Nicolas BOUTHORS Qosmos

Slides:



Advertisements
Similar presentations
Microsoft Internet Security and Acceleration (ISA) Server 2004 Technical Overview
Advertisements

Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Firewalls and Intrusion Detection Systems
OSI Model.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
A Brief Taxonomy of Firewalls
OSI Model Routing Connection-oriented/Connectionless Network Services.
Analysis of Existing Work for I2NSF draft-zhang-gap-analysis-00 H.Rafiee Dacheng Zhang Huawei IETF 91 I2NSF BoF.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Midterm Review - Network Layers. Computer 1Computer 2 2.
1 Computer Networks DA Chapter 1-3 Introduction.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Security fundamentals Topic 10 Securing the network perimeter.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
1 Internet Protocols To support the Internet and all its services, many protocols are necessary Some of the protocols that we will look at: –Internet Protocol.
1 Protocol Layering Myungchul Kim Tel:
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
SOCKET PROGRAMMING Presented By : Divya Sharma.
Firewalls, Network Address Translators(NATs), and H.323
Security fundamentals
Introduction to Networks
Application Layer Functionality and Protocols Abdul Hadi Alaidi
CompTIA Security+ Study Guide (SY0-401)
TMG Client Protection 6NPS – Session 7.
Module 3: Enabling Access to Internet Resources
Instructor Materials Chapter 5 Providing Network Services
FIREWALL configuration in linux
Computer Networks.
Introduction to TCP/IP
Distributed Systems.
IT443 – Network Security Administration Instructor: Bo Sheng
What the OSI Protocol Layers Do
Nicolas BOUTHORS Qosmos
Networking for Home and Small Businesses – Chapter 6
Introduction to Networking
Network Architecture Introductory material
Networking for Home and Small Businesses – Chapter 6
CompTIA Security+ Study Guide (SY0-401)
Data and Computer Communications by William Stallings Eighth Edition
The Internet and HTTP and DNS Examples
Review of Important Networking Concepts
* Essential Network Security Book Slides.
I. Basic Network Concepts
Access Control Lists CCNA 2 v3 – Module 11
Setting Up Firewall using Netfilter and Iptables
POOJA Programmer, CSE Department
Requirements for Client-facing Interface to Security controller draft-ietf-i2nsf-client-facing-interface-req-02 Rakesh Kumar Juniper networks.
Rakesh Kumar Juniper networks Anil Lohiya Juniper networks
Lecture 2: Overview of TCP/IP protocol
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
Firewalls.
Firewalls Chapter 8.
Introduction to Network Security
Networking for Home and Small Businesses – Chapter 6
Firewall Installation
Network Fundamentals – Chapter 5
Computer Networks DA2402.
16EC Computer networks unit II Mr.M.Jagadesh
Computer Networks Protocols
Review of Important Networking Concepts
Session 20 INST 346 Technologies, Infrastructure and Architecture
Lecture 4a Mobile IP 1.
Hosted Security.
AT&T Firewall Battlecard
Chapter 4: outline 4.1 Overview of Network layer data plane
Presentation transcript:

Nicolas BOUTHORS Qosmos Information Model of Interface to Network Security Functions Capability Interface draft-xia-i2nsf-capability-interface-im-03 Liang Xia Huawei DaCheng Zhang Alibaba Edward Lopez Fortinet Nicolas BOUTHORS Qosmos July 2015 Prague

Vendor management system I2NSF Architecture NSF Registration For NSF vendors to register their available security functions and set of policies (or Service Profiles) that can be dynamically set by 3rd parties. Security Service Layer For clients or App Gateway to express and monitor security policies for their specific flows, Vendor management system Capability Layer For Controller to specify and monitor the limited number of attributes (or Security Profiles) that are allowed by the respective vendors to the NSFs

Current Dilemma of NSF Provisioning A lot of security vendors with its proprietary interface (i.e., management plane protocol, information model and data model); Various network security capabilities/functions provided by security vendors can not be integrated and applied as a whole. More seriously, more new network security capabilities are appearing; NSaaS market grows very fast, which requires the automatic provision of massive NSF instances with high efficiency and flexibility.

Answer A standard capability interface(by I2NSF) Decouple network security controller from security devices of specific vendors, and vice versa; Only be oriented to the logic network security capabilities, independent with specific device model; Flow-based paradigm builds a concrete basis for most common security capabilities. Start from a limited set of NSFs (do not boil the ocean), and be patient for its self-evolvement!

Information Model for I2NSF Capability Interface - Match values based on packet data Packet header - Can be standardized Packet payload - Provided by NSF capabilities – Match values based on context Ex.: user, State, time, geo-location, etc. Many can (and should) be standardized, but many also from NSF capabilities Key goal: Flexible and comprehensive semantics; extensible IM for containing different vendors’ security capabilities, in essence, respective difference or innovation. – Egress processing Invoke signaling Packet forwarding and/or transformation Possibility for SDN/NFV integration - Vendor Unique innovation , Vendor specific e.g. IPS:<Profile> Profile: signature, Anti-virus, URL filtering, etc. Integrated and one-pass checks on the content of packets

Information Model Grammar Details <Policy> ::= <policy-name> <policy-id> (<Rule> ...) <Rule> ::= <rule-name> <rule-id> <Match> <Action> <Match> ::= [<packet-based-match>] [<context-based-match>] <packet-based-match> ::= [<packet-header-payload> ...] [<service> ...] [<application> ...] <packet-header-payload> ::= [<address-scope>] [<layer-2-header>] [<layer-3-header>] [<layer-4-header>] [<payload>] <address-scope> ::= <route-type> (<ipv4-route> | <ipv6-route> | <mpls-route> | <mac-route> | <interface-route>) <route-type> ::= <IPV4> | <IPV6> | <MPLS> | <IEEE_MAC> | <INTERFACE> <ipv4-route> ::= <ip-route-type> (<destination-ipv4-address> | <source-ipv4-address> | (<destination-ipv4-address> <source-ipv4-address>)) <destination-ipv4-address> ::= <ipv4-prefix> <source-ipv4-address> ::= <ipv4-prefix> <ipv4-prefix> ::= <IPV4_ADDRESS> <IPV4_PREFIX_LENGTH> <ipv6-route> ::= <ip-route-type> (<destination-ipv6-address> | <source-ipv6-address> | (<destination-ipv6-address> <source-ipv6-address>)) <destination-ipv6-address> ::= <ipv6-prefix> <source-ipv6-address> ::= <ipv6-prefix> <ipv6-prefix> ::= <IPV6_ADDRESS> <IPV6_PREFIX_LENGTH> <ip-route-type> ::= <SRC> | <DEST> | <DEST_SRC> <layer-3-header> ::= <ipv4-header> | <ipv6-header> <ipv4-header> ::= <SOURCE_IPv4_ADDRESS> <DESTINATION_IPv4_ADDRESS> <PROTOCOL> [<TTL>] [<DSCP>] <ipv6-header> ::= <SOURCE_IPV6_ADDRESS> <DESTINATION_IPV6_ADDRESS> <NEXT_HEADER> [<TRAFFIC_CLASS>] [<FLOW_LABEL>] [<HOP_LIMIT>] <service> ::= <name> <id> <protocol> [<protocol-num>] [<src-port>] [<dest-port>] <protocol> ::= <TCP> | <UDP> | <ICMP> | <ICMPv6> | <IP> <application> ::= <name> <id> <category> <subcategory> <data-transmission-model> <risk-level> <signature> <category> ::= <business-system> | <Entertainment> | <internet> | <network> | <general> <subcategory> ::= <Finance> | <Email> | <Game> | <media-sharing> | <social-network> | <web-posting> | <proxy> | ... <data-transmission-model> ::= <client-server> | <browser-based> |<networking> | <peer-to-peer> | <unassigned> <risk-level> ::= <Exploitable> | <Productivity-loss> | <Evasive> | <Data-loss> | <Malware-vehicle> |<Bandwidth-consuming> | <Tunneling> <signature> ::= <server-address> <protocol> <dest-port-num> <flow-direction> <object> <keyword> <flow-direction> ::= <request> | <response> | <bidirection> <object> ::= <packet> | <flow> <context based match> ::= [<user-group> ...] [<session-state>] [<schedule>] [<region-group>] <user-group> ::= <user>... <user> ::= (<login-name> <group-name> <parent-group> <password> <expired-date> <allow-multi-account-login> <address-binding>) | <tenant> | <VN-id> <session-state> ::= <new> | <established> | <related> | <invalid> | <untracked> <schedule> ::= <name> <type> <start-time> <end-time> <weekly-validity-time> <type> ::= <once> | <periodic> <action> ::= <basic-action> [<advanced-action>] <basic-action> ::= <pass> | <deny> | <mirror> | <call-function> | <encapsulation> <advanced-action> ::= [<profile-antivirus>] [<profile-IPS>] [<profile-url-filtering>] [<profile-file-blocking>] [<profile-data-filtering>] [<profile-application-control>]

Yang Data Model Specification

Next Step Solicit Comments Maybe remove the Yang data model part Keep on improvement, including: more content about security profiles, improving information model structure and grammar, examples, etc

Thanks! Dacheng Zhang Liang Xia (Frank)