﻿<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [ 
<!ENTITY RFC791 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.0791.xml">
<!ENTITY RFC2119 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC2940 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2940.xml">
<!ENTITY RFC3084 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3084.xml">
<!ENTITY RFC3483 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3483.xml">
<!ENTITY RFC3484 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.3484.xml">
<!ENTITY RFC4242 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4242.xml">
<!ENTITY RFC4261 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4261.xml">
<!ENTITY RFC4949 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4949.xml">
<!ENTITY RFC5277 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5277.xml">
<!ENTITY RFC5539 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5539.xml">
<!ENTITY RFC6022 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6022.xml">
<!ENTITY RFC6241 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6241.xml">
<!ENTITY RFC6242 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6242.xml">
<!ENTITY RFC6243 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6243.xml">
<!ENTITY RFC6436 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6436.xml">
<!ENTITY RFC6470 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6470.xml">
<!ENTITY RFC6536 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6536.xml">
<!ENTITY RFC6639 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6639.xml">
<!ENTITY RFC6887 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6887.xml">
<!ENTITY RFC7223 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7223.xml">
<!ENTITY RFC7225 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7225.xml">
<!ENTITY RFC7277 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7277.xml">
<!ENTITY RFC7317 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7317.xml">
<!ENTITY I-D.ietf-netmod-syslog-model SYSTEM 
  "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-ietf-netmod-syslog-model-03.xml">
<!ENTITY I-D.ietf-netmod-acl-model SYSTEM 
  "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-ietf-netmod-acl-model-02.xml">
  <!ENTITY I-D.ietf-netmod-routing-cfg SYSTEM
  "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-ietf-netmod-routing-cfg-19.xml">
<!ENTITY I-D.ietf-netconf-restconf SYSTEM
"http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-ietf-netconf-restconf-04.xml">
<!ENTITY I-D.ietf-netconf-call-home SYSTEM
"http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-ietf-netconf-call-home-06.xml">
<!ENTITY I-D.ietf-netconf-restconf-collection SYSTEM
"http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-ietf-netconf-restconf-collection-00.xml">
<!ENTITY I-D.ietf-netconf-zerotouch SYSTEM
"http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-ietf-netconf-zerotouch-02.xml">
<!ENTITY I-D.ietf-isis-yang-isis-cfg SYSTEM 
  "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-ietf-isis-yang-isis-cfg-02.xml">
<!ENTITY I-D.ietf-ospf-yang SYSTEM 
  "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-ietf-ospf-yang-00.xml">
  <!ENTITY I-D.shaikh-idr-bgp-model SYSTEM  
  "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-shaikh-idr-bgp-model-01.xml">
  <!ENTITY I-D.zhdankin-idr-bgp-cfg SYSTEM 
  "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.zhdankin-idr-bgp-cfg.xml">
  <!ENTITY I-D.tsingh-bess-pbb-evpn-yang-cfg SYSTEM 
  "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-tsingh-bess-pbb-evpn-yang-cfg-00.xml">
  <!ENTITY I-D.zhuang-bess-evpn-yang SYSTEM 
  "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-zhuang-bess-evpn-yang-00.xml">
  <!ENTITY I-D.zhuang-bess-l3vpn-yang SYSTEM 
  "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-zhuang-bess-l3vpn-yang-00.xml">
    <!ENTITY I-D.liu-bess-mvpn-yang SYSTEM 
  "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-liu-bess-mvpn-yang-00.xml">
      <!ENTITY I-D.l3vpn-service-yang SYSTEM 
  "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-l3vpn-service-yang-00.xml">
<!ENTITY I-D.ietf-grow-bgp-gshut SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-ietf-grow-bgp-gshut-05.xml">
<!ENTITY I-D.white-grow-overlapping-routes SYSTEM
"http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-white-grow-overlapping-routes-01.xml">
<!ENTITY I-D.ietf-i2rs-problem-statement 
  SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-i2rs-problem-statement.xml">
<!ENTITY I-D.ietf-i2rs-architecture SYSTEM 
  "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-ietf-i2rs-architecture-09.xml">
<!ENTITY I-D.ietf-i2rs-usecase-reqs-summary SYSTEM 
  "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-ietf-i2rs-usecase-reqs-summary-01.xml">
<!ENTITY I-D.ietf-i2rs-rib-data-model SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-i2rs-rib-data-model.xml">
<!ENTITY I-D.ietf-i2rs-rib-info-model SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-i2rs-rib-info-model.xml">
<!ENTITY I-D.ietf-i2rs-yang-network-topo SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-i2rs-yang-network-topo.xml">
<!ENTITY I-D.zhang-i2rs-l1-topo-yang-model SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.zhang-i2rs-l1-topo-yang-model.xml">
<!ENTITY I-D.ietf-i2rs-yang-l2-network-topology SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-i2rs-yang-l2-network-topology.xml">
<!ENTITY I-D.kini-i2rs-fb-rib-info-model SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.kini-i2rs-fb-rib-info-model.xml">
<!ENTITY I-D.haas-i2rs-ephemeral-state-reqs SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.haas-i2rs-ephemeral-state-reqs.xml">
<!ENTITY I-D.hares-i2rs-info-model-service-topo SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.hares-i2rs-info-model-service-topo.xml">
<!ENTITY I-D.ietf-i2rs-traceability SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-i2rs-traceability.xml">
<!ENTITY I-D.ietf-i2rs-pub-sub-requirements 
      SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-i2rs-pub-sub-requirements.xml">
<!ENTITY I-D.mcpherson-irr-routing-policy-considerations SYSTEM
"http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-mcpherson-irr-routing-policy-considerations-01.xml">
<!ENTITY I-D.ietf-grow-bgp-gshut SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-ietf-grow-bgp-gshut-05.xml">
<!ENTITY I-D.ietf-pcp-authentication SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-ietf-pcp-authentication-09.xml">
<!ENTITY I-D.ietf-pcp-optimize-keepalives SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-ietf-pcp-optimize-keepalives-06.xml">
<!ENTITY I-D.ietf-pcp-proxy SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-ietf-pcp-proxy-08.xml">
<!ENTITY I-D.ietf-pcp-sdn-firewall SYSTEM "http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-ietf-sdn-firewall-00.xml">
<!ENTITY I-D.white-grow-overlapping-routes SYSTEM
"http://xml.resource.org/public/rfc/bibxml3/reference.I-D.draft-white-grow-overlapping-routes-01.xml">
<!ENTITY I-D.xia-ibnemo-icim SYSTEM
"http://xml.resource.org/public/rfc/bibxml3/reference.I-D.xia-ibnemo-icim.xml">
<!ENTITY I-D.xia-sdnrg-nemo-language SYSTEM
"http://xml.resource.org/public/rfc/bibxml3/reference.I-D.xia-sdnrg-nemo-language.xml">
<!ENTITY I-D.zhou-netmod-intent-nemo SYSTEM
"http://xml.resource.org/public/rfc/bibxml3/reference.I-D.zhou-netmod-intent-nemo.xml">
<!ENTITY I-D.xia-sdnrg-service-description-language SYSTEM
"http://xml.resource.org/public/rfc/bibxml3/reference.I-D.xia-sdnrg-service-description-language.xml">
]>

<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
 <?rfc toc="yes" ?>
 <?rfc symrefs="yes" ?>
 <?rfc sortrefs="yes"?> 
 <?rfc compact="yes" ?>
 <?rfc subcompact="no" ?>  
 <?rfc iprnotified="no" ?>
  <?rfc strict="no" ?>

<rfc category="std" docName="draft-zhang-gap-analysis-02.txt" ipr="trust200902">

 
<front>
<title abbrev="I2NSF Gap analysis">Analysis of Existing work for I2NSF</title>
	  <author fullname="Susan Hares" initials="S" surname="Hares">
      <organization>Huawei</organization>
      <address>
        <postal> 
          <street>7453 Hickory Hill</street>
          <!-- Reorder these if your country does things differently -->
          <city>Saline</city>
          <region>MI</region>
          <code>48176</code>
          <country>USA</country>
        </postal>
        <email>shares@ndzh.com</email>
      </address>
    </author>
	 <author fullname="Bob Moskowitz" initials="H" surname="Moskowitz">
      <organization>HTT Consulting</organization>
      <address>
	    <postal> 
		<street> </street>
		<city>Oak Park</city>
		<region>MI</region>
		<code>48237</code> 
		</postal>
        <email>rgm@labs.htt-consult.com</email>
      </address>
    </author>


      <author fullname="Hosneih Rozanak" initials="H." surname="Rozanak">
      <organization></organization>
      <address>
		  <postal> 
          <street></street>
          <city>Munich</city>
          <region></region>
          <code></code>
          <country>Germany</country>
        </postal>
		  <email>ietf@rozanak.com</email>
      </address>
	  </author>
	  
	  <author fullname="Dacheng Zhang " initials="D" surname="Zhang">
      <organization></organization>
      <address>
	      <postal> 
          <street> </street>
          <city>Beijing</city>
          <region></region>
          <code></code>
          <country>China</country>
        </postal>
        <email>dacheng.zdc@aliabab-inc.com</email>
      </address>
    </author>
<date year="2015" />
   <area>Security Area</area>
   <workgroup>I2NSF BOF</workgroup>
    <keyword>RFC</keyword>
     <keyword>Request for Comments</keyword>
     <keyword>I-D</keyword>
     <keyword>Internet-Draft</keyword>
     <keyword>I2NSF</keyword>

<abstract>
          
	 <t> This document analysis the status of the arts in industries and the 
   existing IETF work/protocols that are relevant to I2NSF. 
   </t>
   
</abstract>
</front>
<middle>
    
<section anchor="intro" title="Introduction">
   <t> This document provides an analysis of the gaps in state of the art two industry efforts, IETF and 
   Network Virtualized Functions (NFV) with Software Defined Network (SDN) that I2NSF
   proposed fills. I2NSF proposes an interoperable means of passing
   NSF provisioning rules and orchestration information between I2NSF client (security policy decision point),
   to I2NSF agent (security policy enforcement).  An interoperable I2NSF protocol 
   to will aid the orchestration of the provisioning services among 
   different network security functions/devices. </t> 
   <t> There are many network security functions being deployed and new ones 
   are popping up with business and application demands. In order to 
   have a concrete context for the protocols discussion, we start with 
   the following network security related functions: </t> 
   <t>
   <list style="symbols"> 
    <t> Firewall </t> 
	<t> DDOS/Anti-DOS </t> 
	<t> Access control/Authorization/Authentication </t> 
	<t> Remote identity management </t> 
	<t> Secure Key management </t> 
	<t> Intrusion Detection System/ Intrusion Prevention System (IDS/IPS) </t> 
	</list>
	</t> 
   <t> It is envisioned that clients of the I2NSF interfaces include 
   management applications, service orchestration systems, network 
   controllers, or user applications that may solicit network security 
   resources. 
   </t> 
   <t> Various aspects to I2NSF protocol include:</t>
   <t>
   <list style="symbols">
   <t> mechanisms to pass provisioning rules and orchestration information in a 
   common interoperable format,</t>
   <t> The mechanism for clients (applications) to 
   request security filters/provisioning from the I2NSF Agent, 
   write security filters/provisioning to the I2NSF Agent, and 
   validate information installed on the  
   physically located on I2NSF Agent,</t>
   <t> a means to get change interrupts when security filters change, and</t>
   <t> a means to provide logging of changes to provision information and
     filters.</t>
   </list>
   </t> 
   
</section> 
    
<section anchor="terms" title="Terms and Definitions">
<t></t> 
<section title="Requirements Terminology">
   <t>  The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119, BCP 14
   [RFC2119] and indicate requirement levels for compliant CoAP. </t>
</section>
 
 <section title="Definitions"> 
 <t>
 <list style="symbols">
 <t>Cloud DC: The data centers that are not on premises of enterprises 
   yet have the compute/storage resources that can be requested or 
   purchased by the enterprises. What the enterprises actually get is 
   Virtual Data Centers. </t> 
  <t> DC: Data Center</t> 
  <t> Domain: The term Domain in this draft has different connotations 
   in different scenarios: 
   <list style="symbols">
   <t> Client--Provider relationship, i.e. client requesting some 
   network functions from its provider; </t> 
   <t> Domain A - Domain B relationship, i.e. one operator domain 
   requesting some network functions from another operator domain; or 
   </t>
   <t> Applications -- Network relationship, i.e. an application (e.g. 
   cluster of servers) requesting some functions from network, etc. 
   </t> 
   </list>
   </t>
   <t> NSF - Network Security function</t>
   <t> I2NSF agent - a piece of software in a device that
       implements a network security function which 
       receives security provisioning and filters across
	   the I2NSF protocol in order provision and control the
       network security function. </t>
   <t> I2NSF client -  A security client software  that utilizes the
       I2NSF protocol to read, write or change the provisioning 
	   and filters in network security device via software interface
	   using the I2NSF protocol (denoted as I2RS Agent)</t>
   <t>I2NSF SPDP - I2NSF client which serves as a collections and 
    distribution point for security provisioning and filter data.</t> 
	<t> I2NSF SEP - I2NSF agent which services as a insertion point 
	 for the security provisioning and filters in a NSF.</t>
   <t>Virtual Security Function: a security function that can be 
   requested by one domain but may be owned or managed by another 
   domain. </t> 
    <t> Cloud-based security functions: NSF hosted and managed by
	service providers or different administrative entity.</t>    
	</list>
	</t>
 </section> 
</section>
<section title="Summary of Gap Analysis Points" >  
<t>On early focus on ACL policy enforcement on traffic entering a 
network is the 1990s COPS design (PEP and PDP) as shown in figure 1. 
The Policy decision point kept network-wide policy (E.g. ACLs) and sent it to
Policy enforcements who then would control what data flows between the two  
These decision points controlled flow from PEP to PEP. 
</t> 
<t> 
<figure>
<artwork>
              PDP
   +-----+    /  \    +-----+
   |PEP1 |--/     \---|PEP2 |
   |     | ACL/policy |     |
   | 	 |	          |     |
 --| ----|------------|-----|-----
   +-----+  data flow +-----+
   
           Figure 1 
</artwork>
</figure>
</t>
<t> 
Today's security devices in 2015 replicate the same concept. 
The I2NSF Security provisioning policy/filter decision point (SPDP) and the 
I2NSF Agent Security Enforcement point (SEP) still look to
control this flow through secure devices (see figure 2.).  
</t>
<t> 
<figure>
<artwork>
             +---------+    
             | I2NSF   |       
             | SPDP    |   
             |         | 
             +---------+    
   +-----+    /  \    +-----+
   | SEP |--/     \---| SEP |
   |     |            |     |
 --| ----|------------|-----|-----
   +-----+  data flow +-----+
   
     Figure 2 
   
</artwork>
</figure>
</t>
<t> The other security protocols work to interact to create 
the additional pieces of security the flows for users as follows 
(see figure 3): 
<list style="symbols"> 
<t> SACM - examines if policy and reality match. It asks the questions
"Have proper policies been pushed to the proper place", and
 "Has any policy been compromised?" </t>  
<t> MILE - looks at events that go Bump in night in the Security 2015. 
MILE examines when events need to be reported or correlated. A MILE configuration 
is a policy pushed out by the SPDP </t> 
<t> DOTS - picks up security the flow for when things go really wrong
during security attacks. In this case, an SEP needs to be able
to SCREAM for help, to get other SEP to ease its pain. 
DOTS policy is pushed out via SPDP.
</t>     
<t>I2NSF may connect to all of these devices to gather
information about the security policy that is pushes down to
I2NSF agent.  I2NSF provides a common interface between an I2NSF
client as a SPDP and the NSF security boxes with SEP agents (which may also
DOTS agent or Mile agent).
</t>
</list>    
</t> 
<t> 
<figure>
<artwork>
             +---------+     +------+
   +------+  | I2NSF   |=====| DOTS |    
   |SCAM  |  | SPDP    |     |client|----
   |client|==|         |     +------+   |
   +------+  |         |     +------+   |
             |         |     |MILES |   |
 +------+    |         |     |client|   |
 |SCAM  |    +---------+     +----:-+   |
 |Agent |       / \               :     |
 +------+      /   \              :     |
   +-----+    /     \    +-----+  :     |
   | SEP |--/        \---| SEP |  :     |
   |     |               |     |  :     |
   |     |               |MILES|..:     |
   |     |               |Agent|        |
   |     |               |DOTS |        |
   |     |               |Agent|---------
 --| ----|---------------|-----|-----
   +-----+  data flow    +-----+
   
     Figure 3 
   
</artwork>
</figure>
</t>
</section>
<section title="Analysis of NFV Status of the Arts in Industry">
<t>  Network Function Virtualization (NFV) provides the service providers 
   with flexibility, cost effective and agility to offer their services 
   to customers. One such service is the network security function which
   guards the exterior of a service provider or its customers. 
    </t>
   <t> The flexibility and agility of NFV encourages service providers
   to provide different products to address business trends in their 
   market to provide better service offerings to their end user.  
   A traditional product such as the network security function (NSF)
   may be broken into multiple virtual devices each hosted from another
   vendor. In the past, network security devices may have been single 
   sourced from a small set of vendors - but in NFV version of NSF devices,
   this reduced set of sources will not provide a competitive edge. 
   Due to this market shift, the network security device vendors are 
   realizing that the proprietary provisioning protocols and formats 
   of data may be a liability.  Out of the NFV work has arisen
   a desire for a single interoperable network security device 
   provisioning and control protocol.   
   </t>  
   <t>The I2NSF will be deployed along networks using other security
   and NFV technology.  As section 3 described, the NFV NSF
   security is deployed along side other security functions 
   (AAA, DOTS, MILE, SCREAM devices) or deep-packet-inspection. The I2NSF will be deployed with routing functions
   that are configured by NETCONF/RESTCONF or I2RS which control
   the provisioning and management of the L1, L2, l3 and service pathways
   through the network.     
   </t>
   <t>In the NFV-related productions, the current architectures does not
   have a protocol to maintain an interoperability provisioning from 
   I2NSF client to I2NSF agent. The result is that service providers
   have to manage the interoperability between private protocols.  In
   response to this problem, the device manufacturers and the service
   providers have begun to discuss an I2NSF protocol for interoperable
   passing of provisioning and filter in formation. 
   </t>
   <t> Open source work (such as OPNFV) provides a common code base
   for providers to start their NFV work from.  However, this code
   base faces the same problem.  There is no defacto standard protocol. 
  </t> 
</section>
<section title="Comparison of Current IETF Works">
<t>The following sections describes compares the current work in
the IETF with the I2NSF.  To provide an easier way of reviewing
this work, the working groups in the IETF are addressed via
Areas of work.  The work of each working group (WG) is summarize and compared
with I2NSF. </t>
<section title="Network Management and Operations">
<section title="Anima" >
<t>Summary of Anima</t>
<t>ANIMA (Autonomic Networking Integrated Model and Approach) introduces 
   a control paradigm where network processes, driven by objectives (or 
   intent), coordinate their local decisions, autonomically translate 
   them into local actions, and adapt them automatically according to 
   various sources of information including external information and 
   protocol information bases. </t>
   <t> ANIMA first step to is develop the platform that these 
   autonomic network processes can run on. </t> 
<t>ANIMA will develop protocols to achieve auto discovery among 
   management system and devices. The listed drafts proposed include:
   <list style="symbols"> 
   <t> The configuration discovery and negotiation protocol designed to be a generic 
   platform, which is independent from the negotiation contents. There are 
   also security aspects being discussed in the ANIMA drafts such as 
   secure messages and keys which are passed among the discovered parties. 
  </t> 
  </list></t> 
  <t> Diagram of Anima: (TBD) </t> 
  <t> Anima drafts 
  <list style="symbols">
  <t> Anima has no WG drafts </t>
  </list></t>
  <t> Why I2NSF is different than ANIMA </t>
  <t> I2NSF is to develop application /user oriented policies (the 
   attributes, the profiles, or the descriptors) of the network security 
   functions that clients can request/query from 3rd party providers. 
  </t> 
</section> 
<section title="COPS">
<t>COPS had a design of Policy Enforcement Points (PEP), and policy Decision Points (PDP)
as shown in figure 3. These decision points controlled flow from PEP to PEP. 
</t> 
<t> Why COPS is no longer used </t> 
<t> Security in the network in 2015 uses specific devices
(IDS/IPS, NAT firewall, etc) with specific policies and profiles
for each types of device. No common protocol or 
policy format exists between the 
policy manager (PDP) and security enforcement points.  As described
above, the security policy enforcement has 
security policy decision points (SPDP) and security enforcement points (SEP).
Today's security Policy Decision points exist where policy 
and services come together in a convenient place to push out 
SEP.</t>
<t> COPs RFCs: <xref target="RFC4261"></xref>, <xref target="RFC2940"></xref>, 
<xref target="RFC3084">,</xref>, <xref target="RFC3483">,</xref> 
</t>
<t> Why I2NSF is different COPS </t>
<t> COPS was a protocol for all policy (security, flow, and others).
I2NSF creates a common protocol between security policy decision points (SPDP)
and security enforcement points (SEP). Today's security devices currently only
proprietary protocols. Manufacturers wold like a security specific policy enforcement
protocol rather than a generic policy protocol.
</t>
</section> 
<section title="NETCONF/RESTCONF ">
<t>Summary of IETF NETCONF WG </t>
<t> 
IETF NETCONF working group has developed the basics
of the NETCONF protocol focusing on secure configuration and 
querying operational state.  The NETCONF protocol <xref target="RFC6241"></xref> may be
run over TLS <xref target="RFC6639"></xref> or SSH (<xref target="RFC6242"></xref>. 
NETCONF can be expanded to defaults <xref target="RFC6243"></xref>, 
handling events (<xref target="RFC5277"></xref> and basic notification 
<xref target="RFC6470"></xref>, nd filtering writes/reads based on 
network access control models (NACM, <xref target="RFC6536"></xref>).
The NETCONF configuration must be committed to a configuration data store
(denoted as config=TRUE).  Yang models identify nodes within a configuration datastore
or an operational data store using a XPath expression (document root ---to --- target source).  
NETCONF uses an RPC model and provides protocol for handling configs (get-config, edit-config, copy-config, delete-config, lock, unlock, get) and sessions (close-session, kill-session). 
The NETCONF Working Group has developed RESTCONF which is an 
HTTP-based protocol that provides a programmatic interface for 
accessing data defined in YANG, using the datastores defined in NETCONF.
</t> 
<t> 
RESTCONF supports “two edit condition detections” – time stamp and entity tag.
RESTCONF uses a URI encoded path expressions.  RESTCONF provides operations to
get remote servers options (OPTIONS),  retrieve data headers (HEAD), get data (GET),
create resource/invoke operation (POST), patch data (PATCH), 
delete resource (DELETE), or query.  
</t>
<t> 
At this time, RESTCONF does not handle the ephemeral datastore proposed by I2RS (see Routing Area)
at this time (see I2RS working group for details on I2RS).  RESTCONF also does not
promise to provide the real-time programmatic interface I2RS requires.    
</t>
<t> 
NETMOD developed initial Yang models for interfaces <xref target="RFC7223"></xref>),
IP address (<xref target="RFC7277"></xref>),
IPv6 Router advertisement (<xref target="RFC7277"></xref>), 
IP Systems (<xref target="RFC7317"></xref>) with system ID,
system time management, DNS resolver, Radius client, SSH, 
syslog (<xref target="I-D.ietf-netmod-syslog-model"></xref>), 
ACLS (<xref target="I-D.ietf-netmod-acl-model"></xref>), 
and core routing blocks (<xref target="I-D.ietf-netmod-routing-cfg"></xref>
The routing working group (rtgwg) has begun to examine policy for routing and tunnels. 
</t>
<t>
Protocol specific Working groups have developed yang models for 
ISIS (<xref target="I-D.ietf-isis-yang-isis-cfg"></xref>), 
OSPF (<xref target="I-D.ietf-ospf-yang"></xref>), and 
BGP ( merge of <xref target="I-D.shaikh-idr-bgp-model"></xref> and 
<xref target="I-D.zhdankin-idr-bgp-cfg"></xref> with the bgp policy 
proposed multiple Working groups (idr and rtgwg)).  BGP Services yang models
have been proposed for PPB EVPN (<xref target="I-D.tsingh-bess-pbb-evpn-yang-cfg"></xref>), 
EVPN (<xref target="I-D.zhuang-bess-evpn-yang"></xref>), 
L3VPN (<xref target="I-D.zhuang-bess-l3vpn-yang"></xref>), 
and multicast MPLS/BGP IP VPNs (<xref target="I-D.liu-bess-mvpn-yang"></xref>).
</t> 
<t> 
<figure>
<artwork>
                    netconf
   +-------------+    /  \     +----------+
   |Device:config|-- /     \---|Device:   |
   |operational  |             | Config   |
   |state (oper) |             | oper, ACL|
   | ACL, policy |             | routing  |
   | for Routing)|             | Policy   |
 --| ------------|-------------|----------|-----
   +-------------+  data flow  +----------+
   
        Figure 4
</artwork>
</figure>
</t>
<t> NETCONF and RESTCONF manage device layer yang models. However
as figure 5 shows, there are multiple levels of device levels,
network-wide level, and application level yang modules.   
<figure>
<artwork>
+--------------------------------------------+
|Application Network Wide: Intent            |
+--------------------------------------------+
|Network-wide level: L3SM L3VPN service model|
+--------------------------------------------+
|Device level: Protocol Independent: I2RS    |
| RIB, Topology, Filter-Based RIB            |
+--------------------------------------------+
|Device Level:Protocol Yang modules          |
| (ISIS, OSPF, BGP, EVPN, L2VPN, L3VPN, etc.)    
+--------------------------------------------+
| Device level: IP and System: NETMOD Models | 
| (config and oper-state), tunnels           |
+--------------------------------------------+  
 
 Figure 5 levels of Yang modules 
 </artwork>
</figure>
</t>
<t> RFCs for NETCONF </t> 
<t> 
<list style="symbols">
<t> <xref target="RFC6242">NETCONF </xref> </t>
<t> <xref target="RFC6022">NETCONF monitoring </xref> </t>
<t> <xref target="RFC6242">NETCONF over SSH </xref></t>
<t> <xref target="RFC5539">NETCONF over TLS </xref></t>
<t> <xref target="RFC6470">NETCONF system notification></xref></t>
<t> <xref target="RFC6536">NETCONF access-control (NACM)</xref></t>
<t> <xref target="I-D.ietf-netconf-restconf">RESTCONF </xref></t>
<t> <xref target="I-D.ietf-netconf-call-home">NETCONF-RESTCONF call home </xref></t>
<t> <xref target="I-D.ietf-netconf-restconf-collection">RESTCONF collection protocol </xref></t>
<t> <xref target="I-D.ietf-netconf-zerotouch">NETCONF Zero Touch Provisioning </xref></t>
</list>
</t> 
<t> How I2NSF is different than NETCONF </t> 
<t> NETCONF and RESTCONF are protocol for configuration of routing and IP devices,
and monitoring of operational state. I2NSF seeks to create an interoperable
protocol to pass security provisioning and filtesr. </t> 
<t> What I2NSF can use from NETCONF </t> 
<t>I2NSF should consider using NETCONF/RESTCONF protocol for capability layer to 
communicate the security data models to the designated security 
functions. </t>
</section>
<section title="IETF L3SM">
<t> Beyond the device level yang models for network elements, 
protocol’s configuration, operational status, or ephemeral state (I2RS),  
there is the goal of a full system configuration allows deployment of services
across networks. Services are built from a combination of network element
and protocol configuration, but are specified to service users in more abstract terms.
The Layer Three Virtual Private Network Service Model (L3SM) working group
is a short-lived WG tasked to create a YANG data model that describes a L3VPN
service (a L3VPN service model) that can be used for communication between customers
and network operators, and to provide input to automated control and configuration
applications. This L3VPN service model is not an L3VPN configuration model. That is,
it does not provide details for configuring network elements or protocols. Instead
it contains the characteristics of the service, as discussed between the operators
and their customers. A separate process is responsible for mapping this L3VPN
service model (see figure 4) onto the protocols and network elements depending on
how the network operator chooses to realize the service.  The starting point for this
L3VPN model is <xref target="I-D.l3vpn-service-yang"></xref>.
</t> 
<t> Status and Relevance </t>
<t> IETF L3SM working is an approved IETF working group with a draft written by 
authors who are operators at BT, Orange, Verizon, and ATT.  This network-wide
service model is at a network-wide level of service. 
</t> 
</section> 
<section title="NEMO BOF">
<t>
NeMo provides a simple transaction based Intent-based NBI, 
enabling applications to create, modify and takedown virtual 
networks built on virtual nodes with policy-controlled flows. 
The NeMo Intent NBI allows an application to communicate with a controller, 
providing the following group of commands: 
<list style="symbols">
<t> entity group: (un)node (un)link, (un)flow </t>
<t> capabilities: (un)policy, query, notification, connect, disconnect, commit, and withdraw,
</t>
<t> model: Node Model, Link Model, and Link model. </t>
</list>
</t>
<t>
An application exchanges NeMo commands, using the REST Protocol to a controller running a Nemo
language processing engine, to instruct the controller to set up a virtual network of nodes
and links with flow policy to control the data flows across the network links.  
NeMo uses an application’s view of the compute, storage, and network to allow an
application to set any grouping of compute, storage, or network as a virtual node.
This allows the application to decide what constitutes a compute node and what constitute
 a link and a flow.  From the application’s viewpoint, it intends to connect two or 
 more nodes in a network.  It does not matter to the application if the node is a
 single virtual machine (VM) or a cluster of interconnected compute
 and storage devices with many network connections. NeMo’s NBI API hides this
 complexity, making the application’s commands prescriptive and simple.   The  
</t>
<t>Nemo language engine in the controller is associated with a model that allows a 
group of applications to have a set of pre-loaded definitions (model semantics)
for nodes, flows, or policy.  For example, a company nodes could be defined along with the necessary flows for accounting traffic or big-data transfers.   
</t>
<t>NEMO Documents
<list style="symbols">
<t><xref target="I-D.xia-ibnemo-icim">Intent Common Information Model (and definitions)</xref>,
</t> 
<t> <xref target="I-D.xia-sdnrg-nemo-language">NEMO (NEtwork MOdeling Language)</xref>,
</t>
<t><xref target="I-D.zhou-netmod-intent-nemo">Yang Data Model for Intent-Based NEMO</xref> </t>
<t><xref target="I-D.xia-sdnrg-service-description-language">Requirements for Intent language(description, not title)</xref></t>
</list>
</t>
<t> Relevance to I2NSF 
</t>
<t>The Intent-based or Declarative policy may be an aspect of the I2NSF
customer requests.  It is not directly related to the I2NSF Client to I2NSF Agent 
protocol passing provisioning  work.
</t> 
<t>Status of Nemo</t>
<t>
In 2014, the NEMO project provided an early proof-of-concept code demos 
(Layer123, CNV2015, IETF92) for an Intent-Based interface that uses a 
domain specific language.   Nemo is moving this work into two open 
Source projects (ODL Nemo, OPNFV Movie) and work at IETF’s open-source projects.
</t>
</section>
<section title="SUPA BOF">
<t>The IETF SUPA (Simplified Use of Policy Abstractions) BOF 
is proposing an IETF Working Group to  develop a set of information models for
 defining standardized policy rules at different levels of abstraction, and 
 will show how to map these (technology-independent) forms into YANG data models. 
 The BOF introduces the concepts of multi-level (multiple levels of abstraction) (similar to figure 5)
 and multi-technology (e.g., IP, VPNs, MPLS) network abstractions to address
 the current separation between development and deployment operations. Multiple levels
 of abstraction enable common concepts present in different technologies and
 implementations to be represented in a common manner. This facilitates using diverse
 components and technologies to implement a network service.
 </t>
 <t> 
Three information models are envisioned:
<list style="symbols">
<t> A generic information model that defines concepts needed by
 policy management independent of the form and content of the policy.
 </t>
 <t> A more specific information model that refines the generic information model
 to specify how to build policy rules of the event-condition-action paradigm. </t>
 <t> A more specific information model that refines the generic information model
 to specify how to build policy rules that declaratively specify what goals to
 achieve (but not how to achieve those goals). </t>
 </list>
 </t>
 <t> The set of generic policy information models in SUPA's work will be mapped to a
 set of concrete YANG data models. These data models will provide a set of core 
 YANG modules that define how to manage and communicate policies, expressed using
the event-condition-action paradigm or the declarative goal-oriented paradigm,
between systems.
</t> 
<t> The SUPA BOF/WG plans to focus in the first phase of its work on completing
the set of information models required to construct an extensible, 
policy-based framework. These information models will lead to a set
of core YANG data models for a policy-based management framework to 
monitor and control network services.
</t>
<t> The working group will use the distributed data center (DDC) use case,
 which includes the dynamic policy-driven provisioning and operation of
 inter-datacenter (inter-dc) virtual private networks (VPNs) of various types, as a 
 means to validate that the generic policy-framework is implementable and usable.
 </t> 
<t> I2NSF versus SUPA BOF work </t> 
<t> I2NSF is focus on passing policies between I2NSF client and 
I2NSF Agent in an interoperable format. The SUPA policies are more generic
policies (Prescriptive Event-Condition-Action and declarative/Intent-based. 
The protocol between the I2NSF Client and I2NSF agent is specific to 
the security policies. If SUPA was completed now, it might provide wisdom for 
the I2NSF interoperable protocol.  With SUPA running in parallel, the generic 
models may or may not provide timely advise to structure I2NSF protocol. 
</t>
</section> 
</section>
<section title="Internet"> 
<section title="PCP">
<t>
As indicated by the name, the Port Control Protocol (PCP) enables an 
IPv4 or IPv6 host to flexibly manage the IP address and port mapping 
information on Network Address Translators (NATs) or firewalls, to 
facilitate communication with remote hosts. </t>
 <t> PCP RFCs: 
 <list> 
 <t><xref target="RFC6887"></xref>
 </t>
<t> <xref target="RFC7225"></xref> 
</t>
<t><xref target="I-D.ietf-pcp-authentication"></xref>
</t>
<t><xref target="I-D.ietf-pcp-optimize-keepalives"></xref>
</t>
<t> <xref target="I-D.ietf-pcp-proxy"></xref>
</t>
</list>
</t> 
<t> Why is I2NSF different from PCP: </t>
<t>  Here are some aspects that I2NSF is different from PCP: 
<list style="symbols">
<t> PCP only support the management of port and address information 
   rather than any other security functions 
   </t> 
<t> We must cover the proxy, firewall and NAT box proposals in I2NSF </t>
</list></t>
</section> 
<section title="Midcom">
<t> Midcom Summary:</t>
<t> summary TBD</t>
<t> MidCom RFCs:</t>
<t> RFCs </t> 
<t> Why I2NSF is different than Midcom </t> 
<t> TBD </t>
<t> explanation of differences </t> 
</section> 
</section> 
   <section title="Routing">
   <section title="I2RS">
   <t>Summary of I2RS  </t>
   <t>The IETF I2RS Working group is working on an interface to 
   the routing system that facilitates a real-time or event driven
   interaction with the routing system through a collection of protocol-based
   control or management interfaces. These allow information, policies, and 
   operational parameters to be injected into and retrieved (as read or by notification)
   from the routing system while retaining data consistency and coherency across the 
   routers and routing infrastructure, and among multiple interactions with the 
   routing system. The I2RS interfaces co-exist with existing configuration
   and management systems and interface that focus on configuring, managing,
   or monitoring information on the routing system in a device.
  </t> 
<t> A short description of the problem that I2RS is trying to solve can be found in 
<xref target="I-D.ietf-i2rs-problem-statement"></xref> 
It is envisioned that users of the I2RS interfaces will be management applications,
network controllers, and user applications that make specific demands on the network.
The use case requirements are described in 
<xref target="I-D.ietf-i2rs-usecase-reqs-summary"></xref>
for protocol independent RIBs, topologies, and filter-rules and for 
protocol dependent use cases for BGP, OSPF, ISIS, CCNE, SFC, traffic steering, 
MPLS-TE, MPLS-LDP, Mobile Backhaul(MBB) uses, large data flows, 
large data collection systems, and CDNI. The I2RS Architecture 
<xref target="I-D.ietf-i2rs-architecture"></xref>
 states the I2RS will be data-model driven.   
 </t>
 <t> I2RS has three protocol independent models: 
 <list style="symbols">
<t> I2RS RIB <xref target="I-D.ietf-i2rs-rib-data-model"></xref>
(<xref target="I-D.ietf-i2rs-rib-info-model"></xref>, </t>
<t> I2RS Topology models (generic, L1, L2, L3, and service topology) 
<list style="symbols">
<t> Generic topolgoy <xref target="I-D.ietf-i2rs-yang-network-topo"></xref></t>
<t> L1 topology <xref target="I-D.zhang-i2rs-l1-topo-yang-model"></xref>, 
</t>
<t> L2 Topology <xref target="I-D.ietf-i2rs-yang-l2-network-topology"></xref>", 
</t>
<t> L3 Topology (draft-ietf-i2rs-yang-l3-topo-00"), and
</t> 
<t> service topology model <xref target="I-D.hares-i2rs-info-model-service-topo"></xref>.
</t>
</list></t>
<t>Filter-Based RIB topology <xref target="I-D.kini-i2rs-fb-rib-info-model"></xref>.
</t>
  </list>
  </t>
<t>
  The I2RS WG has a policy of re-use of existing technology where possible.
  One of the potential re-uses is the enhancement of the NETCONF protocol <xref target="RFC6241"></xref>, 
  or RESTCONF <xref target="I-D.ietf-netconf-restconf"></xref>, and the use of the netmod (RFC6020)
  for the data models.  In June 2015, I2RS is finalizing the requirements for changes
  in the netconf protocol.  Existing requirements include: 
  </t>
  <t>
  <list style="symbols">
  <t> requirements for I2RS’s ephemeral state <xref target="I-D.haas-i2rs-ephemeral-state-reqs"></xref>
    that provides writing/reading of real-time state, </t>  
  <t> requirements for traceability framework and information model described in 
     <xref target="I-D.ietf-i2rs-traceability"></xref>, </t>
  <t> requirements for subscriptions to datastores 
     <xref target="I-D.ietf-i2rs-pub-sub-requirements"></xref>, and </t>
  <t> mutual authentication requirements and transport requirements (draft pending).</t>
</list>
</t>
<t> I2RS modules have been proposed for ephemeral state for protocol dependent 
units for OSPF, ISIS, BGP, MPLS-TE, MPLS-LDP, SFC forwarding, and SFC filter-based rules.  
</t>
<t>Pre-standard implementations of I2RS protocol exist in Juniper and other vendors. </t>
<t> Why I2NSF is different than I2NSF </t> 
<t> I2NSF focus is on an interoperable protocol that passes policy between the
I2NSF client and the I2NSF AGent.  The I2RS client passes ephemeral state for
configuration and operational state for protocol and protocol-independent yang modules.
A part of this state may be the routing policy that applies to a routing agent. 
The specific policies for a network security devices are not consider in I2RS at this time.
</t>
<t> What I2NSF can use from I2RS </t> 
<t> I2NSF may want to use I2RS ephemeral state (configuration and operational)
as it manages, monitors, or handles NSF devices.  The I2NSF may want to re-use
I2RS protocol or modules to pass this ephemeral state. 
</t> 
<t>I2RS Status </t>
<t> Status and Relevance
IETF I2RS is nearing the end of its initial definition cycle for protocol independent
yang models and its protocol requirements for NETCONF Working Group.  If protocol
additions to netconf’s protocol and netmod’s yang modules for the I2RS ephemeral 
state can be finalized in June, then early implementation of the I2RS code may
appear in the summer with the IETF hack-a-thon.   Movement of I2RS code is possible
into ODL, Cisco, Juniper, Ericsson, Huawei, Brocade, Dell and PacketDesign as authors from these companies have joined together to create the I2RS drafts.  
An I2RS interface into all routers will provide a programmatic interface for many routing stacks.
</t> 
</section> 
   <section title="SFC">
   <t>Summary of SFC: </t>
   <t> IETF SFC is about mechanism of chaining together service functions; 
   IETF SFC treats all those Service Functions as black box. This means that
   the SFC mechanism do not care what actions those functions are performing. 
   SFC defines the SFC header to carry Metadata with payload to those functions. But 
   SFC mechanism do not specify what content is encoded in the metadata. 
   </t> 
   <t> diagram of SFC: TBD </t> 
   <t> SFC RFCs (TBD) </t> 
   <t> Why I2NSF is different: </t>
   <t> 
   I2NSF is targeted to define the descriptor (the actual rules and 
   policies) of the network security functions needed and the 
   negotiation scheme. 
   </t>
   </section> 
   </section>  
<section title="Transport Area">
 <section title="NSIS - Next steps in Signalling">
 <t>  NSIS is for standardizing an IP signaling protocol (RSVP) along data 
   path for end points to request its unique QoS characteristics, unique 
   FW policies or NAT needs (RFC5973) that are different from the FW/NAT 
   original setting. The requests are communicated directly to the 
   FW/NAT devices. NSIS is like east-west protocols that require all 
   involved devices to fully comply to make it work. </t>
   <t> NSIS is path-coupled, it is possible to message every participating 
   device along a path without having to know its location, or its 
   location relative to other devices (this is particularly a pressing 
   issue when you've got one or more NATs present in the network, or 
   when trying to locate appropriate tunnel endpoints). 
   </t>
   <t>A diagram should be added here showing I2NSF and NSIS 
   </t>
   <t> Why I2NSF is different than NSIS: 
   <list style="symbols">
   <t> The I2NSF requests form clients do not go directly to network
   security devices, but instead to controller or orchestrator that can 
   translate the application/user oriented policies to the involved devices
   in the interface that they support. </t>
   <t> The I2NSF request does not require all network functions in a path to comply, 
   but it is a protocol between the I2NSF client and the I2NSF Agent in the controller
   and orchestrator </t> 
   <t> I2NSF defines clients (applications) oriented descriptors (profiles, or 
   attributes) to request/negotiate/validate the network security functions that
   are not on the local premises. </t>
   </list>
   </t>
   <t> Why we belief I2NSF has a higher chance to be deployed than NSIS: 
   <list style="symbols">
   <t> Open Stack already has a proof-of-concept/preliminary implementation, but the specification
   is not complete. IETF can play an active role to make the specification for I2NSF
   complete. IETF can complete and extend the OpenStack implementation to 
   provide an interoperable specification that can be needs and requirements of
   operators that is workable for suppliers of the technology. The combination of an
   carefully designed interoperable IETF specification with an open-source code development
   Open Stack will leverage the strengths of the two communities, and expand the informal   
   ties between the two groups. A software development cycle has the following components:
   architecture, design specification, coding, and interoperability testing.  The 
   IETF can take ownership of the first two steps, and provide expertise and
   a good working atmosphere (in hack-a-thons) in the last two steps for OpenSTack or
   other open-source coders. 
   </t> 
   <t> IETF has the expertise in security architecture and design for interoperable protocols that
   span controllers/routers, middle-boxes, and security end-systems. 
   </t> 
   <t> IETF has a history of working on interoperable protocols or virtualized
   network functions (L2VPN, L3VPN) that are deployed by operators in 
   large scale devices. IETF has a strong momentum to create virtualized network
   functions (see SFC WG in routing) to be deployed in network boxes. 
   [Note: We need to add SACM and others here].
   </t> 
   </list>
   </t>
   </section>   
   <section title="VNFPool BOF">
   <t>VNFpool is about the reliability and availability of the virtualized 
   network functions. But none of them address how service functions are 
   requested, or how service functions are fulfilled. 
   </t> 
   <t> drawing for VNF-Pool </t>
   <t> RFCs for VNF-Pool </t> 
   <t> Why I2NSF is different than the VNFPool BOF Proposal </t> 
   <t>VNFpool does not cover the protocol for provisioning a NSF (e.g. rules for the 
   requested FW) from the I2NSF clients to I2NSF Agent. VNFPool examined a way 
   to provide an interoperable protocol manage the VNF pools from different vendors.
    With VNFpool (as well as SFC),  NSF functions (such as Firewall function)
   are treated as a black box, that is treated in same way as 
   Video Optimization function.   </t>
   </section> 
   </section>
</section>
<section anchor="IANA" title="IANA Considerations">
      <t>No IANA exist for this document. </t>
    </section>
 <section title="Security Considerations">
 <t> No security considerations are involved with 
   a gap analysis.</t>
</section>
</middle>
<back>
   <references title="Normative References">
      &RFC791;
      &RFC2119;
    </references>
 <references title="Informative References">
      &RFC2940;
	  &RFC3084;
	  &RFC3483;
	  &RFC3484;
	  &RFC4261;
      &RFC4949;
	  &RFC5277;
	  &RFC5539;
	  &RFC6022;
	  &RFC6241;
	  &RFC6242;
	  &RFC6243;
	  &RFC6436;
	  &RFC6470;
	  &RFC6536;
	  &RFC6639;
	  &RFC6887;
	  &RFC7223;
	  &RFC7225;
	  &RFC7277;
	  &RFC7317;
	  &I-D.ietf-netmod-syslog-model;
	  &I-D.ietf-netmod-acl-model;
	  &I-D.ietf-netmod-routing-cfg;
	  &I-D.ietf-netconf-restconf;
	  &I-D.ietf-netconf-call-home; 
	  &I-D.ietf-netconf-restconf-collection;
	  &I-D.ietf-netconf-zerotouch;
	  &I-D.ietf-isis-yang-isis-cfg;
	  &I-D.ietf-ospf-yang;
 	  &I-D.ietf-i2rs-architecture;
  	  &I-D.ietf-i2rs-usecase-reqs-summary;
	  &I-D.ietf-i2rs-problem-statement;
	  &I-D.ietf-i2rs-rib-data-model;
	  &I-D.ietf-i2rs-rib-info-model;
	  &I-D.ietf-i2rs-yang-network-topo;
	  &I-D.zhang-i2rs-l1-topo-yang-model;
	  &I-D.ietf-i2rs-yang-l2-network-topology; 
	  &I-D.kini-i2rs-fb-rib-info-model;
	  &I-D.haas-i2rs-ephemeral-state-reqs;
	  &I-D.hares-i2rs-info-model-service-topo;
	  &I-D.ietf-i2rs-traceability;
	  &I-D.ietf-i2rs-pub-sub-requirements;
	  &I-D.shaikh-idr-bgp-model;
	  &I-D.zhdankin-idr-bgp-cfg;
	  &I-D.tsingh-bess-pbb-evpn-yang-cfg;
	  &I-D.zhuang-bess-evpn-yang;
      &I-D.zhuang-bess-l3vpn-yang;
	  &I-D.liu-bess-mvpn-yang;
	  &I-D.ietf-pcp-proxy;
	  &I-D.ietf-pcp-optimize-keepalives;
	  &I-D.ietf-pcp-authentication;
	  &I-D.l3vpn-service-yang;
	  &I-D.xia-ibnemo-icim;
	  &I-D.xia-sdnrg-nemo-language;
	  &I-D.zhou-netmod-intent-nemo;
	  &I-D.xia-sdnrg-service-description-language;
	  </references>
</back>
</rfc>