of an HTTP and HTTPS Flood Mitigator ">
    <t>This section shows an XML example for registering the capabilities of an HTTP and HTTPS flood mitigator in either IPv4 networks <xref target="RFC5737" /> or IPv6 networks <xref target="RFC3849" />.
    </t>

    <figure anchor="i2nsf-reg-example5-IPv4" title="Configuration XML for Registration of an HTTP and HTTPS Flood Mitigator in an IPv4 Network">
      <artwork><![CDATA[
<nsf-registrations
  xmlns="urn:ietf:params:xml:ns:yang:ietf-i2nsf-reg-interface"
  xmlns:cap="urn:ietf:params:xml:ns:yang:ietf-i2nsf-capability">
  <nsf-information>
    <capability-name>
      http_and_https_flood_mitigator
    </capability-name>
    <nsf-capability-info>
      <security-capability>
        <condition-capabilities>
          <advanced-nsf-capabilities>
            <anti-ddos-capability>
              cap:http-flood-action
            </anti-ddos-capability>
            <anti-ddos-capability>
              cap:https-flood-action
            </anti-ddos-capability>
          </advanced-nsf-capabilities>
        </condition-capabilities>
        <action-capabilities>
          <ingress-action-capability>cap:pass</ingress-action-capability>
          <ingress-action-capability>cap:drop</ingress-action-capability>
          <ingress-action-capability>cap:alert</ingress-action-capability>
          <egress-action-capability>cap:pass</egress-action-capability>
          <egress-action-capability>cap:drop</egress-action-capability>
          <egress-action-capability>cap:alert</egress-action-capability>
        </action-capabilities>
        <ipsec-method>cap:ike</ipsec-method>
      </security-capability>
      <performance-capability>
        <processing>
          <processing-average>1000</processing-average>
          <processing-peak>5000</processing-peak>
        </processing>
        <bandwidth>
          <outbound>
            <outbound-average>1000</outbound-average>
            <outbound-peak>5000</outbound-peak>
          </outbound>
          <inbound>
            <inbound-average>1000</inbound-average>
            <inbound-peak>5000</inbound-peak>
          </inbound>
        </bandwidth>
      </performance-capability>
    </nsf-capability-info>
    <nsf-access-info>
      <capability-name>
        http_and_https_flood_mitigation
      </capability-name>
      <ip>192.0.2.11</ip>
      <port>3000</port>
    </nsf-access-info>
  </nsf-information>
</nsf-registrations>
          ]]></artwork>
          </figure>

          <t>
          <xref target="i2nsf-reg-example5-IPv4" /> shows the configuration XML for registering an HTTP and HTTPS flood mitigator in an IPv4 network <xref target="RFC5737" /> and its capabilities are as follows.
          </t>

            <t>
            <list style="numbers">
              <t>
                The instance name of the NSF is http_and_https_flood_mitigator.
              </t>
              <t>
                The NSF can control the amount of packets for HTTP and HTTPS packets.
              </t>
              <t>
                The NSF can determine whether the packets are allowed to pass, drop, or alert.
              </t>
              <t>
                The NSF can support IPsec through IKEv2 <xref target="I-D.ietf-i2nsf-sdn-ipsec-flow-protection" />.
              </t>
              <t>
                The NSF can have processing power and bandwidth.
              </t>
              <t>
                The IPv4 address of the NSF is 192.0.2.11.
              </t>
              <t>
                The port of the NSF is 3000.
              </t>
            </list>
            </t>
			
    <figure anchor="i2nsf-reg-example5-IPv6" title="Configuration XML for Registration of an HTTP and HTTPS Flood Mitigator in an IPv6 Network">
      <artwork><![CDATA[
<nsf-registrations
  xmlns="urn:ietf:params:xml:ns:yang:ietf-i2nsf-reg-interface"
  xmlns:cap="urn:ietf:params:xml:ns:yang:ietf-i2nsf-capability">
  <nsf-information>
    <capability-name>
      http_and_https_flood_mitigator
    </capability-name>
    <nsf-capability-info>
      <security-capability>
        <condition-capabilities>
          <advanced-nsf-capabilities>
            <anti-ddos-capability>
              cap:http-flood-action
            </anti-ddos-capability>
            <anti-ddos-capability>
              cap:https-flood-action
            </anti-ddos-capability>
          </advanced-nsf-capabilities>
        </condition-capabilities>
        <action-capabilities>
          <ingress-action-capability>cap:pass</ingress-action-capability>
          <ingress-action-capability>cap:drop</ingress-action-capability>
          <ingress-action-capability>cap:alert</ingress-action-capability>
          <egress-action-capability>cap:pass</egress-action-capability>
          <egress-action-capability>cap:drop</egress-action-capability>
          <egress-action-capability>cap:alert</egress-action-capability>
        </action-capabilities>
        <ipsec-method>cap:ike</ipsec-method>
      </security-capability>
      <performance-capability>
        <processing>
          <processing-average>1000</processing-average>
          <processing-peak>5000</processing-peak>
        </processing>
        <bandwidth>
          <outbound>
            <outbound-average>1000</outbound-average>
            <outbound-peak>5000</outbound-peak>
          </outbound>
          <inbound>
            <inbound-average>1000</inbound-average>
            <inbound-peak>5000</inbound-peak>
          </inbound>
        </bandwidth>
      </performance-capability>
    </nsf-capability-info>
    <nsf-access-info>
      <capability-name>
        http_and_https_flood_mitigation
      </capability-name>
      <ip>2001:DB8:0:1::11</ip>
      <port>3000</port>
    </nsf-access-info>
  </nsf-information>
</nsf-registrations>
          ]]></artwork>
          </figure>

          <t>
          In addition, <xref target="i2nsf-reg-example5-IPv6" /> shows the configuration XML for registering an HTTP and HTTPS flood mitigator in an IPv6 network <xref target="RFC3849" /> and its capabilities are as follows.
          </t>

            <t>
            <list style="numbers">
              <t>
                The instance name of the NSF is http_and_https_flood_mitigator.
              </t>
              <t>
                The NSF can control the amount of packets for HTTP and HTTPS packets.
              </t>
              <t>
                The NSF can determine whether the packets are allowed to pass, drop, or alert.
              </t>
              <t>
                The NSF can support IPsec through IKEv2 <xref target="I-D.ietf-i2nsf-sdn-ipsec-flow-protection" />.
              </t>
              <t>
                The NSF can have processing power and bandwidth.
              </t>
              <t>
                The IPv6 address of the NSF is 2001:DB8:0:1::11.
              </t>
              <t>
                The port of the NSF is 3000.
              </t>
            </list>
            </t>			
  </section>
  
  <section title="Example 6: Query for the Capabilities of a Time-based Firewall ">
    <t>
      This section shows an XML example for querying the capabilities of a time-based firewall
	  in either IPv4 networks <xref target="RFC5737" /> or IPv6 networks <xref target="RFC3849" />.
    </t>
    <figure anchor="i2nsf-reg-example6-IPv4" title="Configuration XML for Query of a Time-based Firewall in an IPv4 Network">
      <artwork><![CDATA[
<rpc message-id="101"
  xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
  <nsf-capability-query
    xmlns="urn:ietf:params:xml:ns:yang:ietf-i2nsf-reg-interface"
    xmlns:cap="urn:ietf:params:xml:ns:yang:ietf-i2nsf-capability">
    <query-i2nsf-capability-info>
      <time-capabilities>absolute-time</time-capabilities>
      <time-capabilities>periodic-time</time-capabilities>
      <condition-capabilities>
        <generic-nsf-capabilities>
          <ipv4-capability>cap:ipv4-protocol</ipv4-capability>
          <ipv4-capability>cap:exact-ipv4-address</ipv4-capability>
          <ipv4-capability>cap:range-ipv4-address</ipv4-capability>
        </generic-nsf-capabilities>
      </condition-capabilities>
      <action-capabilities>
        <ingress-action-capability>cap:pass</ingress-action-capability>
        <ingress-action-capability>cap:drop</ingress-action-capability>
        <ingress-action-capability>cap:alert</ingress-action-capability>
        <egress-action-capability>cap:pass</egress-action-capability>
        <egress-action-capability>cap:drop</egress-action-capability>
        <egress-action-capability>cap:alert</egress-action-capability>
      </action-capabilities>
      <ipsec-method>cap:ikeless</ipsec-method>
    </query-i2nsf-capability-info>
  </nsf-capability-query>
</rpc>

<rpc-reply message-id="101"
  xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
  <nsf-access-info
    xmlns="urn:ietf:params:xml:ns:yang:ietf-i2nsf-reg-interface">
    <capability-name>time-based-firewall</capability-name>
    <ip>192.0.2.11</ip>
    <port>3000</port>
  </nsf-access-info>
</rpc-reply>
          ]]></artwork>
          </figure>

          <t>
          <xref target="i2nsf-reg-example6-IPv4" /> shows the XML configuration for querying the capabilities of a time-based firewall in an IPv4 network <xref target="RFC5737" />.
		  The access information of the announced time-based firewall has the IPv4 address of
		  192.0.2.11 and the port number of 3000.
          </t>

    <figure anchor="i2nsf-reg-example6-IPv6" title="Configuration XML for Query of a Time-based Firewall in an IPv6 Network">
      <artwork><![CDATA[
<rpc message-id="101"
  xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
  <nsf-capability-query
    xmlns="urn:ietf:params:xml:ns:yang:ietf-i2nsf-reg-interface"
    xmlns:cap="urn:ietf:params:xml:ns:yang:ietf-i2nsf-capability">
    <query-i2nsf-capability-info>
      <time-capabilities>absolute-time</time-capabilities>
      <time-capabilities>periodic-time</time-capabilities>
      <condition-capabilities>
        <generic-nsf-capabilities>
          <ipv6-capability>cap:ipv6-protocol</ipv6-capability>
          <ipv6-capability>cap:exact-ipv6-address</ipv6-capability>
          <ipv6-capability>cap:range-ipv6-address</ipv6-capability>
        </generic-nsf-capabilities>
      </condition-capabilities>
      <action-capabilities>
        <ingress-action-capability>cap:pass</ingress-action-capability>
        <ingress-action-capability>cap:drop</ingress-action-capability>
        <ingress-action-capability>cap:alert</ingress-action-capability>
        <egress-action-capability>cap:pass</egress-action-capability>
        <egress-action-capability>cap:drop</egress-action-capability>
        <egress-action-capability>cap:alert</egress-action-capability>
      </action-capabilities>
      <ipsec-method>cap:ikeless</ipsec-method>
    </query-i2nsf-capability-info>
  </nsf-capability-query>
</rpc>

<rpc-reply message-id="101"
  xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
  <nsf-access-info
    xmlns="urn:ietf:params:xml:ns:yang:ietf-i2nsf-reg-interface">
    <capability-name>time-based-firewall</capability-name>
    <ip>2001:DB8:0:1::11</ip>
    <port>3000</port>
  </nsf-access-info>
</rpc-reply>
          ]]></artwork>
          </figure>

          <t>
          In addition, <xref target="i2nsf-reg-example6-IPv6" /> shows the XML configuration for querying the capabilities of a time-based firewall in an IPv6 network <xref target="RFC3849" />.
		  The access information of the announced time-based firewall has the IPv6 address of
		  2001:DB8:0:1::11 and the port number of 3000.
          </t>
  </section>
</section>
<section title="NSF Lifecycle Management in NFV Environments">
    <t>
        Network Functions Virtualization (NFV) can be used to implement I2NSF framework. In NFV environments, NSFs are deployed as virtual network functions (VNFs). Security Controller can be implemented as an Element Management (EM) of the NFV architecture, and is connected with the VNF Manager (VNFM) via the Ve-Vnfm interface <xref target="nfv-framework"/>. Security Controller can use this interface for the purpose of the lifecycle management of NSFs. If some NSFs need to be instantiated to enforce security policies in the I2NSF framework, Security Controller could request the VNFM to instantiate them through the Ve-Vnfm interface. Or if an NSF, running as a VNF, is not used by any traffic flows for a time period, Security Controller may request deinstantiating it through the interface for efficient resource utilization.
    </t>
</section>

<section title="Acknowledgments">
        <t>
            This work was supported by Institute of Information &amp;
			Communications Technology Planning &amp; Evaluation (IITP) grant funded by
            the Korea MSIT (Ministry of Science and ICT) (No. 2016-0-00078, Cloud Based
            Security Intelligence Technology Development for the Customized
            Security Service Provisioning).
        </t>
</section>

<section anchor="Contributors" title="Contributors">
	    <t>
        This document is made by the group effort of I2NSF working group.
        Many people actively contributed to this document, such as Reshad Rahman.
		The authors sincerely appreciate their contributions.
		</t>
		<t> The following are co-authors of this document: </t>
		<t>
			Jinyong Tim Kim
			<vspace blankLines="0"/>
			Department of Electronic, Electrical and Computer Engineering
			<vspace blankLines="0"/>
			Sungkyunkwan University	
			<vspace blankLines="0"/>	
			2066 Seo-ro Jangan-gu
			<vspace blankLines="0"/>
			Suwon, Gyeonggi-do 16419
			<vspace blankLines="0"/>
			Republic of Korea
			<vspace blankLines="1"/>
			EMail: timkim@skku.edu
			<vspace blankLines="1"/>
		</t>
		<t>
			Chaehong Chung
			<vspace blankLines="0"/>
			Department of Electronic, Electrical and Computer Engineering
			<vspace blankLines="0"/>
			Sungkyunkwan University	
			<vspace blankLines="0"/>	
			2066 Seo-ro Jangan-gu
			<vspace blankLines="0"/>
			Suwon, Gyeonggi-do 16419
			<vspace blankLines="0"/>
			Republic of Korea
			<vspace blankLines="1"/>
			EMail: darkhong@skku.edu
			<vspace blankLines="1"/>
		</t>
		<t>
			Susan Hares
			<vspace blankLines="0"/>
			Huawei
			<vspace blankLines="0"/>
			7453 Hickory Hill
			<vspace blankLines="0"/>
			Saline, MI 48176
			<vspace blankLines="0"/>
			USA
			<vspace blankLines="1"/>
			EMail: shares@ndzh.com
			<vspace blankLines="1"/>
		</t>
		<t>
			Diego R. Lopez
			<vspace blankLines="0"/>
			Telefonica I+D
			<vspace blankLines="0"/>
			Jose Manuel Lara, 9
			<vspace blankLines="0"/>
			Seville, 41013
			<vspace blankLines="0"/>
			Spain
			<vspace blankLines="1"/>
			EMail: diego.r.lopez@telefonica.com
			<vspace blankLines="1"/>
		</t>
</section>

</back>

<!-- <vspace blankLines="100"/> -->
<!-- page break to put addresses onto one page-->

</rfc>
