PAA-2-EP protocol PANA wg - IETF 58 Minneapolis

Slides:



Advertisements
Similar presentations
Adapted Multimedia Internet KEYing (AMIKEY): An extension of Multimedia Internet KEYing (MIKEY) Methods for Generic LLN Environments draft-alexander-roll-mikey-lln-key-mgmt-01.txt.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
PANA Requirements and Terminology - IETF54 -. PANA WG, IETF 54, Requirements and Terminology draft-ietf-pana-requirements-02.txt Changes Comments/questions.
May 12, 2015IEEE Network Management Symposium Page-1 Requirements for Configuration Management of IP-based Networks Luis A. Sanchez Chief Technology Officer,
SNMP for the PAA-EP protocol PANA wg - IETF 61 Washington DC Yacine El Mghazli (Alcatel) Yoshihiro Ohba (Toshiba) Julien Bournelle (GET/INT) draft-ietf-pana-snmp-02.txt.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Monitoring for network security and management Cyber Solutions Inc.
Issues to Consider w.r.t Protocol Solution - IETF54 -
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
August 1, 2005IETF63 PANA WG Pre-authentication Support for PANA (draft-ohba-pana-preauth-00.txt) Yoshihiro Ohba
KAIS T Security architecture in a multi-hop mesh network Conference in France, Presented by JooBeom Yun.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
Jun Li DHCP Option for Access Network Information draft-lijun-dhc-clf-nass-option-01.
IETF-71, Philadelphia PANA in DSL networks draft-morand-pana-panaoverdsl-01.txt Lionel Morand France Telecom Alper Yegin Samsung Yoshihiro Ohba Toshiba.
Real-time Flow Management 2 BOF: Remote Packet Capture Extensions Jürgen Quittek NEC Europe Ltd, Heidelberg, Germany Georg Carle GMD.
SNMP for the PAA-EP protocol PANA wg - IETF 60 San Diego -> Yacine El Mghazli (Alcatel)
PANA Framework Prakash Jayaraman, Rafa Marin Lopez, Yoshihiro Ohba, Mohan Parthasarathy, Alper Yegin IETF 59.
SNMP for the PAA-2-EP protocol PANA wg - IETF 59 Seoul -> Yacine El Mghazli (Alcatel)
Multi-hop PANA IETF Currently: –“For simplicity, it is assumed that the PAA is attached to the same link as the device (i.e., no intermediary IP.
Mar 20, 2005IETF65 PANA WG Requirements for PANA support of location based services draft-anjum-pana-location-requirements-00.txt F. Anjum D. Famolari.
SNMP for the PAA-EP protocol PANA wg - IETF 62 Minneapolis Yacine El Mghazli (Alcatel) Yoshihiro Ohba (Toshiba) Julien Bournelle (GET/INT) draft-ietf-pana-snmp-03.txt.
IETF 57 PANA WG PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt) Dan Forsberg, Yoshihiro Ohba, Basavaraj Patil, Hannes Tschofenig, Alper Yegin.
DSLF Subscriber Auth Requirements and IETF PANA Protocol PANA WG Chairs IETF 70 Dec 7, 2007 – Vancouver, Canada.
Slide 1 2/22/2016 Policy-Based Management With SNMP SNMPCONF Working Group - Interim Meeting May 2000 Jon Saperia.
DHCPv4 option for PANA Authentication Agents draft-suraj-dhcpv4-paa-option-00.txt DHC/PANA WG IETF-63 France, Paris.
PANA in DSL networks draft-morand-pana-panaoverdsl-00.txt Lionel Morand Roberta Maglione John Kaippallimalil Alper Yegin IETF-67, San Diego.
11 SECURING NETWORK TRAFFIC WITH IPSEC Chapter 6.
Pre-authentication Problem Statement (draft-ohba-hokeyp-preauth-ps-00
Instructor Materials Chapter 5: Network Security and Monitoring
<draft-ohba-pana-framework-00.txt>
47th IETF - Adelaide Chris Lonvick
Open issues with PANA Protocol
PANA in DSL networks draft-morand-pana-panaoverdsl-01.txt
PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt)
Home: Tel: , H.P.: Office: 공) 7710A
J.W. Atwood PIM WG 2010/03/23 The KARP Working Group J.W. Atwood PIM WG 2010/03/23
PANA Issues and Resolutions
SECURING NETWORK TRAFFIC WITH IPSEC
CSE 4905 IPsec II.
Implementing Network Access Protection
Handover Keys using AAA (draft-vidya-mipshop-fast-handover-aaa-01.txt)
Carrying Location Objects in RADIUS
SNMP usage for PAA-EP PANA wg - IETF 63 Paris
IETF80, Prague Diameter Maintenance and Extensions (DIME) WG
Goals of soBGP Verify the origin of advertisements
In-Band Authentication Extension for Protocol Independent Multicast (PIM) draft-bhatia-zhang-pim-auth-extension-00 Manav Bhatia
PAA-EP protocol considerations PANA wg - IETF 57 Vienna
Module 8: Securing Network Traffic by Using IPSec and Certificates
OmniRAN Introduction and Way Forward
Thomas Nadeau Yacine El Mghazli Kwok Ho Chan
draft-ietf-geopriv-lbyr-requirements-02 status update
Chapter 5: Network Security and Monitoring
2018 Real Cisco Dumps IT-Dumps
March 2012 doc.: IEEE March 2012 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:
Charles Clancy Katrin Hoeper IETF 73 Minneapolis, USA 17 November 2008
Protocol for Carrying Authentication for Network Access - PANA -
PANA Implementation in Open Diameter
Maryna Komarova (ENST)
Chapter 8: Monitoring the Network
draft-ipdvb-sec-01.txt ULE Security Requirements
Policy-Based IPSec Management (Role combination)
Module 8: Securing Network Traffic by Using IPSec and Certificates
OmniRAN Introduction and Way Forward
Introduction to Network Security
802.11i Bootstrapping Using PANA
Protocol for Carrying Authentication for Network Access - PANA -
Protection Mechanisms in Security Management
PANA enabling IPsec based Access control
Presentation transcript:

PAA-2-EP protocol PANA wg - IETF 58 Minneapolis Yacine El Mghazli draft-yacine-pana-paa2ep-prot-eval-00.txt

Overview PANA terminology Discussion objective PAA-2-EP protocol requirements PAA-EP protocol evaluation Focus on SNMP applicability Next Steps

PANA terminology PAA (PANA Authentication Agent) PaC (PANA client) verify the credentials provided by a PaC and grant/deny access to the associated device PaC (PANA client) provides the credentials to prove its identity for networkn access authorization EP (Enforcement Point) node in the NA where per-packet policies (filters) are applied on the inbound/outbound traffic of client device. Information such as DI and (optionally) cryptographic keys are provided by PAA per client for constructing filters on the EP

Discussion objective History: PANA charter item: Objective today IETF55: PAA-2-EP topic introduction draft-ietf-pana-requirements-0x.txt IETF57: PAA-2-EP protocol considerations draft-yacine-pana-paa-ep-reqs-00.txt PANA charter item: The PANA working group must mandate one protocol The PANA wg will not design a new protocol design, it may involve the definition of extensions of an existing one Objective today gauge consensus of the WG on the selection of the PAA-2-EP protocol as proposed in draft-yacine-pana-paa2ep-prot-eval-00.txt

PAA-2-EP protocol requirements Secure communication PAA-EP protocol needs to guarantee message authentication, confidentiality and integrity One-to-many PAA-EP relation there might be several EPs provisioned by a single PAA Access control Information The protocol must carry DI-based filters and keying material PAA-initiated communication Push model New PaC Notification to the PAA EP detects unauthorized data traffic and triggers a notification

PAA-EP protocol evaluation summary PAA-2-EP reqs soft enough to allow any not only a technical choice SNMP widely spread for monitoring (GETs) SETs allow configuration (rarely used) MIBs available MIDCOM compliant COPS-PR efficient dynamic device configuration IAB does not recommend further investigation on COPS-PR PIBs available

PAA-EP protocol evaluation summary (cont'd) NetConf recommended by IAB on-going design no information model available Other solutions were considered immature or non-appropriate: Diameter, Radius, ForCES.

SNMP applicability against the PAA-2-EP Reqs Access Control info Existing MIB modules (e.g. IPSEC conf MIB) can be re-used. Secure communication User-based Security Model (USM) provides authentication, confidentiality, integrity, replay attacks prevention, time windows for the validity of messages. One-to-many PAA-EP relation An SNMP manager (PAA) can communicate simultaneously with several agents (EPs). Push model SET messages. New PaC notification SMIv2 Notifications

SNMP applicability re-usable existing MIB objects IPSec Configuration MIB IPSec & IKE configuration Rule/Filter/Action Policy structure Various IP filters, including IP header filter Notification Variables re-usable for the New PaC Notification Direct usage for IPSec-based EP access control Good starting point for a PANA-specific MIB module DiffServ MIB IP Multi-Field Classifier re-usable Connected Building block structure with « Next » Pointers

SNMP applicability additional PANA-specific MIB objects needed L2 address-based filters definition E.g. IEEE 802 filters PANA Session ID attribute For pre-shared key derivation when IPSec used to perform access control at the EP New PaC Notification PANA-specific object should support this feature

Next Steps Selection of the PAA-2-EP protocol: SNMP ? Need for a new PANA work providing: General applicability statement The existing re-usable information models Needed PANA-specific extensions to existing modules Under the form of either: An annex to the PANA protocol document A new PANA working group document

THANKS