Hi Linda,

On Tue, Apr 5, 2022 at 7:06 AM Linda Dunbar <[email protected]>
wrote:

> Patrick, Paul, and Yunchul,
>
>
>
> Based on the Figure 1, the “Application Interface” is for exchanging
> information between the Security Controller and the I2NSF Analyzer.  Then
> the Figure 2 shows that the Application Interface has “Policy
> Reconfiguration” from NSF name, Problem, and solution. Can you give some
> examples of the “problem or issues in the NSF”?
>
  => [Paul] The following I-D for Application Interface has two XML
configuration examples such as DDoS-attack detection and
       Overloaded NSF detection:

https://datatracker.ietf.org/doc/html/draft-lingga-i2nsf-application-interface-dm-02#page-23


>
>
> Isn’t “Policy Reconfiguration” same as different sequences of the commends
> to the NSFs (Section 3.1)?
>
>
>
> *“Policy reconfiguration” works together with the three I2NSF interfaces
> defined for the I2NSF Framework*
>
>
  => [Paul] Policy reconfiguration is performed by a series of actions as
following with three I2NSF interfaces:
      - The delivery of NSF monitoring data collection from an NSF to the
I2NSF Analyzer via Monitoring Interface
      - The analysis of the NSF monitoring data and the generation of a
policy reconfiguration by the I2NSF Analyzer
      - The delivery of the policy reconfiguration from the I2NSF Analyzer
to the Security Controller via Application Interface
      - The translation of the policy reconfiguration into a low-level
security policy by the Security Controller
      - The delivery of the low-level security policy from the Security
Controller to the appropriate NSF

      Thanks.

      Best Regards,
      Paul

>
>
>
>
> Thank you
>
> Linda
> _______________________________________________
> I2nsf mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/i2nsf
>
_______________________________________________
I2nsf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to