Overall thought: may want to address it in terms of what you are
trying to protect rather than how you are trying to protect, eg:
- general security around device access (for config) and
management/monitoring access
- authentication/authorization
- privacy
- Filtering
- message integrity
- Image integrity
- configuration integrity, verification, rollback
- Security around routing information exchange
- authentication/authorization
- privacy
- filtering
- integrity
- DoS protection
- Logging content
- traffic
- data fields
- storage
- etc....
+++++++++++++++++++++++++
IETF-related email from
Gregory M. Lebovitz
Juniper Networks
W - +01 (1) 408 543 8002