Robert Wilton has entered the following ballot position for
draft-ietf-i2nsf-nsf-facing-interface-dm-21: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/blog/handling-iesg-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-i2nsf-nsf-facing-interface-dm/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Hi,

Thanks for this document.  I have a few relatively minor comments:

3.2.  Event Clause

 - It looks like your tree diagram is reproduced twice?

 3.3.  Condition Clause

How do the conditions combine?  E.g., if I set both fields in ipv4 and ipv6 in
the same rule?  Is the requirements that all fields set in the condition must
match for the rule to be evaluated?  Perhaps this could be clarified here, and
in the description of the condition container in the YANG module.

In terms of the YANG:

     identity priority-by-order {
       base priority-usage;
       description
         "Identity for priority by order. This indicates the
          priority of a security policy rule follows the order of the
          configuration. The earlier the configuration is, the higher
          the priority is.";
     }

Except for the base identities, where it helpful for the description to make it
clear that it is a base identity, I don't think that you need text like
"Identity for priority by order", although strictly is does no harm either. 
I'll leave it to the authors to decide whether they change this, but if you do,
then please consistently change it for all non base identities.

     identity disk-alarm {
       base system-alarm;
       description
         "Identity for disk alarm. Disk is the hardware to store
          information for a long period, i.e., Hard Disk and Solid-State
          Drive. A disk-alarm is emitted when the disk usage is
          exceeding a threshold.";
       reference
         "draft-ietf-i2nsf-nsf-monitoring-data-model-14: I2NSF NSF
          Monitoring Interface YANG Data Model - System alarm for disk";
     }

Would "storage-alarm" be a better generic name than disk-alarm?

     identity device-type {
       description
         "Base identity for types of device. This identity is used for
          type of the device for the source or destination of a packet
          or traffic flow.";
       reference
         "draft-ietf-i2nsf-capability-data-model-26:
          I2NSF Capability YANG Data Model";
     }

I assume that in many cases, particular packet flows, then NSF would not be
able to know what type of device it was?  I wasn't quite sure how this would
work.

     identity redirection {
       base egress-action;
       description
         "Identity for redirection. This action redirects the packet to
          another destination.";
     }

Could the description clarify the difference between redirection and forwarding
please?

5.  XML Configuration Examples of Low-Level Security Policy Rules

Should all the example rules have the same name?  Would they be expected to
have different names?

Am I right in understanding that a rule in figure 6 (or 7) are combined with
the rule in figure 8.  If so, what in the policy actually binds these together
so that the NSFs know to work together?  Is it the common name that binds them
all together?  If both v4 and v6 are handling by the same device then you can't
have two list entries in the same list with the same key.

Regards,
Rob



_______________________________________________
I2nsf mailing list
I2nsf@ietf.org
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to