[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
draft-ops-mumble-terminology-00.txt
Please publish this document as an internet-draft.
Thanks.
Fran Reichmeyer
Mark Stevens
*******************************
Internet Draft Francis Reichmeyer
Expiration: March 2000 IPHighway
File: draft-ops-mumble-terminology-00.txt Mark Stevens
Lucent
A Unified Terminology for Policy Based Networking
<draft-ops-mumble-terminology-00.txt>
22-October-1999
Status of this Memo
This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
Distribution of this memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (1998). All Rights Reserved.
Internet Draft Expires March 2000 [Page 1]
Internet Draft 22-Oct-99
Abstract
Policy Based Networking (PBN) is a topic of interest to many areas
within the networking community. Initially considered for the
implementation and control of QoS services, several groups are
looking to deploy policy-based networks for a wider variety of
applications, such as security and VPN. We have found, when trying
to coordinate efforts of the different groups, that there are some
misunderstandings among the groups, some of which can be attributed
to the different terminology that has propagated through the groups.
In this draft, we attempt to clear up some of these
misunderstandings, concentrating on PBN for Policy Provisioning
(rap), Differentiated Services (diffserv), IP Security (ipsp), and
general Policy Framework (policy). The terminology discussed here is
not meant to be an exhaustive list of PBN-related terms and
concepts, but it is intended to represent at least the four areas
mentioned.
It is NOT intended that this draft defines an architecture or
framework for PBN _ each group is clearly qualified to define these
for themselves. Instead, we identify the terminology common to all
PBN applications and suggest definitions, which are meaningful and
useful, yet general enough to be applicable across all PBN
applications.
Reichmeyer, et al. Expires March 2000 [Page 2]
Internet Draft 22-Oct-99
Table of Contents
Abstract..............................................................2
Table of Contents.....................................................3
1 Introduction ......................................................4
2 Terminology for Common PBN Components .............................5
2.1PBN Management Models .............................................6
2.2Policy Decision Point/Policy Consumer .............................7
2.3Policy Enforcement Point/Policy Target ............................7
2.4Policy Repository .................................................8
2.5Policy Rules ......................................................8
2.6Policy Requests ...................................................9
2.7Policy Decisions ..................................................9
3 General PBN Terminology ...........................................9
3.1Roles .............................................................9
3.2Service Level Agreement (SLA) ....................................10
4 IP Security Policy Terminology ...................................10
5 DiffServ Policy Terminology ......................................11
6 References .......................................................12
7 Author Information ...............................................13
8 Full Copyright Notice ............................................14
Reichmeyer, et al. Expires March 2000 [Page 3]
Internet Draft 22-Oct-99
1 Introduction
Policy Based Networking (PBN) is a topic of interest to many areas
within the networking community. Initially considered for the
implementation and control of QoS services, people are looking to
deploy policy-based networks for a wider variety of applications,
such as security and VPN. As various groups begin developing
architectures and protocol specifications related to their specific
PBN needs, we have found that there is some overlap in the
terminology defined _ different terms used to describe basically the
same concept. We've also found, when trying to coordinate efforts of
the different groups, that there are some misunderstandings among
the people in the groups and some of that misunderstanding can be
attributed to the different terminology that has propagated through
the groups.
In this draft, we attempt to clear up some of these
misunderstandings as well as to eventually eliminate some of the
overlap in like terms. We concentrate on the areas of Policy
Provisioning (rap), policy for Differentiated Services (diffserv),
IP Security policy (ipsp), and general Policy Framework (policy).
The terminology discussed here is not meant to be an exhaustive list
of PBN-related terms and concepts, but it is intended to represent
at least the four areas mentioned. These areas are in the forefront
of PBN development and are working to coordinate efforts so that a
common PBN model can be agreed upon.
This draft does NOT define an architecture or framework for PBN _
each group is undoubtedly better qualified to define these for their
specific needs. Instead, we identify the terminology common to all
PBN applications and suggest definitions, which are meaningful and
useful, yet general enough to be applicable across all PBN
applications. In doing so, it will be easier and more efficient to
coordinate PBN efforts and provide the mechanisms for a single PBN
system that supports all policy applications.
Most of the terminology in this draft has appeared in other IETF
Internet Drafts in one form or another; some is being introduced for
the first time. As the terms in this draft are meant to be relevant
to a number of different working groups, it is unrealistic to think
that a first cut at this will be complete. The intention of this
draft is to present the existing terminology and identify areas of
conflict with terms and concepts that are common to multiple policy
applications, e.g. where similar terms are used with different
definitions, or different terms are used for the same definition.
Upon reviewing the drafts from the various working groups and
participating in meetings attended by representatives of the
different groups, it becomes apparent there are differences in some
of the "basic" PBN concepts. This is to be expected given the
different starting points and goals of the groups. However, it
should be possible to go back and revisit the terms and concepts and
Reichmeyer, et al. Expires March 2000 [Page 4]
Internet Draft 22-Oct-99
come up with a unified set of definitions that can be applied and
shared among all policy applications.
Once such a unified terminology exists, architectures for new PBN
applications will be able to be described easily and efficiently
using common building blocks. For example, with common terms and
definitions for the functional components of a PBN system (two such
terms are "PDP" and "PEP" while "Policy Consumer" and "Policy
Target" have also been suggested for the same components) one can
look at the architecture of a PBN application and identify where the
functionality resides.
In the following sections, we'll the various terms and definitions
that currently exist for some of basic PBN components and concepts.
We expect future versions of the draft to contain a complete list
for a unified PBN terminology.
2 Terminology for Common PBN Components
Describing different policy applications has resulted in some
similar PBN terms and concepts with slightly varying meanings. For
example, the PBN architectures for policy outsourcing and policy
provisioning described by the RAP WG have both include a Policy
Decision Point (PDP) that controls network devices that act as
Policy Enforcement Points (PEP). However, the role of the PDP is
slightly different in the two models and this can lead to processing
policy rules differently in the two cases. In the outsourcing case,
the PDP might issue a decision of the form "accept the admission
control request" whereas in the provisioning case a PDP message
might be "mark packets with this DHCP value." These different
directives from the PDP have lead to some question about whether it,
functionally, is a "decision point" in all cases. As a result, this
same component has been called a Policy Consumer in the Policy WG
framework document.
In the actual enforcement of the policy at the data level in the
network device, the behavior is similar, but the policy rules that
need to be stored and processed are different. Both PEP and Policy
Target have been used to define this component. If we consider a IP
Security Policy application, the policy rules and processing might
be different still, as will the terminology for the functional
components of the system.
Thus, although in these simplified examples, all three PBN
applications define similar components, different terms are used and
they mean slightly different things in each case. In order to
describe a common PBN system, applicable to all cases, the
components need to be defined in a way that is meaningful to all
applications.
Reichmeyer, et al. Expires March 2000 [Page 5]
Internet Draft 22-Oct-99
The following concepts are common to all the PBN applications of
interest here:
- PBN Management Model
o how components interact and process policy information
- Policy Decision Point/Policy Consumer
o component that controls the network devices
- Policy Enforcement Point/Policy Target
o component that applies the policy to IP data packets
- Policy Repository
o where PBN policies are stored
- Policy Rules
o "instructions" for the PBN system
- Policy Requests
o requests passed into or within a PBN system
- Policy Decisions
o directives generated as a result of a request
The following sections examine these PBN concepts and present the
existing terminology for each.
2.1 PBN Management Models
The management model for PBN describes how the different components
of the system interact and process policy information in order to
implement policy based networking. There are two types of policy
management models discussed: Outsourcing and Provisioning.
The Outsourcing model describes how policy is implemented in
situations where network devices refer to a PBN management component
to provide policy decisions for requests initiated by the network
devices themselves. The requests are typically the result of some
event occurring at the device that requires a policy decision, for
example receiving a signaling protocol message. A specific example
is the COPS-RSVP [cops-rsvp] case, described in the RAP WG [rap-
frame], where RSVP nodes outsource policy decisions for RSVP Path
and Resv messages they receive.
The Provisioning model describes how policy is implemented in
situations where the PBN management system issues directives to the
network devices preparing them, in advance, for some event that may
occur in the network; usually the arrival of some IP data or control
traffic that requires particular processing behavior. Since the
policy prepares the network beforehand, prior to the packets
actually arriving, we use the term provisioning policy. For a
specific example, the Diffserv architecture [rfc2475] defines the
following:
Reichmeyer, et al. Expires March 2000 [Page 6]
Internet Draft 22-Oct-99
- Service Provisioning Policy: a policy which defines how traffic
conditioners are configured on DS boundary nodes and how traffic
streams are mapped to DS behavior aggregates to achieve a range of
services.
2.2 Policy Decision Point/Policy Consumer
There are at least two models for implementing policy in IP
networks, outsourcing and provisioning, as described above. Policy-
based network management will probably utilize both models.
A policy model based on outsourcing decisions establishes a software
process that responds to queries triggered by events occurring
within network elements. In the decision outsource model the
software process is referred to a PDP or Policy Decision Point. The
PDP is in a position to read and evaluate expressions of policy and
render a decision on behalf of the device making the request for a
decision. The PDP is where the decision is made in the outsource
model.
In an alternate policy model, decisions can be distributed. In such
a model, it makes little sense to refer to a decision point. Policy
expressions in this model may contain operands that cannot be
obtained in real-time at a centralize point. As a result,
translation and configuration operations occur. A software process
is established to interpret policy. As the interpretation dictates,
the configuration of devices may be altered. Altering the
configuration of network elements effectively implements the policy,
but in reality some of the operands in the policy are evaluated
outside of the network element while other operands of the same
policy are evaluated within the device. In such cases, the terms
Policy Consumer and Policy Target are used.
2.3 Policy Enforcement Point/Policy Target
Network devices play a part in PBN as the points in the network
where the policy directives issued by PBN management are carried out
on the IP data traffic in the network. The term Policy Enforcement
Point (PEP) has been used to describe these devices [RAPFRAME] for
both outsourcing and provisioning models, since the policy is
enforced on the IP individual packets in both cases. For example, in
the devices, packets get classified, queued, dropped, etc. based on
the installed policy regardless of whether the installed policy is a
result of a response to a request (outsourcing) or an asynchronous
message (provisioning).
The Policy Framework [TERMS] document offers the following
definition:
Reichmeyer, et al. Expires March 2000 [Page 7]
Internet Draft 22-Oct-99
- Policy Enforcement: the action of placing the network (or a part
of the network) in a desired policy state using a set of
management commands. When this definition is applied to network
elements, these management commands change the configuration of
the device(s) using one or more mechanisms. Enforcement is
carried out in the context of a policy rule.
However, as described in the previous section, the Policy framework
draft [PLYFRAME] uses the term Policy Target to refer to the PBN
component controlled by Policy Consumers.
To work toward reconciling the two views of enforcement, we must
recognize that the term PEP implies that the enforcement of a policy
occurs in one distinct location. The term Policy Target acknowledges
that in certain situations activities related to the enforcement of
a given policy can be distributed among more than on entity in a
policy system. In policy model that outsources decisions, the
enforcement is thought to be localized in the device that requested
a decision be made by an external entity. In a policy model that
utilizes translation and configuration, policy enforcement
activities can be seen as happening in multiple locations. In the
case where a Policy Rule contains both operands whose expansions
cannot be done in a device, and operands that must be expanded in a
device, enforcement is seen occurring as a result of actions taken
in both an external process (the Policy Consumer) and the device
itself (the Policy Target). The Policy Target is the device whose
behavior is modified by the policy, but is not the only component in
the policy system involved in the enforcement of the given policy.
2.4 Policy Repository
A Policy Repository provides persistent storage and retrieval of
Policy Rules. The repository simply stores data. It does not in
general process or act on it. The term does not imply a particular
access protocol. For persistent storage to be useful in a policy
system, the organization of information representing Policy Rules
must be standardized. The core policy schema is on example of a
standard for organizing the storage of Policy Rules.
2.5 Policy Rules
Policy Rules are expressions of policy stored in a Policy Repository
and structurally organized according to the structural model defined
by the core policy information model. See [INFO]. Ultimately, Policy
Rules will have to contain operands and operators to express the
conditions and the actions of a policy. A first pass at the
standardization of the QoS operands can be found at [MODEL]. A
forthcoming draft will refine the QoS information model. See
[REFINE]. Operands will be of little use without standardized
operators. At present there is no clear work in the area of operator
Reichmeyer, et al. Expires March 2000 [Page 8]
Internet Draft 22-Oct-99
definition available, but on going discussions in the Policy working
group are expected to yield a plan for the development of a draft to
define operators.
2.6 Policy Requests
2.7 Policy Decisions
[TERMS] defines a policy decision as follows:
- Policy Decision: the abstraction of activating and evaluating one
or more policy rules. Each policy rule is interpreted in the
context of a specific request (implied or explicit) for accessing
and/or using one or more resources. It connotes taking one or more
pre-determined actions based on whether or not a given set of
policy conditions was satisfied.
3 General PBN Terminology
A number of terms and concepts have appeared which may not
necessarily be applicable to all PBN systems, but which none the
less have been interpreted differently among the groups that have
tried to apply them. This section discusses some of these terms.
3.1 Roles
Roles (and role combinations) have been discussed in the context of
the Policy Information Base [PIB], described for use with the COPS-
PR policy protocol, as well as in the Policy Framework WG. [PIB]
defines roles with regard to policy classes while [TERMS] approaches
the concept of a role from the point of view of the policy schema
and policy information model.
In [PIB] a role is defined as simply a string that is associated
with an interface to describe the functions of an interface. A
"role-combination" is an unordered set of roles. Instances of a
given policy rule class are applied to interface if and only if the
set of roles in the role combination is identical to the set of the
roles of the interface.
As defined in [TERMS], a role, in the most general sense, describes
the duties, rights, and permissions of an object with respect to the
rest of the managed environment. A role is realized via the
collection object in the policy information model. This collection
object aggregates a network object with other objects that a policy
is to be applied to. A role is therefore a means of grouping
together a set of objects, so that one or more policies can be
specified as being applied to the entire group of objects. This
provides a better means of abstraction that relying on one or more
attribute values to group the objects.
Reichmeyer, et al. Expires March 2000 [Page 9]
Internet Draft 22-Oct-99
3.2 Service Level Agreement (SLA)
Service Level Agreements (SLA) are often referred to in PBN in the
context of specifying and sharing policies between domains. Several
definitions have been given for SLAs; the first one given here is
proposed in the diff serv architecture RFC and the second one is a
revised definition appearing the Policy Framework terminology draft.
From [DIFFARCH]:
Service Level Agreement: a service contract between a customer and a
service provider that specifies the forwarding service a customer
should receive. A customer may be a user organization (source
domain) or another DS domain (upstream domain). A SLA may include
traffic conditioning rules which constitute a TCA in whole or in
part.
From [TERMS]:
Service Level Agreement: a service contract between a customer and a
Service Provider that specifies the expected operational
characteristics of their relationship. Example operational
characteristics include the details of the treatment which a
customer's traffic and/or requests for service should receive. The
details of the operational characteristics are defined in terms of
Service Level Objectives (SLOs). The SLA documents the agreed levels
and parameters of services provided, and can cover a wide range of
parameters including items that effect the network element and items
that don't (e.g., service hours and availability, user support
levels, etc.).
Service Level Objective (SLO): partitions an SLA into individual
objectives that can be mapped into policies that can be executed.
The SLOs define metrics to enforce, police, and/or monitor the SLA.
Some commonly used metrics to determine whether or not an SLA is
being fulfilled include component system availability (e.g., up-time
and MTBF), performance (e.g., response time), and serviceability
(e.g., MTTR).
4 IP Security Policy Terminology
While PBN frameworks, architectures, and protocols for Diff Serv,
RSVP, general policy frameworks, etc. have been worked on with
relatively close coordination, policy for IP Security applications
has just recently begun to engage with the other groups. This
section describes the terminology used in the IPSec policy
specifications.
The following definitions appear in [SEPOL]:
Reichmeyer, et al. Expires March 2000 [Page 10]
Internet Draft 22-Oct-99
- Security Gateway: A security gateway refers to an intermediate
system that implements IPSec protocols. For example, a router or a
firewall implementing IPSec is a security gateway.
- Security Domain: A set of communicating entities and resources
that share a common security policy enforced at one or more
enforcement agents or at an individual host. The definition of
security domain applies to networks protected by security gateways
as well as to single hosts, since a host may be the enforcer of its
own policies. Security domains could exist inside other security
domains.
5 DiffServ Policy Terminology
Policy for Differentiated Services encompasses the efforts of
several groups since the initial concentration for PBN has been for
QoS networks. With Diffserv, policy based management is concerned
with controlling the elements and mechanisms defined by Diffserv to
implement differentiated services. Hence, most definitions and
terminology from the Diffserv WG could be related back to policy and
included in a unified PBN terminology. For example, PIBs and QoS
policy schema refer to definitions of packet classifiers, markers,
shapers, etc. However it seems a bit unwieldy to include all of the
terminology here. Most PBN efforts are committed to participating in
and tracking the Diffserv specifications and conforming to them.
Reichmeyer, et al. Expires March 2000 [Page 11]
Internet Draft 22-Oct-99
6 References
[COPS] Boyle, J., Cohen, R., Durham, D., Herzog, S., Raja, R.,
Sastry, A., "The COPS (Common Open Policy Service)
Protocol", IETF <draft-ietf-rap-cops-07.txt>, August 1999.
[COPSRSVP]Boyle, J., Cohen, R., Durham, D., Herzog, S., Rajan, R.,
Sastry, A., "COPS Usage for RSVP", <draft-ietf-rap-cops-
rsvp-05.txt>, June 1999.
[COPSPR] Reichmeyer, F., et. al., "COPS Usage for Policy
Provisioning", <draft-ietf-rap-cops-pr-01.txt>, November
1999.
[MODEL] Weiss, W., Strassner, J., Westerinen, A., "Terminology for
Describing Network Policy and Services ", IETF <draft-weiss-
policy-device-qos-model-00.txt>, August 1999.
[REFINE] Weiss, W., Strassner, J., Westerinen, A., "Terminology for
Describing Network Policy and Services", IETF <draft-weiss-
policy-device-qos-model-01.txt>, October 1999.
[INFO] Moore, B., Ellesson, E., Strassner, J., "Policy Framework
Core Information Model", IETF <draft-ietf-policy-core-info-
model-02.txt>, October 1999.
[PIB] Fine, M., McCloghrie, K., Hahn, S., Chan, K., Smith, A., "An
Initial Quality of Service Policy Information Base for COPS-
PR Clients and Servers", <draft-mfine-cops-pib-00.txt>,
February 1999.
[PLYFRAME] Stevens, M., et. al., Policy Framework, Internet Draft,
<draft-ietf-policy-framework-00.txt>, September 1999.
[RAP] Yavatkar, R., et al., "A Framework for Policy Based
Admission Control", IETF <draft-ietf-rap-framework-03.txt>,
April 1999.
[RAPFRAME]Yavatkar, R., et al., "A Framework for Policy Based
Admission Control", IETF <draft-ietf-rap-framework-03.txt>,
April 1999.
[SECPOL] Srisuresh, P., Sanchez, L.A., "Policy Framework for IP
Security_, <draft-ietf-ipsec-policy-framework-00.txt>,
February 1999.
[TERMS] Strassner, J., Ellesson, E., "Terminology for Describing
Network Policy and Services", <draft-ietf-policy-terms-
00.txt>, June 1999.
Reichmeyer, et al. Expires March 2000 [Page 12]
Internet Draft 22-Oct-99
7 Author Information
Francis Reichmeyer
IPHighway Inc.
400 Kelby St.
Fort-Lee, NJ 07024
Email:franr@iphighway.com
Mark Stevens
Lucent Technologies
300 Baker Ave.
Concord, MA 01742
Email:markstevens@lucent.com
Reichmeyer, et al. Expires March 2000 [Page 13]
Internet Draft 22-Oct-99
8 Full Copyright Notice
Copyright (C) The Internet Society (1997). All Rights Reserved.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it or
assist in its implementation may be prepared, copied, published and
distributed, in whole or in part, without restriction of any kind,
provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing the
copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of developing
Internet standards in which case the procedures for copyrights defined
in the Internet Standards process must be followed, or as required to
translate it into languages other than English.
The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns.
This document and the information contained herein is provided on an
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT
NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL
NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.
Reichmeyer, et al. Expires March 2000 [Page 14]