Rakesh Kumar Juniper networks Anil Lohiya Juniper networks

Slides:



Advertisements
Similar presentations
P2PSIP Security Overview and Risk Analysis Haibin Song Dan York Marcin Matuzswski Christian Schmidt Roni Even.
Advertisements

5/30/2012. Provides a method for finding services/data on the Exchange Network – discover data. Supports User Friendly Tools Can automatically collect.
WHY CMS? WHY NOW? CONTENT MANAGEMENT SYSTEM. CMS OVERVIEW Why CMS? What is it? What are the benefits and how can it help me? Centralia College web content.
ECS and LDAP Karen Krivaa Product Marketing Manager.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Face Recognition Data Search Tool COMP6703 PRESENTATION Presented by Yan Gao u Supervisor: Professor Tom Gedeon.
Finalize RESTful Application Programming Interface (API) Security Recommendations Transport & Security Standards Workgroup January 28, 2014.
Authenticating REST/Mobile clients using LDAP and OERealm
OAuth 2.0 Security IETF OAuth WG Conference Call, 14th December 2012.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 draft-sajassi-l2vpn-evpn-inter-subnet- switching-02.txt A. Sajassi.
Analysis of Existing Work for I2NSF draft-zhang-gap-analysis-00 H.Rafiee Dacheng Zhang Huawei IETF 91 I2NSF BoF.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Windows Server 2008 R2 Domain Name System Chapter 5.
The University of Wisconsin University Directory Service UDS A repository of people information Has been in production for about a year. Serves White pages,
Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.
Draft-qi-i2nsf-access-network- usecase-00 Author: Minpeng Qi, Xiaojun Zhuang.
MASS / DKIM BOF IETF – Paris 4 Août 2005 dkim.org  mipassoc.org/mass IETF – Paris 4 Août 2005 dkim.org  mipassoc.org/mass MIPA.
Draft-li-mpls-global-label-framework-02IETF 90 MPLS WG1 A Framework of MPLS Global Label draft-li-mpls-global-label-framework-02 Zhenbin Li, Quintin Zhao,
Directory and File transfer Services By Jothi. Two key resources Lightweight Directory Access Protocol (LDAP) File Transfer protocol Secure file transfer.
TWSd - Security Workshop Part I of III T302 Tuesday, 4/20/2010 TWS Distributed & Mainframe User Education April 18-21, 2010  Carefree Resort  Carefree,
SQL Server Security By Mattias Lind For PASS Security VC.
Network Virtualization Overlay Use Cases Lucy Yong, Mehmet Toy, Aldrin Isaac, Vishwas Manral, Linda Dunbar July 2013 Berlin Germany draft-ietf-nvo3-use-case-02.
Directory Assisted Edge Donald Eastlake, Linda Dunbar Huawei Technologies
Vic Liu Liang Xia Zu Qiang Speaker: Vic Liu China Mobile Network as a Service Architecture draft-liu-nvo3-naas-arch-01.
Designing Secure SharePoint External Access Ondrej Sevecek | MCM: Directory | MVP: Security |
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
November 2013TRILL Directory Assist Mechanisms1 TRILL Directory Assistance Mechanisms draft-dunbar-trill-scheme-for-directory-assist-06 draft-eastlake-trill-ia-appsubtlv-03.
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
Behcet Sarikaya Frank Xia July 2009 Dual-stack Lite Mobility Solutions IETF-75
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 E-VPN Update R. Aggarwal (Juniper), A. Sajassi (Cisco), W. Hendericx.
User-group-based Security Policy for Service Layer Jianjie You Myo Zarny Christian Jacquenet
GDT Automated Scheduling and Operations with C2O.
Interface to Network Security Functions (I2NSF) Chairs: Linda Dunbar Adrian Farrel IETF 96, Thursday July 21, 2016, 16:20-18:20.
Some basics of a AAA Control model
Rakesh Kumar Juniper networks Anil Lohiya Juniper networks
User-group-based Security Policy for Service Layer
Single Sign-On Led by Terrice McClain, Jen Paulin, & Leighton Wingerd
Secure Software Confidentiality Integrity Data Security Authentication
E-VPN Update R. Aggarwal (Juniper), A. Sajassi (Cisco), W. Hendericx (Alcatel-Lucent), A. Isaac (Bloomberg), J. Uttaro (AT&T), N. Bitar (Verizon),
Requirements for Client-facing Interface to Security controller draft-ietf-i2nsf-client-facing-interface-req-00 Rakesh Kumar Juniper networks.
Nicolas BOUTHORS Qosmos
Business Risks of Insecure Networks
Use Cases and Requirements for I2NSF_
Managing Exchange Online using Office 365 Admin Console
Servicenow Admin Certification Training
L. Xia, J. Strassner, C. Basile, D. Lopez
Nicolas BOUTHORS Qosmos
Interface to Network Security Functions (I2NSF)
Applicability of YANG models for ACTN
2. Updates from the Last Meeting
Anil Kumar, NIC, New Delhi
مراجعه النظم Information Systems Audit
A Yang Data Model for ACTN VN Operation
Requirements for Client-facing Interface to Security controller draft-ietf-i2nsf-client-facing-interface-req-02 Rakesh Kumar Juniper networks.
Managing Exchange Online using Office 365 Admin Console
Use Cases of CASM (Coordinated Address Space Management) draft-xie-ps-centralized-address-management-02 draft-kumar-casm-problem-and-use-cases-00 Chongfeng.
Packet loss Measurement Model draft-bhaprasud-ippm-pm-03
Managing Exchange Online using PowerShell
(With Hybrid Network Support)
Joint NTP and TICTOC Meeting
Managing Exchange Online using PowerShell
YANG Data Models for TE and RSVP draft-ietf-teas-yang-te-19 draft-ietf-teas-yang-rsvp-10 draft-ietf-teas-yang-rsvp-te-05 draft-ietf-teas-yang-te-mpls-01.
Interface to Network Security Functions (I2NSF)
L. Xia, J. Strassner, C. Basile, D. Lopez
Applicability of YANG models for ACTN
Interface to Network Security Functions (I2NSF)
Scott Bradner & Martin Thomson
Presentation transcript:

Information model for Client-facing Interface draft-kumar-i2nsf-client-facing-interface-im-03 Rakesh Kumar Juniper networks Anil Lohiya Juniper networks Dave Qi Bloomberg Nabll Bitar Nokia Senand Palislamovic Nokia Liang Xia Huawei IETF-99, Prague July 18, 2017

Agenda Draft overview WG discussions Next steps and plans

Draft overview … (1/2) Information model for client-facing interface Identify set of managed objects (resources) Relationship among these objects Objects and the relationship defines the interface Based on WG draft requirements WG draft draft-ietf-i2nsf-client-facing-interface-req Managed objects for functional requirements Multi-tenancy related objects Policy-Domain, Policy-Tenant, Policy-Role, Policy-User Authentication-Method: password, token, certificate, SSO; mutual or not? End-point group objects Meta-data source/endpoints group information source: LDAP, Active Directory, CMDB, GeoIP database, … User-group, Device-group, Application-group, Location-group

Draft overview … (2/2) Threat prevention objects Threat-feed, Custom-List, Malware-Scan, Event-Map Telemetry collection objects Telemetry-Data, Telemetry-Source, Telemetry-Destination Security policy objects Policy-Instance objet created using Policy-Calendar, Policy-Action, Policy-Rule Policy-Instance: rules, schedule methods

WG comments Any input?

Net steps and plans draft-kumar-i2nsf-client-facing-interface-im-01 Evolve draft based on requirements Update the draft whenever requirement draft get updated WG client-facing interface requirement draft draft-ietf-i2nsf-client-facing-interface-req Incorporate ideas from co-authors discussions Not all ideas made to the draft because of IETF deadline Continue hashing ideas on the table and add accordingly Revisit managed objects Contents and relationship Incorporate ideas from WG mailing discussions Address comments received Linda Dunbar Solicit inputs on the model Completeness of the model itself Content of managed objects

Thanks! Rakesh Kumar